current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- Example analysis of TCP three-way handshake to establish a link and four-way wave to break the link
- One step at a time. First, let’s briefly introduce the TCP protocol. TCP (TransmissionControlProtocol) is a connection-oriented, reliable, byte stream-based transport layer protocol. It's complicated, but it's a basic skill that both programmers and operation and maintenance personnel must know. Object-oriented - The two parties need to establish a connection in advance before communicating. This is like making a phone call in real life. The phone must be dialed before communication can occur. Reliable - There are many rules in the TCP protocol to ensure the reliability of communication links, including application data separation, retransmission mechanism, header and data verification, sorting of received data, and then handing it over to the application layer, The receiving end will discard duplicate data and can perform flow control.
- Safety 971 2023-05-11 22:34:24
-
- What are JavaScript single threads and task queues?
- 1. Why is JavaScript designed to be single-threaded? A major feature of the JavaScript language is that it is single-threaded. In other words, it can only do one thing at a time. for(varj=0;j
- Safety 1138 2023-05-11 22:31:13
-
- How to perform static analysis in Android
- Android reverse engineering is the process of decompilation. Because the results of Android forward compilation cannot be understood, the premise of static analysis in CTF is to decompile the appearing files to a layer of source code that we can understand and perform static analysis. 0X01 Basic description: The logic code of the Android application is developed by Java, so the first layer is the Java code. The Java virtual machine JVM runs the class file compiled by the Java file. The Android virtual machine Dalvik is not generated after executing the Java virtual machine JVM compilation. class file, but execute and re-integrate the dex file generated after packaging. The smali file APK after compilation: is the Andro after compilation.
- Safety 1197 2023-05-11 22:28:12
-
- How to use PowerView script
- Traditional internal reconnaissance testing uses built-in Windows commands such as netview, netuser, etc. to obtain host and domain information. Because the blue team can monitor these commands and trigger alerts. So use other methods, such as PowerShell and WMI, to avoid detection during environment exploration. PowerViewPowerView is a PowerShell script developed by WillSchroeder and is part of the PowerSploit framework and Empire. The script relies only on PowerShell and WMI (Windows Management Tools) for querying. PowerVie from an existing meterpreter session
- Safety 1485 2023-05-11 21:49:11
-
- What are the basic knowledge points of computer network
- Ⅰ. Division of network levels In order to establish computer networks on a larger scale, the International Organization for Standardization (ISO) proposed the "Open System Internet Reference Model" in 1978, which is the famous OSI (Open System Interconnection) model. In addition to the standard OSI seven-layer model, the common network layer divisions include the TCP/IP four-layer protocol. The corresponding relationship between them is as follows: Ⅱ. OSI seven-layer network model, whether it is the OSI seven-layer model or TCP/IP In the four-layer model, each layer must have its own exclusive protocol to complete its own corresponding work and communicate between the upper and lower layers. Let’s start with the detailed description of OSI’s seven-layer model: (1) Physical layer The physical layer is the most basic network structure.
- Safety 1744 2023-05-11 21:49:04
-
- How to troubleshoot SolarWinds supply chain APT attacks with one click
- The SolarWinds supply chain APT attack was revealed. Recently, the SolarWinds supply chain APT attack has attracted the attention of the industry. SolarWinds officially announced that there is malicious code with highly complex backdoor behavior in the affected versions of SolarWinds Orion Platform from 2019.4HF5 to 2020.2.1 and its related patch packages. It is reported that the backdoor contains the ability to transfer files, execute files, analyze the system, restart the machine, and disable system services, thus putting users who have installed the contaminated package at risk of data leakage. Since the module has a SolarWinds digital signature certificate, it has a whitelist effect against anti-virus software and is highly concealable.
- Safety 1592 2023-05-11 21:31:04
-
- How to solve dde in word
- In word, use the shortcut key ctrl+f9 to open it. After opening, there are curly brackets. You can enter system commands inside to execute them. You can do a lot of things with powershell. Phenomenon (1) Phenomenon (2) Successful execution Solution (1): In the word options, check the box to display field codes instead of field values. This way you can see the field code directly in the open document. Solution (2): Turn off automatic update links Solution (3): Completely disable the registry From: https://gist.github.com/wdormann/732bb88d9b5dd5a66c9f1e1498f31a1bDisableDDEAUTOforOutlook,Word
- Safety 1829 2023-05-11 21:25:14
-
- How to escalate privileges by injecting soap into a sql2008 server and combining it with msf
- In the actual successful penetration process, the exploitation of vulnerabilities is the integration of multiple technologies and the practice of the latest technology. This penetration uses sqlmap to confirm the injection point, obtains the webshell through sqlmap, and combines msf to elevate the rights of ms16-075. Finally, the system permissions of the target server were obtained. This article is a new extension of vulnerability exploitation. When conventional Nday privilege escalation fails, a classic case of ms16-075 successful privilege escalation is combined with msf. 1.1.1 Scan for soap injection vulnerabilities 1. Use webservicesscanner in awvs to scan for vulnerabilities. Open awvs and select webservicesscanner to scan for vulnerabilities.
- Safety 1892 2023-05-11 21:25:04
-
- How to use hyphens in javascript
- Note 1. The range of matching characters using a hyphen (-) is not limited to letters. Can also match a range of numbers. 2. A series of letters and numbers can be combined in a single character set. In the = character set, the hyphen (-) defines the range of characters to match. The example requires matching all letters in the string quoteSample. Note: Be sure to match both uppercase and lowercase letters. letquoteSample="Thequickbrownfoxjumpsoverthelazydog.";letalphabetRegex=/change/;//Modify this line letresult=alphabetRegex;/
- Safety 1515 2023-05-11 20:55:04
-
- What is the core defense mechanism of Web Application?
- To protect against malicious input, applications implement a number of security mechanisms that are conceptually similar. These security mechanisms consist of the following aspects: 1. Processing the data and functions of users accessing web applications (preventing unauthorized access) 2. Processing data input by users to web application functions (preventing the construction of malicious data) 3. Responding to attacks (Handling unexpected errors, automatically blocking obvious attacks, automatically sending alerts to administrators, and maintaining program access logs) 4. Management and maintenance of application processing access. Usually there are different types of users for an application, such as ordinary users, logins Authenticate users, administrators. Different permissions are given to different user web applications so that they can only access different data and functions. w
- Safety 974 2023-05-11 20:46:19
-
- How are wide area network, metropolitan area network and local area network divided?
- WAN, MAN and LAN are divided based on "coverage". The coverage of LAN is generally within a few kilometers. Its characteristics such as convenient installation, cost saving, and convenient expansion make it widely used in various offices. A wide area network is a long-distance network that connects computer communications in local area networks or metropolitan area networks in different areas, covering a range from dozens to thousands of kilometers. A metropolitan area network is a computer communication network established within a city. Computer networks are divided into wide area networks, metropolitan area networks and local area networks. The main basis for their division is: the function (coverage) scope of the network. Computer network refers to the connection of multiple computers and their external devices with independent functions in different geographical locations through communication lines. In the network operating system, network management software and network communication
- Safety 4927 2023-05-11 20:19:18
-
- CNNVD report example analysis on Apache Struts2 S2-057 security vulnerability
- Currently, Apache has officially released a version update to fix the vulnerability. It is recommended that users confirm the Apache Struts product version in time. If affected, please take timely patching measures. 1. Vulnerability introduction ApacheStruts2 is a sub-project of the Jakarta project under the American Apache Software Foundation. It is a Web application framework based on MVC design. On August 22, 2018, Apache officially released the Apache Struts2S2-057 security vulnerability (CNNVD-201808-740, CVE-2018-11776). When enabling the pan-namespace function in the struts2 development framework
- Safety 1016 2023-05-11 20:04:12
-
- How Turla uses watering hole attacks to plant backdoors
- Target website Turla compromised at least four Armenian websites, including two government websites. Therefore, targets may include government officials and politicians. The following websites were compromised: armconsul[.]ru: Consular Section of the Embassy of Armenia in Russia mnp.nkr[.]am: Ministry of Conservation and Natural Resources of the Republic of Artsakh aiisa[.]am: Armenian Institute of International and Security Affairs adgf[. ]am: These Armenian Deposit Guarantee Fund websites have been compromised since at least the beginning of 2019. Turla uses illegal access to insert malicious JavaScript code into websites. For example, for mnp.nkr[.]am, in jquery-mi
- Safety 1546 2023-05-11 20:04:04
-
- How to analyze the objects and thresholds monitored by nrpe
- nrpe monitoring objects and thresholds: Monitoring objects Monitoring thresholds Host resources Host survival: check_ping-w3000.0, 80%-c5000.0, 100%-p5 (3000 milliseconds response time, if the packet loss rate exceeds 80%, a warning will be reported, 5000 milliseconds Within the response time, if the packet loss rate exceeds 100%, it will be reported as critical, and a total of 5 packets will be sent) Login user: check_user-w5-c10 (w means warning, c means critical) System load: check_load-w15,10,5-c30,25 ,20 (1 minute, 5 minutes, 15 minutes is a warning or critical if it is greater than the corresponding number of waiting processes) Disk usage: check_disk-w20%-c10%-p
- Safety 1331 2023-05-11 19:31:04
-
- How to analyze the specific differences between the two addresses 224.0.0.5 and 224.0.0.6 in OSPF
- 224.0.0.6 refers to the multicast receiving address of DR and BDR in a multi-access network, and 224.0.0.5 refers to all interfaces running the OSPF process in any network that belong to this group, so all multicast data of 224.0.0.5 are received. Bag. Focus on understanding what kind of multicast data packets belong to a certain group and what kind of multicast data packets are received. For example, DR/BDR belongs to the group (Group) with the multicast address 224.0.0.6, so it receives multicast data packets with the destination address 224.0.0.6. You can understand why multi-channel access can prevent excessive processing of information by setting DR/BDR (because the receivers belonging to a certain group (referring to the OSPF interface) will only be stripped to the second layer without further processing, thus eliminating the need for very
- Safety 2398 2023-05-11 19:04:18