DNS hijacking | Hacking techniques | Grade manipulation | Website intrusion
5.39K subscribers
91 photos
5 links
Download Telegram
The NavigationLink type has added new data-driven capabilities. A brand new initializer allows us to create a link bound to a specific value. This is a refactoring of a previous example using the new data-driven navigation API. We use the new value-based navigation links to guide users through the app. See how we associate each item in the list with a specific value. Remember, the value must conform to the Hashable protocol. Next, we use the navigationDestination view modifier to define the destination view for a specific value. In the current example, we have only one type of destination, but you can have any number of destinations by applying multiple navigationDestination view modifiers.

Swift with Majid
Master NavigationStack in SwiftUI. Navigation patterns.
SwiftUI is a declarative data-driven framework that allows us to build complex user interfaces.
Taiwan shopping site penetration of backend management permissions
Penetration data extraction contact
This PIN code can also be found in the HostAP configuration and can be located through information leakage in the router's HTTP API.
Station infiltration, including well-known sites such as banking sites, social sites, online shopping sites, BC gambling sites, financial sites, stock sites, investor sites, etc. Small, medium, and large sites can consult hacker technology groups.
-p web port setting (default port 80)

-m multithreaded operation

-t timeout

-r set scan start directory

-ssl whether to use ssl for connection
Some uses of Ettercap require the gtk+ programming environment (not completely necessary), so make sure your Ubuntu system is configured with the gtk+ programming environment.

If the gtk+ programming environment is not configured, enter sudo apt-get install libgtk-3-dev in the terminal.
sqlmap is a very powerful open-source automated SQL injection tool that can be used to detect and exploit SQL injection vulnerabilities. It is developed in Python, so it requires a Python environment to run.

Test environment: Ubuntu 16.04
Looks like it has many features, so I thought getting a shell was guaranteed. But after a bunch of operations, both upload points were whitelisted, and after all sorts of messing around, I still couldn't get the shell. With no other options, I even posted on Tusi asking for the source code...

I didn't get the source code either, but I found this set of comic source code on an online source code site, so I decisively downloaded it for auditing.
Find Website Management - Theme Management - Theme Installation (then select the theme compressed package you added the shell to for upload [aru_3])
After successful installation, the shell can be used. The address is:
After logging in, you can upload a war file to get its webshell and control this machine! Of course, you can collect a large amount of useful information on hosts where you have already obtained permissions! It's best to obtain some credential information, which can be reused later.
You can directly click the <View> button above the vulnerability template column to enter the vulnerability details page of the template. This will display each vulnerability's [Vulnerability Name], [CVE Number], [CNNVD Number], [Vulnerability Type], and [Risk Level].
It supports specific vulnerability searches through CVE/CNNVD/vulnerability numbers and also supports fuzzy search.
After manually testing with SQLMap, we found a time-based injection vulnerability in the backend. However, due to the unstable accessibility of foreign sites, we decided to abandon the attempt. Later, after gaining shell access, we discovered that the user was not root and had very limited permissions. Fortunately, we didn't waste time on this.

Hacking, penetration, web crawling, DDOS, hijacking
Breaking into domestic and foreign websites, script cracking and customization, order modification, data alteration, privilege escalation, etc.
💯💯 On the plane ✈️💯💯 Contact:
♥️♥️@feijinhsa♥️♥️