当前位置:网站首页>6K6w5LiA5qyh5pS75Ye75YiG5p6Q
6K6w5LiA5qyh5pS75Ye75YiG5p6Q
2022-07-28 22:30:00 【sec0nd_】
List of articles
Preface
In order to help everyone understand and master knowledge , Fantasy companies and hackers , The following stories are fictional , any similarity , Purely coincidental .
Honeypot perception
One day I was fishing in the office , Suddenly, I found a scanning perception message on the honeypot platform (192.168.10.78 The host scans other hosts in the same network segment ), I was shocked , Normal people will not know the address of the honeypot , I won't scan the port of the honeypot .
Log analysis
After talking to the master, I felt more and more wrong , immediately 192.168.10.78 The host is offline isolated , Then get up and go with the master to see the log record of this machine .
The log records found are roughly as follows :
nginx See the master's article for the log format of :https://blog.csdn.net/LJFPHP/article/details/78484889
You can roughly read the following information :
client ip:192.168.10.5
Request mode :GET
Request path :/xxx/xxxxxxxx?
Return code :200
Return packet bytes :23143
X_Forwarded-For IP Address :1.2.3.4
The guess of this address is that the hacker is real ip
waf Interception record analysis
See the customer ip yes 192.168.10.5, Guess this is a reverse agent , The hacker hit the machine of reverse proxy , Mapped by reverse proxy to 192.168.10.78 On the machine .
Then go to waf It looks up 192.168.10.5 The record of being attacked , The following example is a waf Interface ( Fictitious ), There are about 2000 records , Various attack methods have been tried ……
The attacker ip And indeed 1.2.3.4

Reverse proxy article :https://blog.csdn.net/zhanjie2009/article/details/122763758
Attack chain analysis
Hackers found an external service website of the company , Test it , tried 2k After that, I called in according to a loophole recurrence article , Reached the intranet 192.168.10.78 On the machine , Then raise the right 、 Intranet traverse 、 Domain control
Unfortunately, I accidentally swept the honeypot during the traverse of the intranet , Cause to be found
边栏推荐
- SQL注入 Less34(POST型宽字节注入+布尔盲注)
- HCIP(11)
- Win11 how to open software notification
- Sword finger offer II 066. sum of words (medium prefix tree design string)
- 105. Construct binary tree from preorder and inorder traversal sequence (medium binary tree DFS hash table binary tree)
- HCIP(15)
- Sword finger offer II 063. replacement word (medium prefix tree string)
- SQL注入 Less42(POST型堆叠注入)
- LeetCode刷题系列之-多数之和类型
- lotus 1.16.0 延长扇区过期时间
猜你喜欢

Day3 classification management of Ruiji takeout project

Netease Yunxin 2022q2 product supply station, come and get your product supply plan!

PaddleNLP基于ERNIR3.0文本分类:WOS数据集为例(层次分类)

If you want to grow rapidly, you must first experience a major blow!

SQL注入 Less42(POST型堆叠注入)

HCIP(11)

JMeter installs third-party plug-ins plugins Manager
![[Ruiji takeout project] Day5 - Chapter 6 mobile verification code login](/img/53/c578e0d1428ea569fb412a20019924.png)
[Ruiji takeout project] Day5 - Chapter 6 mobile verification code login

HCIP(12)

ATT&CK初步了解
随机推荐
105. Construct binary tree from preorder and inorder traversal sequence (medium binary tree DFS hash table binary tree)
[leetcode] maximum depth of binary tree
MOV格式是不是静态图像文件格式
Sword finger offer II 064. magic Dictionary (medium dictionary tree string design)
HCIP(9)
SQL注入 Less38(堆叠注入)
Establishment of Ruiji takeout development environment
静态路由和缺省路由实验
lotus 1.16.0 延长扇区过期时间
Closure, prototype and original link
What are the main functions and uses of LCR tester
软考网络工程师
Learn kotlin - extension function
Use webworker to perform background tasks
SQL injection less34 (post wide byte injection + Boolean blind injection)
微信小程序剪切图片的功能
SSH password free login
[binary tree] pseudo palindrome path in binary tree
NPM switch Taobao source (NPM source)
【CVPR 2021】Cylinder3D:用于LiDAR点云分割的圆柱体非对称3D卷积网络