`
security
  • 浏览: 376571 次
  • 来自: www.pgp.org.cn
社区版块
存档分类
最新评论

Hacking getcsp of pheox

 
阅读更多

package com.pheox.jcapi.test;

import com.pheox.jcapi.CoreSignatureJNI;
import com.pheox.jcapi.CoreUtilJNI;
import com.pheox.jcapi.JCAPIJNIException;

public class getcsp {
 
    public static void main(String[] args) {
     
//        String g = "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";

  try {
   System.loadLibrary("JCAPI");
   System.out.println("Load Library Successfully!");
  } catch(UnsatisfiedLinkError e) {

   e.printStackTrace();
  }
  CoreUtilJNI core=new CoreUtilJNI();
  
  String[] mscsp=core.getMSCSP();
  
  for(int i=0;i<mscsp.length;i++)
   System.out.println(mscsp[i]);
  System.out.println("done");
  
  
  String content="1234567890abcdefghij+sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss";
  
  byte[] data = {1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20};
  
  data=content.getBytes();
  
  try
        {
            int[] d= CoreSignatureJNI.hashInit("SHA1");
            CoreSignatureJNI.hashUpdate(d, data);
            byte abyte1[] = CoreSignatureJNI.hashFinal(d);
           
            System.out.println(""+new String(abyte1));
            return;
        }
        catch(JCAPIJNIException jcapijniexception)
        {
         jcapijniexception.printStackTrace();
        }
  
  
  
  
  
 }

}

分享到:
评论

相关推荐

    Hacking Point of Sale(Wiley,2014)

    Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail – from how attacks are structured to the structure of magnetic ...

    Hacking - The Art of Exploitation, 2nd Ed

    The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem ...

    Hacking - The Art of Exploitation

    Hacking is the art of creating problem solving, whether used to find an unconventional solution to a difficult problem or to exploit holes in sloppy programming. Many people call themselves hackers, ...

    Hacking: The Art of Exploitation, the 2nd edition

    在《Hacking: The Art of Exploitation, 第二版》这本书中,作者Jon Erickson深入探讨了黑客这一概念的本质,即解决问题的艺术。通常情况下,“黑客”这个词往往被误解为非法入侵计算机系统的犯罪分子,但实际上,...

    Beginning Ethical Hacking with Python(Apress,2016)

    Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts ...

    Hacking The Art Of Exploitation 2nd Edition

    Hacking The Art Of Exploitation 2nd Edition

    hacking the art of exploitation 2nd edition

    《黑客的艺术:漏洞利用技术深度剖析(第2版)》是由J. Erickson于2008年编著的一本专业信息安全书籍。这本书是黑客艺术系列的重要作品,它深入浅出地介绍了黑客技术的核心——漏洞利用。以下是该书涉及的一些关键...

    Web Hacking 101: How to Make Money Hacking Ethically

    With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn’t always easy...

    Hacking_The_Art_of_Exploitation

    This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own ...

    Hacking - The Art of Exploitation(2nd)高清无水印版

    《黑客:利用的艺术》(第二版)是一本深入探讨黑客技术与计算机安全的书籍,英文原版名为"Hacking: The Art of Exploitation, 2nd Edition",由作者Erickson撰写。这本书旨在帮助读者理解黑客攻击的本质,并提供了...

    Hacking The Art of Exploitation 2nd Edition

    Hacking The Art of Exploitation 2nd Edition from No Starch Press

    Syngress - The Basics of Web Hacking - Tools and Techniques to Attack the Web

    Syngress - The Basics of Web Hacking - Tools and Techniques to Attack the Web 这份文档是应该算是入门节安全性测试

    hacking hacking hacking

    - **书名**:《Hacking: The Art of Exploitation》第二版 - **作者**:Jon Erickson - **出版社**:No Starch Press - **出版日期**:2008年1月15日 - **ISBN-13**:978-1-59-327144-2 - **页数**:480页 ### 二、...

    Hacking_ A 101 Hacking Guide

    Hacking_ A 101 Hacking Guide,hack参考书,值的一看。

    history and impact of hacking

    history and impact of hacking

    Hacking: The Art of Exploitation

    文字版Hacking: The Art of Exploitation。包含书签,非常完美

    Hacking.The.Art.of.Exploitation,.2nd.Edition

    《黑客:漏洞利用的艺术》第二版是一本深入探讨网络安全与黑客技术的经典著作。作者通过详细的讲解和实践案例,引领读者走进黑客的世界,了解其背后的原理和技术。这本书是为那些对网络安全有浓厚兴趣,并希望深入...

Global site tag (gtag.js) - Google Analytics