current location:Home > Technical Articles > Operation and Maintenance > Safety

  • How to realize the recurrence of online user login vulnerability in Tongda OA v11.7
    How to realize the recurrence of online user login vulnerability in Tongda OA v11.7
    Tongda OAv11.7 online user login vulnerability reproduces a vulnerability similar to unauthorized access, but the method of utilization is indeed quite special. Visit the vulnerability page to obtain phpsession http://x.x.x.x/mobile/auth_mobi.php?isAvatar=1&uid=1&P_VER=0 to see We have obtained phpsession. At this time, we can access its backend page. However, if the page displays RELOGIN, it means there is a vulnerability but the administrator is not online now, so we need to wait for him to be online. Visit the backend page: http://x.x.x.x/general/ to view the local absolute path
    Safety 1724 2023-06-03 08:13:21
  • Example analysis of Juniper firewall core technology Zone
    Example analysis of Juniper firewall core technology Zone
    Juniper firewall core technology - Zone is divided into three categories: zone1, security zone2, functional zone3, tunnel zone. The following zone is the default zoneNS_ISG2000 of ISG-2000 firewall->getzoneTotal14zonescreatedinvsysRoot-8arepolicyconfigurable.TotalpolicyconfigurablezonesforRootis8.------------- -------------------------------------------------- -
    Safety 1437 2023-06-02 23:43:25
  • Example analysis of Glupteba malware variants
    Example analysis of Glupteba malware variants
    Recently, cyberattacks involving the malware glutteba were discovered. It is an older piece of malware that was seen in an operation called "windigo" and was spread to Windows users via a vulnerability. In 2018, a security firm reported that Glupteba had acted independently of Windigo and moved to a pay-per-install adware service. Glupteba activities have different purposes: providing proxy services, exploiting vulnerabilities for mining activities, etc. After studying recently discovered variants of Glupteba, we discovered two undocumented components outside of Glupteba malware: 1. Browser stealers, which can steal sensitive data from the browser, such as browsing history
    Safety 891 2023-06-02 23:11:57
  • How to perform APT41 Speculoos backdoor analysis
    How to perform APT41 Speculoos backdoor analysis
    On March 25, 2020, FireEye published a report on APT41 global attack activities. This attack campaign occurred between January 20 and March 11, and mainly targeted Citrix, Cisco and Zoho network equipment. The researchers obtained the attack sample 'Speculoos' targeting Citrix devices based on WildFire and AutoFocus data and also identified victims in multiple industries around the world, including North America, South America and Europe. Speculoos is implemented based on FreeBSD, and a total of five samples are identified. The file sizes of all samples are basically the same, and there are minor differences between the sample sets. Speculoos exploits CVE-2019-19781
    Safety 1170 2023-06-02 22:29:33
  • How to use F12 information collection
    How to use F12 information collection
    Information Gathering refers to obtaining as much information about the target site as possible through various methods and using relevant tools. It is the first step in the testing process and is also a very important step. In web testing, information collection is an indispensable part. The quality of information collection determines the effect of post-test to a large extent. Sufficient information collection can often get twice the result with half the effort, and it may also be a factor in later testing. An entrance that plays a key role in ***. This article mainly introduces F12 information collection and related techniques based on actual combat! F12 developer tools are a set of tools that help developers generate and debug web pages, mainly including elements, netwo
    Safety 1612 2023-06-02 22:15:28
  • How to perform CaptureFramework framework analysis
    How to perform CaptureFramework framework analysis
    1. Background Application service monitoring is an important part of the intelligent operation and maintenance system. In the UAV system, the middleware enhancement framework (MOF) probe provides application portrait and performance data collection functions. The data collection function mainly collects four types of data: real-time data, portrait data, call link data generation and thread data analysis data. . In order to achieve real-time data collection, UAVStack designed the CaptureFramework framework to provide unified data capture behavior and the ability to generate capture results. 2. CaptureFramework operating principle 2.1 Key technology description JavaAssistMonitor capture system precap/docap2.2 Architecture description Capture point: Support T
    Safety 1065 2023-06-02 22:01:18
  • How to understand the NETSTAT Flags logo
    How to understand the NETSTAT Flags logo
    Flags: The meaning of multiple different flags: U (routeisup): the route is valid; H (targetisahost): the target is the host rather than the domain; G (usegateway): needs to be forwarded through an external host (gateway) Packet (usually directed to the default gateway); R (reinstateroutefordynamicrouting): When using dynamic routing, the flag to restore routing information; D (dynamically installed by daemonorredirect): has been set as dynamic routing by the service or port function; M (modifiedfromroutingd
    Safety 1279 2023-06-02 21:31:25
  • Analysis of the latest 0day vulnerability examples of Buhtrap hacker group
    Analysis of the latest 0day vulnerability examples of Buhtrap hacker group
    The Buhtrap group has long been known for its targeting of Russian financial institutions and businesses. During our tracking, the group's main backdoors, as well as other tools, were discovered and analyzed. Since the end of 2015, the organization has become a cybercriminal organization with financial interests, and its malware has appeared in Eastern Europe and Central Asia for espionage operations. In June 2019, we first discovered that Buhtrap used 0day attacks. At the same time, we found that Buhtrap used the local privilege escalation vulnerability CVE-2019-1132 during the attack. The local privilege escalation vulnerability in Microsoft Windows exploits an issue caused by NULL pointer dereference in the win32k.sys component. Should
    Safety 911 2023-06-02 21:05:26
  • What is the hardware architecture in industrial firewall architecture and technology?
    What is the hardware architecture in industrial firewall architecture and technology?
    1) Meeting the stability requirements of the industrial environment. From the perspective of meeting the stability requirements of the industrial environment, industrial firewalls need to consider the impact of their own stability on the industrial network from the hardware and software levels. From this perspective, industrial firewalls need to have both software and hardware bypass functions. Once the device is abnormal or restarts, the Bypass function will be activated, and there is no need to worry about the industrial network being disconnected due to problems with the industrial firewall itself. Bypass, as the name suggests, is a bypass protection system, which means that two networks can be physically connected directly without passing through the industrial firewall system through a specific triggering state (power outage or crash). At this time, the industrial firewall will no longer process the data packets in the network. Based on this design, B
    Safety 1833 2023-06-02 20:58:46
  • How to choose a SOAR solution
    How to choose a SOAR solution
    SOAR (Security Orchestration, Automation and Response) is regarded as the iconic solution of the next generation SOC and a key mechanism to improve the efficiency of security operations. As we all know, the focus of next-generation SOC is to improve detection and response capabilities. But the current situation today is that the SOC operation team is overwhelmed, the false alarm rate remains high, and the MTTR (mean response time) performance has been difficult to improve. Therefore, the security industry and enterprise security teams have high hopes for SOAR solutions, expecting to significantly improve SOC efficiency in detecting and responding to threats through the deployment of SOAR. However, Party A companies also need to realize that if implemented incorrectly, SOAR solutions will also bring new challenges. Without proper planning, businesses adopting security automation tools may
    Safety 1553 2023-06-02 20:57:02
  • Example analysis of getshell caused by arbitrary file upload vulnerability and file inclusion vulnerability in Tongda OA front desk
    Example analysis of getshell caused by arbitrary file upload vulnerability and file inclusion vulnerability in Tongda OA front desk
    1. Vulnerability introduction Introduction to Tongda OA: Tongda OA (Office Anywhere Network Intelligent Office System) is a collaborative office automation software independently developed by Beijing Tongda Xinke Technology Co., Ltd. Beijing Tongda Xinke Technology Co., Ltd. is a company specializing in the development and implementation of collaborative management software. A high-tech team whose main business is service and consulting, it is the only state-owned enterprise in the domestic collaborative management software industry and a leading enterprise in China's collaborative management software. Tongda OA provides information management capabilities for many users of different sizes in various industries, including process approval, administrative office, daily affairs, data statistical analysis, instant messaging, mobile office, etc., helping users reduce communication and management costs and improve production and decision-making. efficiency. The system adopts the leading B/S (
    Safety 3660 2023-06-02 20:55:22
  • How to exploit SAP ASE security vulnerability to invade database server
    How to exploit SAP ASE security vulnerability to invade database server
    A series of new critical vulnerabilities exist in SAP's Sybase database software, which could allow an attacker without permission to take complete control of the target database and, in some scenarios, even the underlying operating system. The six security vulnerabilities discovered by cybersecurity firm Trustware exist in Sybase Adaptive Server Enterprise (ASE), a relational database management software for transaction-based applications. The cybersecurity firm said the vulnerabilities, which specifically affect the operating system and the entire platform, were discovered during a security test of the product. CVE-2020-6248 is the most serious vulnerability in CVSS
    Safety 706 2023-06-02 18:43:32
  • How to use the History object in javascript
    How to use the History object in javascript
    length The history.length property stores the number of URLs in the history. Initially, this value is 1. Since the IE10+ browser returns 2 initially, there is a compatibility issue, so this value is not commonly used. Jump methods go(), back() and forward() If the moved position exceeds the boundary of the access history, the above three methods It does not report an error, but fails silently [Note] When using history records, the page is usually loaded from the browser cache instead of re-asking the server to send a new web page. Does not trigger onload to add or modify records. HTML5 adds two new methods to the history object, history.pushState() and
    Safety 1134 2023-06-02 16:55:14
  • How to analyze H3C iMC combined with SNMPv3 protocol to manage equipment from different manufacturers
    How to analyze H3C iMC combined with SNMPv3 protocol to manage equipment from different manufacturers
    Network management software is welcomed by more and more customers, and IT manufacturers are also actively launching their own network management software. As for the use effect and experience, everyone feels it for themselves, and everyone in the IT circle knows it. Based on my recent implementation project, I deployed the iMC operation and maintenance management platform developed by H3C (it is said to be now called "New H3C"), which involves equipment from different manufacturers. I will briefly share it with you. Most network management software manages network devices through the SNMP protocol. So the question is, is SNMP a weird thing? Introduction to SNMP protocol SNMP (Simple Network Management Protocol) is a network management standard protocol in the Internet.
    Safety 1713 2023-06-02 16:19:58
  • Server failure instance analysis
    Server failure instance analysis
    1. There is nothing you can do if something goes wrong. If you work in the IT industry, you have to face failures every day. Everyone is the legendary firefighter, putting out fires everywhere. However, the scope of the fault this time is a bit large, and the host machine cannot be opened. Fortunately, the surveillance system left some evidence. The evidence found that the machine's CPU, memory, and file handles continued to rise with the growth of the business... until monitoring could not collect the information. The terrible thing is that there are a lot of Java processes deployed on these hosts. For no other reason than to save costs, the applications were mixed. When a host exhibits overall anomalies, it can be difficult to find the culprit. Because remote login is over, the irritable operation and maintenance can only restart the machine, and then restart the application. After a long time
    Safety 1284 2023-06-02 15:12:05

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28