Chrome Extension: document.querySelector(‘button’).click() is not working on button created on React

I want from extension to click the button but button click event is not working as if i use JS DOM Methods:

getElementsByClassName('button')[0].click(); // Not working //or document.querySelector('button').click(); // Not working   

The problem is that button is created either on “React.js“, so i think that causes not to happen the button click event.

Please suggest me any solution for this problem.

Thanks.

Mac Spoofing Not working on MacOS

I’ve recently been trying to spoof my mac address and I tried every way but it still doesn’t work. I’ve tried to change it from the terminal and other applications. Although it says it was successful on the terminal and says it has changed, It stays the same and yes I haven’t restarted my computer. Does anyone know why this is happening?

DNS Spoof Not Working

So I was trying to use DNS SPOOFING in Man in the Middle Attached. But it didn’t work. However, it did work for ‘www.gmail.com’ once. I checked, and I could see that I was actually offline. Now I checked the reason. And it was that the original URL isn’t really ‘gmail.com’. Its ‘mail.google.com’. And so there was no DNS cache.

So, if there was a way I could block website ‘mail.google.com’ for the victim during the MITM attack, the DNS SPOOFING will work in case the victim enters ‘gmail.com’. Can you suggest any such way to block any website without configuring router (assuming its a mobile hotspot)?

Router infected; Factory reset not working

Recently, I was being redirected (occasionally, not every time) by “ilkmawgod.site” (no information on google) to malicious webpages. I scanned my every thing using quick heal, but it didn’t find anything. I noticed this was happening with all the devices at home connected to the home router. Further, when I used mobile data there was no redirect. I figured out that my router must be infected. I factory-reset my router, but now I am being redirected by “netpatas.com” (a redirecting virus according to google) to malicious ads (on all devices connected to the home router, occasionally). What should I do? Is there something that I missed while factory-resetting my router? Can I clean this thing off my router or I have to buy a new one?

Datapump not working with parallel and flag %U? (AIX)

Some minutes ago I’ve tried to do a export but I get the following erro (AIX system):

Additional information: 3 ORA-31693: Table data object "XX"."TABLE_NAME" failed to load/unload and is being skipped due to error: ORA-31617: unable to open dump file "/dir/back/dump/dump_xx_04.dmp" for write ORA-19505: failed to identify file "/dir/back/dump/dump_xx_04.dmp" ORA-27037: unable to obtain file status IBM AIX RISC System/6000 Error: 2: No such file or directory 

But without the %U in dumpfile name it worked..

What can be the reason? I’ve seen it in some blog that to use just parallel=N without %U actually become the export slower? that is true?

Paged/Pagination Not Working on URL Rewrite Rule

add_action('init', 'do_rewrite'); function do_rewrite(){     add_rewrite_rule('^shop/men/?$  ', 'index.php?post_type=product&product_tag=men', 'top');     add_rewrite_rule('^shop/men/page/([0-9]{1,})/?$  ', 'index.php?post_type=product&product_tag=men&paged=$  matches[1]', 'top');     flush_rewrite_rules(); } 

The first rewrite rule works great. https://www.example.com/shop/men/ goes directly to https://www.example.com/shop/?post_type=product&product_tag=men with the post_type and product_tag filtered as expected.

Now, if I go to https://www.example.com/shop/?post_type=product&product_tag=men&paged=2

The query and filters in the url, including the new paged of 2, works as intended.

So I assumed my rewrite rule would work the same. But instead it just goes straight to my 404 Page Not Found Error Page.

When I do go to the link with the paged=2 query in the url, it does do a redirect to https://www.example.com/tag/men/page/2/?post_type=product

So my best guess is that there may be some overlap of some sort causing the issue… but I am not sure where to go from here. How can I get my paginated rewrite rule to work with the url https://www.example.com/shop/men/page/2 .../shop/men/page/3 and so forth in my add_rewrite_rule?

Understanding why this buffer overflow attack isn’t working

I’m doing a buffer overflow challenge, and I can’t understand what exactly I’m doing wrong. Through debugging, I managed to figure out how my input should look like such that I can force the program to return to a function. From gdb I figured if I entered “aaaaaaaaaaaaaaaaaaaaaaaaaaaacdefbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb” I can get the program to return to cdef of 0x66656463. Here’s a sc just in case: enter image description here As you can see, the program managed to go to 0x66656463. Now I the function’s address through gdb and I tried placing this in cdef’s spot in little endian order using pwntools:

payload = "a" * 28 + "\x56\x85\x04\x08" + "b"*47 msg = "-1\n" + payload  io.sendline(msg) 

The reason for the “-1\n” is because the program asks for input twice: the first time I just enter -1 and then the second input I try the exploit. So far, I’m just getting a segfault and the address I want to jump to should be starting a shell for me to exploit. I’m not sure what exactly I’m doing wrong, and any help would be appreciated. If I had to guess it’s that I’m somehow dealing with the two inputs incorrectly (they’re being read via fgets() in C if that matters.)

EDIT: I have the source binary and I tried running it locally. I created the following txt file

-1 aaaaaaaaaaaaaaaaaaaaaaaaaaaaV\x85\x04\x08bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 

and I redirect it in gdb via

run < <(cat input.txt) 

this works the same but whenever I add an escaped hex in place of the cdef, I get a different seg fault at a different address: enter image description here

It looks like if I replace any of the cdef with an escaped hex, I get a segfault at 0x08048726. Is something wrong with passing in the bytes?

ImageContents not working on Wolfram Cloud iOS app

I tried using the experimental ImageContents[] function, introduced in MMA 12, on my PC (using Mathematica) as well as on my iPad (using Wolfram Cloud app). On my PC it worked, but not on Wolfram Cloud. It said that it had to download some 200 MB of data from their servers, just like it did on Mathematica. However after the download nothing happened.

This was the image: https://i.stack.imgur.com/6Fd4n.jpg

And this is the result on my PC: ImageContents results

Does anyone know what is the issue?