HTTP status code, response header, request header

1. Status code in Chinese 100: “Continue”, 101: “Exchange Agreement”, 200: “OK”, 201: “Created”, 202: “Accept”, 203: “Non-authoritative information”, 204: “No content”, 205: “Reset content”, 206: “Part of the content”, 300: “Multiple selection”, 301: “Moved permanently”, 302: “Found”, 303: “See others”, 304: “Not modified”, 305: “Use proxy”, 307: “Temporary Redirect”, 400: “Bad Request”, 401: “Unauthorized”, […]

(5) SpringMVC handles Ajax requests carrying JSON format (“key”:value) request data

SpringMVC handles Ajax Reference article Common formats for data exchange, such as JSON format and XML format How to carry request parameters The request parameters sent by the browser to the server include name=value &…(key-value pair) and {key:value,…}(json object) Two formats URL requests and form GET requests will splice the request parameters to the end […]

Pikachu Range – Cross-Site Request Forgery (CSRF)

Article directory 1. Cross-site request forgery (CSRF) 1.1 CSRF(get) 1.2 CSRF(post) 1.3 CSRF Token 1.4 CSRF vulnerability defense 1. Cross-site request forgery (CSRF) You can also refer to my other article: Cross-site request forgery (CSRF) The full name is Cross-site request forgery, which translates as cross-site request forgery. It refers to using the victim’s identity […]

GET, POST request third-party interface HttpClient calls tool class

GET request example: Map<String, String> params = new HashMap<>(); params.put(“grant_type”, “client_credential”); params.put(“appid”,”your own appid”); params.put(“secret”, “your own secret key”); String resultStr = HttpClientUtil.sendGet(url, params); POST JOSN request example: JSONObject params = new JSONObject(); params.put(“Third-party request parameters”, “Own input parameters”); params.put(“Third-party request parameters”, “Own input parameters”); params.put(“Third-party request parameters”, “Own input parameters”); params.put(“Third-party request parameters”, “Own […]

JS reverse engineering practice 23 – wss URL encryption + request header + ws sending and receiving in a certain city

Statement All content in this article is for learning and communication only. Packet capture content, sensitive URLs, and data interfaces have been desensitized. Commercial and illegal use is strictly prohibited. Otherwise, all consequences arising therefrom will have nothing to do with the author. If there is any infringement , please contact me to delete immediately! […]

MM-Camera architecture-ProcessCaptureRequest process analysis

Article directory processCaptureRequest\_3\_4 1.1 mDevice 1.2 mDevice->ops->process\_capture\_request 1.3 hardware to vendor mct\_shimlayer\_process\_event 2.1 mct\_shimlayer\_handle\_parm 2.2 mct\_shimlayer\_reg\_buffer processCaptureRequest_3_4 The sdm660 camera uses the camera hal 3.4 interface. Each preview frame is initiated by the camera service. Through the CameraDeviceSession::processCaptureRequest_3_4 interface of the camera HAL, the hal is notified to request a preview frame. hardware/interfaces/camera/device/3.4/default/CameraDeviceSession.cpp Return<void> CameraDeviceSession::processCaptureRequest_3_4( […]

Springboot uses Aop to save interface request logs to mysql (and solve the problem that the mapper and service referenced in the Interceptor interceptor are null)

1. Springboot uses Aop to save interface request logs to mysql 1. Add aop dependency <!– aop log –> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-aop</artifactId> </dependency> 2. Create a new interface to save the entity class of the database package com.example.springboot.entity; import com.baomidou.mybatisplus.annotation.IdType; import com.baomidou.mybatisplus.annotation.TableId; import com.baomidou.mybatisplus.annotation.TableName; import; import java.time.LocalDateTime; import lombok.Getter; import lombok.Setter; /** * […]

JavaEE_Constructing HTTP requests and HTTPS

Table of Contents 1. Construct HTTP request 1.1 form tag constructs HTTP request 1.1.1 form tag constructs GET request 1.1.2 Form tag constructs POST request 1.2 Construct HTTP request through ajax 1.3 form and ajax 1.4 Use ajax to construct HTTP requests 2.HTTPS 2.1 Symmetric encryption 2.2 Asymmetric encryption 2.3 Certificate 1. Construct HTTP request […]

Web vulnerability-SSRF server request forgery

Directory SSRF server request forgery 1. Definition 2. Causes of vulnerabilities 3. Vulnerability detection 4. Exploiting vulnerabilities 5. Reproduce the SSRF experiment at the Pikachu shooting range and detect the opening of the target drone port. 6. Use SSRF to detect the intranet environment and obtain the shell 7. Bypass techniques 8. SSRF defense solution […]