After searching many articles, I finally found a solution! Error report details Solution The first method (applicable to my own solution): httpclient-4.5.jar regularly sends http packets, but suddenly an error is reported one day, which is caused by the change of http certificate. previous code try { CloseableHttpClient httpClient = buildDefaultHttpClient(); String url = domain.getUrl(); […]
Tag: sun
Bean named ‘XXX’ is expected to be of type [com.***.XXX] but was actually of type [com.sun.proxy.$Pr…
spring project When running the local testcase, it was found that the program could not be started and the following error was reported: java.lang.IllegalStateException: Failed to load ApplicationContext Caused by: org.springframework.beans.factory.BeanCreationException: Error creating bean with name ‘bossAccAndTransModifyController’: Injection of resource dependencies failed; nested exception is org.springframework.beans.factory.UnsatisfiedDependencyException: Error creating bean with name ‘TPlatOrderServiceImpl’: Unsatisfied dependency expressed […]
C. Garden of the Sun
Table of Contents 1.Problem 2.Input 3.Output 4.Examples 4.1input 4.2output 5.Code 6.Conclusion 1.Problem There are many sunflowers in the Garden of the Sun. Garden of the Sun is a rectangular table with nn rows and mm columns, where the cells of the table are farmlands. All of the cells grow a sunflower on it. Unfortunately, one […]
Design of sun tracking system based on microcontroller
Collect and like, your attention is the motivation for my creation Article directory summary 1. Main contents of the research 2. Design of system hardware 2.1 Selection of tracking control scheme 2.1.1 Selection of tracking system coordinate system 2.1.2 Selection of tracking methods and tracking systems 2.2 Overall system design and related hardware introduction 3. […]
Red Sun-VulnStack Shooting Range-ATT&CK (2)
Red Sun Actual Combat 2: Foreword: VulnStack is a shooting range knowledge platform built by the Red Sun Security Team. The shooting range environment (CMS, vulnerability management, domain management, etc.) are all simulated based on the business habits of domestic enterprises. All environment design ideas come from ATT & The CK red team evaluates the […]
[Red Sun Shooting Range] vulnstack2-complete penetration process
Article directory 1. Network topology 2. Description Configuration Environment penetration begins collect message start attacking Kill the software CS is online Privilege escalation Intranet detection Lateral movement landscape again rdp connection trace removal Summarize: 1. Network topology Network Configuration: 2. Description The Red Team Combat Series mainly uses real enterprise environments as examples to build […]
SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed
1. Background After a project updated the Nginx SSL certificate in May 2023, it was normal to access the system directly in the browser, but another project of its own and other third-party systems returned an error message when calling through the interface address: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid […]
How can Suning’s over 600 million members achieve user portrait query in seconds?
User portrait is to build a labeled user model based on user characteristics, business scenarios, user behavior and other information. For example, consumer user portraits are divided into two categories: attributes and behavior tags. Of these two types of labels, one is fixed and the other is variable. The fixed attribute tags are basically the […]
Red Sun-VulnStack Shooting Range-ATT&CK (1) Two methods of lateral penetration
Red Sun Practice 1: Foreword: VulnStack is a shooting range knowledge platform built by the Red Sun Security Team. The shooting range environment (CMS, vulnerability management, domain management, etc.) are all simulated based on the business habits of domestic enterprises. All environment design ideas come from ATT & The CK red team evaluates the design […]
OSCP Series Shooting Range-Esay-SunsetDecoy
Summary getwebshell: Found the zip file → zip has a password → john exploded the zip password → Found passwd and shadow files → Exploded shadow password → ssh login Right escalation idea: Discover background running programs → Upload pspy64 for viewing → Discover chkrootkit → chkrootkit Elevate privileges Preparation Start VPN Obtain the attacking […]