I'm surprised to find out there are very few tutorials for westerners living in Mainland China to bypass the Great Firewall built by CCP. Maybe you come to Mainland China due to multiple reasons, such as academic communication,work or live here. However, popular VPN providers like ExpressVPN,NordVPN and surfshark can't work very well here. The VPN traffic and socks5 proxy traffic has already been precisely detected and blocked by GFW for ages. What is GFW? The Great Firewall (GFW) of China is a nickname for the Chinese government's internet control system, built up for censorship purposes. It blocks or limits access to commonly-used foreign websites and services, such as Google, YouTube, Facebook, Instagram, WhatsApp, and many Western news sites. In simple terms, it works like a big digital wall that decides what people in China can or cannot see online. It's part of a broader effort by the Chinese government to control the flow of information and make sure that the i...
Introduction Recently I started to learn SQL injection, which is the first point ethical hackers should learn after learning the Computer Science basics such as Computer Network. I personally think it is a bit difficult for newbies to get started with SQL injection, and I don't dare to start when it comes to CTF questions, so here I will briefly talk about the points that newbies need to pay attention to. Text Principles When the web application passes SQL statements to the backend database for database operations. If the parameters entered by the user are not strictly filtered, the attacker can construct a special SQL statement, directly input it into the database engine for execution, and obtain or modify the data in the database. Therefore, the essence of the SQL injection vulnerability is to execute the data entered by the user as code. There are two key conditions for SQL injection: the user can control the input content; the web application brings the user input content...