current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- How to analyze Haproxy port reuse
- Author of this article: Spark (Ms08067 intranet security team member) 1. Overview Haproxy is a high-performance load balancing proxy software developed in C language. It provides tcp and http application proxies. It is free, fast and reliable. Similar to frp, it can be run using a configuration file + a server. Advantages: Large-scale business field applications widely support four-layer proxies (transport layer) and seven-layer proxies (application layer). Support ACL (access control list), and can flexibly configure routing windows. It can be run after compiling with cygwin (can be cross-platform) access control list (AccessControlLists, ACL) is a list of commands applied to the router interface. These command lists
- Safety 1829 2023-05-29 09:25:41
-
- Example analysis of Thin Provision
- Thin provisioning (ThinProvision), sometimes called "oversubscription", is an important emerging storage technology. This article introduces thin provisioning, its working principle, usage limitations, and some usage suggestions. If the storage space used by the application is full, it will crash. Therefore, storage administrators often allocate more storage capacity than the application actually requires to avoid any potential application failure. This approach provides "headroom" for future growth and reduces the risk of application failure. But it requires more physical disk capacity than actual, causing waste. Thin provisioning software eliminates the need to allocate unused disk capacity in advance, resulting in higher overall storage utilization.
- Safety 1353 2023-05-28 20:47:29
-
- What does shellcode mean?
- 1. Introduction to pre-knowledge points of shellcode programming. What is shellcode? The essence of shellcode is actually a piece of assembly code that can run independently. It does not have any file structure, it does not rely on any compilation environment, and cannot be double-clicked to run like an exe. You can refer to Baidu for a detailed introduction to shellcode, so I won’t go into details here. Why write your own shellcode? Because I have done a lot of penetration in the past six months, the shellcodes used are all generated by CS or MSF, but the shellcode automatically generated by the tool is dead after all, and there is no way to expand the function by yourself. Another example is that you know a new vulnerability, but the vulnerability is Using POC can only pop up a calculation
- Safety 3237 2023-05-28 15:01:59
-
- What to do if HP APA mode setting causes packet loss for dual network cards
- 1. Problem Description A user reported that HP minicomputer system access is very slow. 2. Alarm information Log in to your host scp3 through dial-up and check the relevant logs, including: syslog, eventlog, networklog, bdf, top, glance, ts99, crash, but no alarm or error was found. 3. Analyze the cause of the problem. This phenomenon has occurred on this host many times a year ago. After a comprehensive inspection of the host and network, no abnormalities were found. After restarting the host, the fault was restored. This time log in to your host scp3 through dial-up again and check the relevant logs, including: syslog, eventlog, networklog, bdf, top, g
- Safety 1443 2023-05-28 14:16:15
-
- How to configure H3C_ ComwareV7_L2TP
- 1. Check the device version FW_1030]disversionH3CComwareSoftware,Version7.1.054,Ess9308P05Copyright(c)2004-2015HangzhouH3CTech.Co.,Ltd.Allrightsreserved.2.Configure L2TPl2tpenable//Globally enable L2TPl2tp-group1modelnsallowl2tpvirtual-template1undotunnelau thentication//Do not enable tunnel authentication ippooll2tp17
- Safety 1327 2023-05-28 13:58:12
-
- How to implement firewall NAT control analysis
- one. NAT classification NATNo-pat: Similar to Cisco's dynamic conversion, it only converts the source IP address and network address, but does not convert the port. It is a many-to-many conversion and cannot save public IP addresses. It uses less NAPT: (Network address and port translation ) Similar to Cisco's PAT conversion, NAPT converts the source address of the message and converts the source port. The outbound interface address: (Easy-IP) conversion method is simple, the same as NAPT, that is, converts the source address and source port. It is a multi-purpose method. One-to-one conversion SmartNAT (intelligent conversion): NAPT conversion by reserving a public network address Triplet NAT: a conversion related to the source IP address, source du port and protocol type Two, black hole routing source address conversion
- Safety 1563 2023-05-28 13:04:13
-
- What are the 8 rules for good APP testing?
- When it comes to software testing, testers definitely think of checking files, functionality, APIs, performance and determining if the software is safe, among other things about a specific part of the software. But for mobile testing, testers have to consider mobile-related features based on user mobile usage patterns. The following mainly talks about mobile testing. For the mobile phone project (application software) of the product, it is mainly system testing. For system testing of mobile application software APP, we usually carry out it from the following perspectives: functional module testing, compatibility testing, installation and uninstallation testing, software update testing, performance testing, user experience testing, cross-event testing, user interface Testing etc. As a software quality assurance manager, I focus on iPhone, Android,
- Safety 1079 2023-05-28 12:48:29
-
- How to export libraries needed by the project in Python
- Enter the command: pipfreeze>requirements.txt. The content of the file generated is as follows: asgiref==3.4.0Django==3.2.4django-debug-toolbar==3.2.1django-redis==5.0.0Pillow==8.3.0PyMySQL==1.0. 2pytz==2021.1redis==3.5.3sqlparse==0.4.1typing-extensions==3.10.0.0
- Safety 1593 2023-05-28 11:16:36
-
- How to get SickOS 1.2 Flag
- The experimental environment is as follows: Basic idea: NetworkScanning (network scanning Netdiscover, Nmap) Directorybrute-force (website directory scanning dirb) FindHTTPOptions:PUT (find HTTP options curl) GeneratePHPBackdoor (generate php backdoor Msfvenom) Uploadandexecuteabackdoor (upload php backdoor) Reverseconnection (Metasploit) PrivilegeEscalation(cronjob)Importpyt
- Safety 1620 2023-05-27 22:40:12
-
- Example analysis of MSSQL backdoor from Winnti hacker group
- For some time, ESET researchers have been tracking the activities of Winnti, a group that has been active since 2012 and has targeted the video game and software industry supply chains. Recently, a previously undocumented backdoor was discovered that targets Microsoft SQL (MSSQL). This backdoor bears many similarities to the PortReuse backdoor, another tool used by WinntiGroup and first documented in October 2019. This year, a new backdoor sample, skip-2.0, was detected. The author is a member of the winnti organization. This backdoor targets MSSQL Server 11 and 12 and allows attackers to use magi
- Safety 1440 2023-05-27 21:04:30
-
- How to use vulnerability scanning software OpenVas
- Simply put, openvas is an open source vulnerability detection and scanning software openvas-manager (openvasmd) 9390 openvas-scanner (openvassd) 9391 Greenbonesecurity assistant (gsad) 9392 In fact, the installation is very simple, but it took me a long time to do it for the first time. Mainly the installation script and detection script http://www.openvas.org/install-packages.html This is the download address, the initial state of package installation, close iptables and selinux#wget-q-O-http:
- Safety 1272 2023-05-27 19:22:32
-
- Example analysis of using ZoomEye to find APT attacks
- The data online on ZoomEye is in overwrite and update mode, which means that if the data is not scanned in the second scan, the updated data will not be overwritten. The data on ZoomEye will retain the banner data obtained in the first scan. This mechanism is here In fact, there is a good scene fit in the traceability of this kind of malicious attack: the download servers used by malicious attacks such as Botnet, APT and other attacks are usually directly deactivated and discarded after being discovered. Of course, some are hacked targets, and they are also very violent. Go offline directly! Therefore, many attack sites are likely to be cached online by ZoomEye. Of course, with the data provided in the ZoomEye history api, you can query the number of banners obtained by each scan regardless of whether you cover it or not.
- Safety 1398 2023-05-27 19:19:11
-
- How to implement APT28 sample analysis
- 1 Background The Fantasy Bear Organization, also known as APT28, is a Russian espionage organization. In 2019, the Fantasy Bear Organization’s activities were extremely frequent. From the think tank intrusion incident at the beginning of this year to the subsequent large and small attacks, APT28 has been involved. Fantasy Bear has a long history. In 2016, the organization became world-famous for hacking into the emails of the Democratic National Committee in an attempt to influence the US presidential election. Spear phishing and 0Day attacks are the usual attack methods of this organization, and the tools they use are updated very quickly. In 2015, no less than 6 different 0Day vulnerabilities were used. This is a considerable project that requires a large number of security personnel to find a large number of unknown vulnerabilities in commonly used software. Book
- Safety 1675 2023-05-27 15:53:53
-
- How to replace Cognito with Authing and AWS JWT Authorizer
- Use Authing's OIDCProvider as the authenticator of AWSAPIGateway to protect Lambda functions. There is no need to write any authentication code, just configure it on both sides. It also demonstrated Authing's ability to issue OIDCIdToken for custom fields based on different contexts. Authing console configuration Register an Authing account and visit https://console.authing.cn. Register an account and log in to the Authing console. Create a user pool. Create an application. Find the application you just created in the application list and click Configure. Select RS256 for the signature algorithm below. create
- Safety 791 2023-05-27 13:41:15
-
- How to analyze problems with sqlmap
- 0x00 Overview Recently, I encountered a strange phenomenon when using sqlmap injection testing. The higher version of sqlmap cannot detect the injection, but the lower version can detect the injection, and the data can be run out, which is not a false positive. After comparative testing and viewing the sqlmap source code, Found two small holes. 0x01 scenario reproduction injection point format: json..."whereparams":[{"name":"keyWord","value":"test"}]} Injectable parameters: valuesqlmap command: pythonsqlmap.py-rsqlpk.txt– flush-session-vvsqlmapv1.2.11 cannot inject s
- Safety 1601 2023-05-27 13:07:56