current location:Home > Technical Articles > Operation and Maintenance > Safety

  • How to analyze Haproxy port reuse
    How to analyze Haproxy port reuse
    Author of this article: Spark (Ms08067 intranet security team member) 1. Overview Haproxy is a high-performance load balancing proxy software developed in C language. It provides tcp and http application proxies. It is free, fast and reliable. Similar to frp, it can be run using a configuration file + a server. Advantages: Large-scale business field applications widely support four-layer proxies (transport layer) and seven-layer proxies (application layer). Support ACL (access control list), and can flexibly configure routing windows. It can be run after compiling with cygwin (can be cross-platform) access control list (AccessControlLists, ACL) is a list of commands applied to the router interface. These command lists
    Safety 1829 2023-05-29 09:25:41
  • Example analysis of Thin Provision
    Example analysis of Thin Provision
    Thin provisioning (ThinProvision), sometimes called "oversubscription", is an important emerging storage technology. This article introduces thin provisioning, its working principle, usage limitations, and some usage suggestions. If the storage space used by the application is full, it will crash. Therefore, storage administrators often allocate more storage capacity than the application actually requires to avoid any potential application failure. This approach provides "headroom" for future growth and reduces the risk of application failure. But it requires more physical disk capacity than actual, causing waste. Thin provisioning software eliminates the need to allocate unused disk capacity in advance, resulting in higher overall storage utilization.
    Safety 1353 2023-05-28 20:47:29
  • What does shellcode mean?
    What does shellcode mean?
    1. Introduction to pre-knowledge points of shellcode programming. What is shellcode? The essence of shellcode is actually a piece of assembly code that can run independently. It does not have any file structure, it does not rely on any compilation environment, and cannot be double-clicked to run like an exe. You can refer to Baidu for a detailed introduction to shellcode, so I won’t go into details here. Why write your own shellcode? Because I have done a lot of penetration in the past six months, the shellcodes used are all generated by CS or MSF, but the shellcode automatically generated by the tool is dead after all, and there is no way to expand the function by yourself. Another example is that you know a new vulnerability, but the vulnerability is Using POC can only pop up a calculation
    Safety 3237 2023-05-28 15:01:59
  • What to do if HP APA mode setting causes packet loss for dual network cards
    What to do if HP APA mode setting causes packet loss for dual network cards
    1. Problem Description A user reported that HP minicomputer system access is very slow. 2. Alarm information Log in to your host scp3 through dial-up and check the relevant logs, including: syslog, eventlog, networklog, bdf, top, glance, ts99, crash, but no alarm or error was found. 3. Analyze the cause of the problem. This phenomenon has occurred on this host many times a year ago. After a comprehensive inspection of the host and network, no abnormalities were found. After restarting the host, the fault was restored. This time log in to your host scp3 through dial-up again and check the relevant logs, including: syslog, eventlog, networklog, bdf, top, g
    Safety 1443 2023-05-28 14:16:15
  • How to configure H3C_ ComwareV7_L2TP
    How to configure H3C_ ComwareV7_L2TP
    1. Check the device version FW_1030]disversionH3CComwareSoftware,Version7.1.054,Ess9308P05Copyright(c)2004-2015HangzhouH3CTech.Co.,Ltd.Allrightsreserved.2.Configure L2TPl2tpenable//Globally enable L2TPl2tp-group1modelnsallowl2tpvirtual-template1undotunnelau thentication//Do not enable tunnel authentication ippooll2tp17
    Safety 1327 2023-05-28 13:58:12
  • How to implement firewall NAT control analysis
    How to implement firewall NAT control analysis
    one. NAT classification NATNo-pat: Similar to Cisco's dynamic conversion, it only converts the source IP address and network address, but does not convert the port. It is a many-to-many conversion and cannot save public IP addresses. It uses less NAPT: (Network address and port translation ) Similar to Cisco's PAT conversion, NAPT converts the source address of the message and converts the source port. The outbound interface address: (Easy-IP) conversion method is simple, the same as NAPT, that is, converts the source address and source port. It is a multi-purpose method. One-to-one conversion SmartNAT (intelligent conversion): NAPT conversion by reserving a public network address Triplet NAT: a conversion related to the source IP address, source du port and protocol type Two, black hole routing source address conversion
    Safety 1563 2023-05-28 13:04:13
  • What are the 8 rules for good APP testing?
    What are the 8 rules for good APP testing?
    When it comes to software testing, testers definitely think of checking files, functionality, APIs, performance and determining if the software is safe, among other things about a specific part of the software. But for mobile testing, testers have to consider mobile-related features based on user mobile usage patterns. The following mainly talks about mobile testing. For the mobile phone project (application software) of the product, it is mainly system testing. For system testing of mobile application software APP, we usually carry out it from the following perspectives: functional module testing, compatibility testing, installation and uninstallation testing, software update testing, performance testing, user experience testing, cross-event testing, user interface Testing etc. As a software quality assurance manager, I focus on iPhone, Android,
    Safety 1079 2023-05-28 12:48:29
  • How to export libraries needed by the project in Python
    How to export libraries needed by the project in Python
    Enter the command: pipfreeze>requirements.txt. The content of the file generated is as follows: asgiref==3.4.0Django==3.2.4django-debug-toolbar==3.2.1django-redis==5.0.0Pillow==8.3.0PyMySQL==1.0. 2pytz==2021.1redis==3.5.3sqlparse==0.4.1typing-extensions==3.10.0.0
    Safety 1593 2023-05-28 11:16:36
  • How to get SickOS 1.2 Flag
    How to get SickOS 1.2 Flag
    The experimental environment is as follows: Basic idea: NetworkScanning (network scanning Netdiscover, Nmap) Directorybrute-force (website directory scanning dirb) FindHTTPOptions:PUT (find HTTP options curl) GeneratePHPBackdoor (generate php backdoor Msfvenom) Uploadandexecuteabackdoor (upload php backdoor) Reverseconnection (Metasploit) PrivilegeEscalation(cronjob)Importpyt
    Safety 1620 2023-05-27 22:40:12
  • Example analysis of MSSQL backdoor from Winnti hacker group
    Example analysis of MSSQL backdoor from Winnti hacker group
    For some time, ESET researchers have been tracking the activities of Winnti, a group that has been active since 2012 and has targeted the video game and software industry supply chains. Recently, a previously undocumented backdoor was discovered that targets Microsoft SQL (MSSQL). This backdoor bears many similarities to the PortReuse backdoor, another tool used by WinntiGroup and first documented in October 2019. This year, a new backdoor sample, skip-2.0, was detected. The author is a member of the winnti organization. This backdoor targets MSSQL Server 11 and 12 and allows attackers to use magi
    Safety 1440 2023-05-27 21:04:30
  • How to use vulnerability scanning software OpenVas
    How to use vulnerability scanning software OpenVas
    Simply put, openvas is an open source vulnerability detection and scanning software openvas-manager (openvasmd) 9390 openvas-scanner (openvassd) 9391 Greenbonesecurity assistant (gsad) 9392 In fact, the installation is very simple, but it took me a long time to do it for the first time. Mainly the installation script and detection script http://www.openvas.org/install-packages.html This is the download address, the initial state of package installation, close iptables and selinux#wget-q-O-http:
    Safety 1272 2023-05-27 19:22:32
  • Example analysis of using ZoomEye to find APT attacks
    Example analysis of using ZoomEye to find APT attacks
    The data online on ZoomEye is in overwrite and update mode, which means that if the data is not scanned in the second scan, the updated data will not be overwritten. The data on ZoomEye will retain the banner data obtained in the first scan. This mechanism is here In fact, there is a good scene fit in the traceability of this kind of malicious attack: the download servers used by malicious attacks such as Botnet, APT and other attacks are usually directly deactivated and discarded after being discovered. Of course, some are hacked targets, and they are also very violent. Go offline directly! Therefore, many attack sites are likely to be cached online by ZoomEye. Of course, with the data provided in the ZoomEye history api, you can query the number of banners obtained by each scan regardless of whether you cover it or not.
    Safety 1398 2023-05-27 19:19:11
  • How to implement APT28 sample analysis
    How to implement APT28 sample analysis
    1 Background The Fantasy Bear Organization, also known as APT28, is a Russian espionage organization. In 2019, the Fantasy Bear Organization’s activities were extremely frequent. From the think tank intrusion incident at the beginning of this year to the subsequent large and small attacks, APT28 has been involved. Fantasy Bear has a long history. In 2016, the organization became world-famous for hacking into the emails of the Democratic National Committee in an attempt to influence the US presidential election. Spear phishing and 0Day attacks are the usual attack methods of this organization, and the tools they use are updated very quickly. In 2015, no less than 6 different 0Day vulnerabilities were used. This is a considerable project that requires a large number of security personnel to find a large number of unknown vulnerabilities in commonly used software. Book
    Safety 1675 2023-05-27 15:53:53
  • How to replace Cognito with Authing and AWS JWT Authorizer
    How to replace Cognito with Authing and AWS JWT Authorizer
    Use Authing's OIDCProvider as the authenticator of AWSAPIGateway to protect Lambda functions. There is no need to write any authentication code, just configure it on both sides. It also demonstrated Authing's ability to issue OIDCIdToken for custom fields based on different contexts. Authing console configuration Register an Authing account and visit https://console.authing.cn. Register an account and log in to the Authing console. Create a user pool. Create an application. Find the application you just created in the application list and click Configure. Select RS256 for the signature algorithm below. create
    Safety 791 2023-05-27 13:41:15
  • How to analyze problems with sqlmap
    How to analyze problems with sqlmap
    0x00 Overview Recently, I encountered a strange phenomenon when using sqlmap injection testing. The higher version of sqlmap cannot detect the injection, but the lower version can detect the injection, and the data can be run out, which is not a false positive. After comparative testing and viewing the sqlmap source code, Found two small holes. 0x01 scenario reproduction injection point format: json..."whereparams":[{"name":"keyWord","value":"test"}]} Injectable parameters: valuesqlmap command: pythonsqlmap.py-rsqlpk.txt– flush-session-vvsqlmapv1.2.11 cannot inject s
    Safety 1601 2023-05-27 13:07:56

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28