当前位置:网站首页>Zhongke panyun-d module analysis and scoring standard
Zhongke panyun-d module analysis and scoring standard
2022-07-04 04:55:00 【Beluga】
Windows Target reinforcement (5 Two points )( common 100 branch )
need D Module environment private
1. Back door user
(1) The process or idea of vulnerability discovery (5 branch )
(2) Delete backdoor users , If the operation is correct on the command line (10 branch )

or

or

or

2. Administrator user password reinforcement
(1) The process or idea of vulnerability discovery (5 branch )
(2) Set complex passwords for administrator users , If the operation is correct on the command line (10 branch

3.HTTP.SYS Loophole (MS15_034)
(1) The process or idea of vulnerability discovery (5 branch )
(2) Ban IIS Kernel cache , Avoid using ms15_034 Vulnerability in progress DOS attack ,
Get rid of 【 Enable kernel caching 】 Hook in front of check box (10 branch )

(3) Vulnerability verification process (10 branch )

4. Blue hole of eternity (MS17_010)
(1) The process or idea of vulnerability discovery (5 branch )
(2) To guard against ms17_010 And so on , stop it Server service .(10 branch )

or

or

(3) Vulnerability verification process (10 branch )

5. Remote Desktop Protocol RDP Remote code execution vulnerability (MS12_020)
(1) The process or idea of vulnerability discovery (5 branch )
(2) Avoid using ms12_020 Vulnerability in progress DOS Attack and appear blue screen phenomenon , Turn off Remote Desktop Services .(5 branch )

or

(3) Vulnerability verification process (10 branch )

Linux Target reinforcement (7 Two points )( common 100 branch )
1. Back door user
(1) The process or idea of vulnerability discovery (3 branch )
(2) Abnormal user found , Use command “userdel” Delete the user , You can also change the passwords of these two users (2 branch )

or

2. Administrator user password reinforcement
(1) The process or idea of vulnerability discovery (3 branch )
(2) modify root User's password (3 branch )

3. prohibit root User pass SSH Sign in
(1) The process or idea of vulnerability discovery (3 branch )
(2) prohibit root User pass SSH Service login server (4 branch )

4.SAMBA Service vulnerabilities ( Remote code execution )
(1) The process or idea of vulnerability discovery (8 branch )
(2) modify /etc/samba/smb.conf Profile reinforcement .(17 branch )

5. Database user weak password reinforcement
(1) The process or idea of vulnerability discovery (5 branch )
(2) Modify database users root Password , Prevent the other party from logging into the database by brute force cracking with too weak password ,(13 branch )

6. Prohibit database users from logging in from any place
(1) The process or idea of vulnerability discovery (7 branch )
(2) Prohibit database users root Log in from anywhere (10 branch )

or

etc. ,( As long as it is forbidden root It is correct for users to log in from any place )
7. Backdoor deletion
(1) The process or idea of vulnerability discovery (8 branch )
(2) Backdoor deletion (14 branch )

边栏推荐
猜你喜欢

Deep parsing structured exception handling (SEH) - by Matt Pietrek

Developing mqtt access program under QT

6-4漏洞利用-SSH Banner信息获取

20000 words will take you to master multithreading

The "functional art" jointly created by Bolang and Virgil abloh in 2021 to commemorate the 100th anniversary of Bolang brand will debut during the exhibition of abloh's works in the museum

Many founders of technology companies provided enterpriser first with a round C financing of up to US $158million to help it invest in the next generation of global innovators

郑州正清园文化传播有限公司:针对小企业的7种营销技巧

Correct the classpath of your application so that it contains a single, compatible version of com. go

ADB tools
![[wechat applet] good looking carousel map component](/img/66/4ae6a72fff419c7ed1ca015eb94c03.jpg)
[wechat applet] good looking carousel map component
随机推荐
【MATLAB】通信信号调制通用函数 — 傅里叶变换
【MATLAB】MATLAB 仿真数字带通传输系统 — ASK、 PSK、 FSK 系统
Intersection traffic priority, illustration of intersection traffic rules
Eig launched Grupo Cerro, a renewable energy platform in Chile
自动化测试selenium基础篇——webdriverAPI
RAC delete damaged disk group
YoloV6实战:手把手教你使用Yolov6进行物体检测(附数据集)
C basic (VII) document operation
[go] database framework Gorm
cmake
Network equipment emergency response Guide
Maui introductory tutorial series (5.xaml and page introduction)
每日刷题记录 (十二)
Deep understanding of redis -- bloomfilter
Definition of DCDC power supply current
Annex 2-2 confidentiality commitment docx
由于使用flash存放参数时,擦除掉了flash的代码区导致进入硬件错误中断
[Yugong series] go teaching course 002 go language environment installation in July 2022
【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(余弦滚降成形脉冲)的眼图
Error response from daemon: You cannot remove a running container 8d6f0d2850250627cd6c2acb2497002fc3