Article directory Preface 1 Barcode detection based on Opencv + Kmeans + Zbar 1.1 Barcode detection preprocessing 1.1.1 Template matching 1.1.2 Use K-mearn algorithm (clustering algorithm) to process barcode frames 1.2matplotlib visual barcode detection frame 1.3 Detection effect 2 Barcode detection based on sharpening + bilateral Gaussian filtering + Zbar Summarize Other articles Original statement: […]
Tag: lateral
Intranet penetration testing: using WinRM for lateral penetration
Foreword WinRM, part of the Windows operating system, is a service that allows administrators to perform administrative tasks remotely on the system. Of course, such services will not be missed by attackers. In this article, we will talk about the use of WinRM in lateral penetration. WinRM Service Introduction WinRM is the abbreviation of Windows […]
Red Sun-VulnStack Shooting Range-ATT&CK (1) Two methods of lateral penetration
Red Sun Practice 1: Foreword: VulnStack is a shooting range knowledge platform built by the Red Sun Security Team. The shooting range environment (CMS, vulnerability management, domain management, etc.) are all simulated based on the business habits of domestic enterprises. All environment design ideas come from ATT & The CK red team evaluates the design […]
07 Django — ORM unilateral query
Table of contents Commonly used query methods for single tables filter double underscore query Multi-table query Table Structure One-to-one correspondence: OneToOneField() Many-to-one: Foreignkey() Many-to-many: ManyToManyField() Meta information Meta: Commonly used query methods for a single table models.py library management from django.db import models # Create your models here. class MyLibrarys(models.Model): id = models.AutoField(primary_key=True) name = […]
[OpenCV Practical Combat] 4. OpenCV five filtering practices (mean, box, median, Gaussian, bilateral)
OpenCV five filtering practices (mean, box, median, Gaussian, bilateral) 〇. Coding practical content 1. Filtering, kernel and convolution 1.1 Filtering 1.2 Kernels & Filters 1.3 Formula 1.4 Example 2. Actual combat of picture border filling 2.1 Solve the problem 2.2 Related OpenCV functions 2.3 Code 3. Practical practice of mean filtering 3.1 Theory 3.2 Blur […]
Intranet penetration testing: using WinRM for lateral penetration
Foreword WinRM, part of the Windows operating system, is a service that allows administrators to perform administrative tasks remotely on the system. Of course, such a service will not be missed by attackers. Let’s talk about it in this article. Use of WinRM in lateral penetration. If there is anything inappropriate in the article, please […]
Intranet penetration testing: using DCOM for lateral penetration
COM COM is the Component Object Model (COM). It is a set of Component Object Interface standards based on the Windows platform. It consists of a set of It consists of Construction Specification and Component Object Library. COM is the basis for many Microsoft products and technologies, such as Windows Media Player and Windows Server. […]
Intranet penetration testing: using WinRM for lateral penetration
Foreword WinRM, part of the Windows operating system, is a service that allows administrators to perform administrative tasks remotely on the system. Of course, such a service will not be missed by attackers. Let’s talk about it in this article. Use of WinRM in lateral penetration. If there is anything inappropriate in the article, please […]
Internal network lateral movement-ARP attack & picture capture & data hijacking & DNS hijacking
Intranet Lateral Movement-ARP Attack &Picture Capture &Data Hijacking &DNS Hijacking 1. ARP 1.1. Introduction to APR 1.1.1. How ARP works 1.1.2. How APR deception works 1.2. Environment preparation 1.3. Applicable scenarios 2. ARP disconnection attack demonstration 2.1. Demonstration using kali 2.1.1. nmap judges survival 2.1.2. Installation tools 2.1.3. Attacking Windows 10 virtual machines 2.1.3.1. Check […]
Intranet lateral movement-Win&Linux&offline memory reading&Hashcat cracking&RDP&SSH storage extraction
Intranet lateral movement-Win & amp;Linux & amp;memory offline reading & amp;Hashcat cracking & amp;RDP & amp;SSH storage extraction 1 Introduction 2. Windows system password extraction 2.1. Online reading 2.2. Offline reading 2.2.1. Read without storage 2.2.1.1. Reading files 2.2.1.2. Local decryption 2.2.2. Read with storage 2.3. Solve the high version 2.3.1. Modify the registry 2.3.2. […]