Comprehensive Detection of HTTP, HTTPS, and Encrypted Webshells

1. Introduction Webshells are malicious scripts used by hackers to attack websites. Identifying webshell files or communication traffic can effectively prevent further attacks by hackers. Currently, the detection methods for webshells are mainly divided into three categories: static detection, dynamic detection, and log detection. Static detection analyzes webshell files and extracts their coding rules to … Read more

How to Write a Simple HTTP Server in C++

How to Write a Simple HTTP Server in C++

Click the blue text Follow us Source from the Internet, please delete if infringing This article will not involve many complex concepts and does not write difficult-to-understand template functions. The code is simple and readable. This article is dedicated to everyone who wants to write an HTTP server in C++! Experts and big shots can … Read more

Understanding HTTP Status Codes

Understanding HTTP Status Codes

Click the blue text above to follow us 1xx: Informational This class of status codes indicates a temporary response. The client should be prepared to receive one or more 1xx responses before receiving a regular response. HTTP Status Code Description 100 Continue. 101 Switching Protocols. 2xx: Success This class of status codes indicates that the … Read more

Python Web Scraping: HTTP and HTTPS Protocols

Python Web Scraping: HTTP and HTTPS Protocols

Application Architecture The rapid development of the Internet is driven by commercial economics. Currently, almost all commercial applications are based on the Internet, and they generally use C/S architecture, B/S architecture, or M/S architecture. C/S stands for Client-Server. B/S stands for Browser-Server. M/S stands for Mobile-Server. HTTP Protocol Currently, 90% of network transmissions on the … Read more

Implementing an HTTP Downloader in C

Implementing an HTTP Downloader in C

Click the blue text Follow us Due to changes in the public account push rules, please click “View” and add “Star” to get exciting technical shares at the first time Source from the internet, please delete if infringing This time I would like to share an HTTP downloader implemented in C. For example, when doing … Read more

Common HTTP Error Codes

Common HTTP Error Codes

Common HTTPError Codes Sometimes we encounter a situation where a website cannot be accessed, and it returns some error codes. Some common error codes include: 404, 503. Tips 4xx (Client Error) These status codes indicate that there may be an error with the request, preventing the server from processing it. 400 (Bad Request) The server … Read more

Understanding HTTP Long Connections in Nginx

Understanding HTTP Long Connections in Nginx

In Nginx, the HTTP module uses configurations related to HTTP long connections (mainly the keepalive directive) and explains the principles of HTTP long connections. 1. HTTP Long Connections 1.1 Prerequisites Connection management is a key topic in HTTP: opening and maintaining connections greatly affects the performance of websites and web applications. In HTTP/1.x, there are … Read more

Basics of HTTP and Simple Telnet Commands

Basics of HTTP and Simple Telnet Commands

1. Overview of HTTP In the early 1990s, a major emerging application known as the World Wide Web took the stage. The Web is an Internet application that has captured public attention. The application layer protocol of the Web is Hypertext Transfer Protocol (HTTP), which is at the core of the Web. HTTP is implemented … Read more

Notes on Understanding HTTP

Notes on Understanding HTTP

Notes on Understanding HTTP ❝ This is the 285th article in the series on growth by Guoxing. ❞ (1) Reading Understanding HTTP The duration is three weeks from July 11 to July 31. 1. Why Learn HTTP? The front end (client) displays pages and interactions; The back end (server, logic code, data) completes function writing … Read more

Core Principles of Web Crawlers: How an HTTP Request is Completed

Core Principles of Web Crawlers: How an HTTP Request is Completed

Author: Da Mu Jiang https://my.oschina.net/luozhou/blog/3003053 Overview In the previous article, “Do You Know What Happens Behind the Scenes When You Ping?” we analyzed the process of a <span>Ping</span> using actual packet capture (a common interview question). We learned that <span>ping</span> relies on the <span>ICMP</span> protocol and also involves <span>ARP</span> requests in a local area network. … Read more