Hotspot Observation | Focusing on Power Grid Attack Incidents: Analyzing Vulnerabilities and Security Testing in Industrial Control Systems

Hotspot Observation | Focusing on Power Grid Attack Incidents: Analyzing Vulnerabilities and Security Testing in Industrial Control Systems

As cyber attack methods continue to evolve, industrial control systems, represented by power systems, are gradually shifting from being a “secondary impact area” to a core target in the cyber attack chain. Especially in the context of the ongoing advancement of the industrial internet and the continuous integration of “cloud-edge-end” collaborative systems into key business … Read more

Unauthorized Access and Detection Tools for MQTT

Unauthorized Access and Detection Tools for MQTT

What is MQTT?MQTT is a lightweight communication protocol for the Internet of Things (IoT), based on a publish-subscribe model, widely used for real-time communication between devices. The MQTT Broker is the central hub for messages, responsible for receiving, storing, and distributing messages. Risks of Unauthorized Access to MQTT: Data Leakage: Attackers may subscribe to sensitive … Read more

Summary of Vulnerabilities in HTTP/HTTPS Protocols: How to Check and Prevent Them

Summary of Vulnerabilities in HTTP/HTTPS Protocols: How to Check and Prevent Them

The following is a classification and organization of vulnerabilities in the HTTP/HTTPS protocols based on the perspectives of black box testing、white box testing and gray box testing: 1. Black Box Testing (External Perspective, No Internal Access) Definition: Simulates the attacker’s perspective, testing only through external network interfaces without relying on internal system code or configuration … Read more

HTTP Proxy Injector: A Powerful HTTP Proxy Injection Tool

HTTP Proxy Injector: A Powerful HTTP Proxy Injection Tool

HTTP Proxy Injector: A Powerful HTTP Proxy Injection Tool HTTP Proxy Injector is a powerful tool for HTTP request proxying and injection, helping developers, testers, and security researchers intercept, modify, and redirect HTTP/HTTPS requests. It is widely used in development debugging, security testing, and network analysis. This article will comprehensively introduce the core features, working … Read more

Practical Use of Burpy Plugin – Cracking the Encryption Algorithm of a WeChat Mini Program

Practical Use of Burpy Plugin - Cracking the Encryption Algorithm of a WeChat Mini Program

Author: 0pening 1. Introduction Testing a certain WeChat mini program, without further ado, let’s start using BurpSuite to capture packets. However, upon capturing the packets, I noticed something was off 🤨. This application encrypts the parameters into bizContent and uses a signature parameter sign to prevent man-in-the-middle attacks on the data packets… not very honorable. … Read more

Smod – Modbus/SCADA Industrial Control Security Testing Tool

Smod - Modbus/SCADA Industrial Control Security Testing Tool

Project Address https://github.com/enddo/smod Project Introduction Based on SCADA (Supervisory Control and Data Acquisition) systems, proprietary closed network protocols have developed towards open-source solutions and TCP/IP network protocols in recent years. This makes them vulnerable to the same security flaws as traditional computer networks. The Modbus/TCP protocol is one such solution that provides free public utility … Read more