Everyone Needs an HTTP Proxy for Debugging

Everyone Needs an HTTP Proxy for Debugging

Introduction This article introduces how front-end engineers can use HTTP proxies for debugging, going beyond the limitations of DevTools. Today’s front-end reading is shared by @huli. The main content starts here~~ As a front-end engineer who deals with web pages daily, it is quite reasonable to be familiar with the use of DevTools. Whenever there … Read more

Linux Lesson 5: Web Security Vulnerabilities

Linux Lesson 5: Web Security Vulnerabilities

1.1 Web Security Vulnerabilities Before discussing web vulnerabilities, let me briefly talk about web security knowledge. Let’s briefly understand the knowledge related to computer networks and protocols. Composition of Computer Communication Networks A computer network consists of a communication subnet and a resource subnet. The communication subnet is responsible for the error-free and orderly transmission … Read more

The Art of Chain Attacks in Internal Network Penetration

The Art of Chain Attacks in Internal Network Penetration

The Art of Chain Attacks in Internal Network Penetration This article is based on a simulated practical environment assessment conducted by Master Z for his apprentice 007, aimed at evaluating his thought process and capabilities in penetrating entry-level environments. The content is derived from 007’s retelling and records the entire chain attack path he took … Read more