FPGA project: HCSR04

Mistakes made: 1. Since cnt_base is used to measure the high-level time of the echo echo signal, its data should be large and the bit width should be large. You can also use the cnt_us counter to calculate this high level time. In order to accurately calculate the distance, I still use the cnt_base counter. […]

“Network Security Penetration” If you still don’t understand CSRF? This article will give you complete control

1 What is CSRF Famous interview question: “Talk about your views on the difference between CSRF and SSRF” If we talk about this problem in very popular language, CSRF is more like a phishing move, where the user attacks the user; while for SSRF, the server sends a request, and the useris the server. . […]

CSR1000V demo license apply

Before the demo license apply process, we check the license status firstly. CSR1000V#show version Cisco IOS XE Software, Version 03.16.09.S – Extended Support Release Cisco IOS Software, CSR1000V Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 15.5(3)S9, RELEASE SOFTWARE (fc3) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2019 by Cisco Systems, Inc. Compiled Mon 18-Mar-19 06:28 by mcpre Cisco IOS-XE software, Copyright […]

How to protect your website and web applications with anti-CSRF tokens

The most common way to prevent cross-site request forgery attacks (CSRF/XSRF) is to use an anti-CSRF token, which is simply a unique set of values that is then required by the web application. CSRF is a client-side attack that can be used to redirect users to malicious websites, steal sensitive information, or perform other actions […]

16-MicroPython+ESP32 implements HCSR04 ultrasonic ranging sensor control

(1) Experiment purpose This experiment aims to use the MicroPython programming language to control the ESP32 module to drive the HCSR04 ultrasonic ranging sensor using the timer interrupt method. (2) Experimental materials ESP32 module PC(Windows) USB data cable HCSR04 ultrasonic ranging sensor dupont line Among them, understand and understand the HCSR04 ultrasonic ranging sensor: The […]

SEEDLabs- CSRF Attack

Cross-Site Request Forgery (CSRF) Attack Lab CSRF attacks take advantage of the website’s trust in the user’s web browser to hijack the web application that the user is currently logged in to perform operations that are not the user’s intention. It can be understood this way: the attacker has stolen your identity and sent a […]

CSRF (cross-site request forgery) and SSRF (server-side request forgery) vulnerability recurrence: risks and prevention methods

This article is intended for network security learning, please do not engage in any illegal behavior, otherwise you will be responsible for the consequences. Environmental preparation 1. CSRF(Cross-site request forgery) Example: Suppose a user is logged in on bank website A and keeps the session active, while he is also browsing other websites. The attacker […]

SSL/CA certificate and related certificate files (pem, crt, cer, key, csr)

Digital certificates are ID cards in the online world. Digital certificates provide electronic authentication for secure communication between both parties. The digital certificate contains the identification information of the key pair owner, and the identity of the certificate holder is authenticated by verifying the authenticity of the identification information. Digital certificates can establish a safe […]

DVWA – Cross-Site Request Forgery (CSRF)

Cross-site request forgery What is CRSF CSRF, the full name is Cross-site request forgery, which translates as cross-site request forgery. It refers to using the victim’s identity authentication information (cookies, sessions, etc.) that has not expired to trick them into clicking malicious links or visiting pages containing attack code. Without the person’s knowledge, the person […]

Cross-site request forgery (csrf)

Table of contents Formal website operation Cross-site request forgery (csrf) phishing site The simplest principle real website phishing site Strategies for Addressing Phishing Sites form form method 1 ajax method 1 ajax method 2 ajax method 3 Verify the specified request The first CBV decorator Way 1 Way 2 Formal website operation Regular websites include […]