当前位置:网站首页>6K6w5LiA5qyh5pS75Ye75YiG5p6Q
6K6w5LiA5qyh5pS75Ye75YiG5p6Q
2022-07-28 22:30:00 【sec0nd_】
List of articles
Preface
In order to help everyone understand and master knowledge , Fantasy companies and hackers , The following stories are fictional , any similarity , Purely coincidental .
Honeypot perception
One day I was fishing in the office , Suddenly, I found a scanning perception message on the honeypot platform (192.168.10.78 The host scans other hosts in the same network segment ), I was shocked , Normal people will not know the address of the honeypot , I won't scan the port of the honeypot .
Log analysis
After talking to the master, I felt more and more wrong , immediately 192.168.10.78 The host is offline isolated , Then get up and go with the master to see the log record of this machine .
The log records found are roughly as follows :
nginx See the master's article for the log format of :https://blog.csdn.net/LJFPHP/article/details/78484889
You can roughly read the following information :
client ip:192.168.10.5
Request mode :GET
Request path :/xxx/xxxxxxxx?
Return code :200
Return packet bytes :23143
X_Forwarded-For IP Address :1.2.3.4
The guess of this address is that the hacker is real ip
waf Interception record analysis
See the customer ip yes 192.168.10.5, Guess this is a reverse agent , The hacker hit the machine of reverse proxy , Mapped by reverse proxy to 192.168.10.78 On the machine .
Then go to waf It looks up 192.168.10.5 The record of being attacked , The following example is a waf Interface ( Fictitious ), There are about 2000 records , Various attack methods have been tried ……
The attacker ip And indeed 1.2.3.4

Reverse proxy article :https://blog.csdn.net/zhanjie2009/article/details/122763758
Attack chain analysis
Hackers found an external service website of the company , Test it , tried 2k After that, I called in according to a loophole recurrence article , Reached the intranet 192.168.10.78 On the machine , Then raise the right 、 Intranet traverse 、 Domain control
Unfortunately, I accidentally swept the honeypot during the traverse of the intranet , Cause to be found
边栏推荐
- JS implementation generates a random key of specified length
- What does GPRS network mean
- 静态路由和缺省路由实验
- CDN working principle
- elment-plus图标input上面带的图标为什么不显示
- Is mov format a still image file format
- Hcip experiment (15)
- Can the MySQL create statement be used to create a table structure and append new records
- HCIP(9)
- Jmeter 安装第三方插件 Plugins Manager
猜你喜欢

mysql create语句能不能用来建立表结构并追加新的记录

Less than a year after its establishment! MIT derivative quantum computing company completed financing of US $9million

静态成员static详解

HCIP(11)

微信小程序剪切图片的功能

How to install WiFi correctly

静态路由和缺省路由实验

SQL注入 Less38(堆叠注入)

Can the MySQL create statement be used to create a table structure and append new records

MySQL installation and configuration (super detailed, simple and practical)
随机推荐
ngx+sql环境离线安装日志(rpm安装)
ECMASript 5/6 笔记
Chrome encountered a problem when debugging the code. After modifying and saving the code in vscode, chrome did not update after refreshing
CMD common commands
winServer运维技术栈
LCR测试仪最为主要的功能和用途都是什么
SQL注入 Less38(堆叠注入)
[CS231N]Lecture_2:Image Classification pipelin
DOM programming + events
SSH password free login
npm ERR code ETIMEDOUT npm ERR syscall connect npm ERR errno ETIMEDOUT npm ERR network reques...
HCIP(11)
elment-plus图标input上面带的图标为什么不显示
Which is the file transfer command in the basic services of the Internet
Leetcode question brushing series - sum of majority type
JS implementation generates a random key of specified length
网易云信 2022Q2 产品补给站,快来获取你的产品补给计划吧!
How to realize dynamic route switching and route caching in vuejs
静态路由和缺省路由实验
Learn kotlin - extension function