Recent Posts
-
RMI deserialization for Java Security
RMI deserialization for Java Security 0x00 Preface Before analyzing fastjson vulnerabilities, you need to understand R…… -
Collection of java learning
Collection of java learning 0x00 Preface In fact, the common classes in the previous article have already talked about…… -
Database connection pool for java learning
Database connection pool for java learning 0x00 Preface The JDBC used earlier needs to re-establish objects every time…… -
XSS audit points of Java audit
XSS audit points of Java audit 0x00 Preface The previous article talked about a simple audit of XSS. This article can …… -
Interpretation of Java security’s native readObject method
Interpretation of Java security's native readObject method 0x00 Preface In the analysis of Shiro in the previous artic…… -
SQL injection of Java audit
SQL injection of Java audit 0x00 Preface As an introduction to Java Web audit, this article is also my first audit art…… -
Common collections3 analysis of Java Security
Common collections3 analysis of Java Security Article launch: common collections3 analysis of Java Security 0x00 Prefa…… -
Urldns chain for Java Security
Urldns chain for Java Security 0x00 Preface When learning Java's deserialization vulnerability, you have to learn one …… -
Final and anonymous inner classes in java learning
Final and anonymous inner classes for java learning 0x00 Preface In the last few articles, I learned that the subclass…… -
Spring MVC common annotations for java learning
Spring MVC common annotations for java learning 0x00 Preface Continue with the previous article to record some annotat…… -
Jackson chapter of java learning
Jackson chapter of java learning 0x00 Preface The content of this article is relatively simple and simple to record. 0…… -
Interface and polymorphism in java learning
0x00 Preface In the previous articles, we talked about encapsulation and inheritance. In this article, let's talk abou…… -
Introduction to spring MVC for java learning
Introduction to spring MVC for java learning 0x00 Preface The two frameworks of SSM, mybatis and spring, were written …… -
Object oriented java learning
0x00 Preface I talked about some basic syntax of Java. Here is the core idea of Java, object-oriented. 0x01 object ori…… -
Java learning JSP
Java learning JSP 0x00 Preface In fact, there is not much about JSP. Let's simply record the conceptual content of JSP…… -
Introduction to mybatis framework for java learning
Introduction to mybatis framework for java learning 0x00 Preface The previous article uses JDBC to connect the databas…… -
Java crawling prophet forum articles
Java crawling prophet forum articles 0x00 Preface The last article wrote some crawler code. Here is a complete crawler…… -
Java audit SSRF
Java audit SSRF 0x00 Preface This article will record the audit learning related content of Java SSRF. 0x01 SSRF vulne…… -
File operation vulnerability of Java audit
File operation vulnerability of Java audit 0x00 Preface This article intends to describe some file operation vulnerabi…… -
Jdk7u21 chain analysis of Java Security
Jdk7u21 chain analysis of Java Security First article: analysis of the jdk7u21 chain of Java Security 0x00 Preface In …… -
Analysis of common collections 6 for Java Security
Analysis of common collections 6 for Java Security 0x00 Preface In fact, the analysis of several chains are roughly th…… -
Common collections1 analysis pre knowledge of Java Security
Common collections1 analysis pre knowledge of Java Security 0x00 Preface The utilization chain of common collections, …… -
Inheritance and abstraction of java learning
Inheritance and abstraction of java learning 0x00 Preface The three characteristics of object-oriented are encapsulati…… -
Integration of SSM framework for java learning
Integration of SSM framework for java learning 0x00 Preface The spring, spring MVC and mybatis frameworks that we lear…… -
Multithreading in java learning
0x00 Preface In a tool development, if the tool needs to continuously perform the same action or request, using single…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
File IO stream of java learning
File IO stream of java learning 0x00 Preface In some normal development, it is common to let the script run to store s…… -
Swing GUI programming for java learning
Swing GUI programming for java learning 0x00 Preface The previously used GUI is implemented based on AWT, but AWT is r…… -
Analysis of Shiro 550 deserialization vulnerability in Java Security
Analysis of Shiro 550 deserialization vulnerability in Java Security Starting from security guest: analysis of Shiro 5…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Dynamic agent for java learning
Dynamic agent for java learning 0x00 Preface In the later study of vulnerability research, we must know several knowle……