当前位置:网站首页>Zhongke panyun-d module analysis and scoring standard
Zhongke panyun-d module analysis and scoring standard
2022-07-04 04:55:00 【Beluga】
Windows Target reinforcement (5 Two points )( common 100 branch )
need D Module environment private
1. Back door user
(1) The process or idea of vulnerability discovery (5 branch )
(2) Delete backdoor users , If the operation is correct on the command line (10 branch )

or

or

or

2. Administrator user password reinforcement
(1) The process or idea of vulnerability discovery (5 branch )
(2) Set complex passwords for administrator users , If the operation is correct on the command line (10 branch

3.HTTP.SYS Loophole (MS15_034)
(1) The process or idea of vulnerability discovery (5 branch )
(2) Ban IIS Kernel cache , Avoid using ms15_034 Vulnerability in progress DOS attack ,
Get rid of 【 Enable kernel caching 】 Hook in front of check box (10 branch )

(3) Vulnerability verification process (10 branch )

4. Blue hole of eternity (MS17_010)
(1) The process or idea of vulnerability discovery (5 branch )
(2) To guard against ms17_010 And so on , stop it Server service .(10 branch )

or

or

(3) Vulnerability verification process (10 branch )

5. Remote Desktop Protocol RDP Remote code execution vulnerability (MS12_020)
(1) The process or idea of vulnerability discovery (5 branch )
(2) Avoid using ms12_020 Vulnerability in progress DOS Attack and appear blue screen phenomenon , Turn off Remote Desktop Services .(5 branch )

or

(3) Vulnerability verification process (10 branch )

Linux Target reinforcement (7 Two points )( common 100 branch )
1. Back door user
(1) The process or idea of vulnerability discovery (3 branch )
(2) Abnormal user found , Use command “userdel” Delete the user , You can also change the passwords of these two users (2 branch )

or

2. Administrator user password reinforcement
(1) The process or idea of vulnerability discovery (3 branch )
(2) modify root User's password (3 branch )

3. prohibit root User pass SSH Sign in
(1) The process or idea of vulnerability discovery (3 branch )
(2) prohibit root User pass SSH Service login server (4 branch )

4.SAMBA Service vulnerabilities ( Remote code execution )
(1) The process or idea of vulnerability discovery (8 branch )
(2) modify /etc/samba/smb.conf Profile reinforcement .(17 branch )

5. Database user weak password reinforcement
(1) The process or idea of vulnerability discovery (5 branch )
(2) Modify database users root Password , Prevent the other party from logging into the database by brute force cracking with too weak password ,(13 branch )

6. Prohibit database users from logging in from any place
(1) The process or idea of vulnerability discovery (7 branch )
(2) Prohibit database users root Log in from anywhere (10 branch )

or

etc. ,( As long as it is forbidden root It is correct for users to log in from any place )
7. Backdoor deletion
(1) The process or idea of vulnerability discovery (8 branch )
(2) Backdoor deletion (14 branch )

边栏推荐
- B. All Distinct
- 1. Mx6u-alpha development board (simulating STM32 drive development experiment)
- 【MATLAB】MATLAB 仿真 — 窄带高斯白噪声
- 【MATLAB】通信信号调制通用函数 — 窄带高斯白噪声的生成
- ADB tools
- 2022年6月总结
- PostgreSQL 正式超越 MySQL,这家伙也太强了吧!
- Correct the classpath of your application so that it contains a single, compatible version of com. go
- 【MATLAB】通信信号调制通用函数 — 带通滤波器
- Yolov6 practice: teach you to use yolov6 for object detection (with data set)
猜你喜欢

PostgreSQL 正式超越 MySQL,这家伙也太强了吧!

Utiliser des unités de mesure dans votre code pour une vie meilleure

中科磐云—2022广东木马信息获取解析

Introduction and application of rampax in unity: optimization of dissolution effect

Deep understanding of redis -- bloomfilter

测试 CS4344 立体声DA转换器

抓包整理外篇fiddler———— 会话栏与过滤器

海力士EMMC5.0及5.1系列对比详解

What is context?

Distributed cap theory
随机推荐
Binary search tree
VSCode的有用插件
CRS-4013: This command is not supported in a single-node configuration.
【MATLAB】通信信号调制通用函数 — 窄带高斯白噪声的生成
Network equipment emergency response Guide
附件2-2保密承诺书.docx
【MATLAB】通信信号调制通用函数 — 带通滤波器
简单g++和gdb调试
@Feignclient comments and parameters
Annex V: briefing on the attack process docx
rac删除损坏的磁盘组
cmake
【MATLAB】通信信号调制通用函数 — 傅里叶逆变换
Qt QTableView数据列宽度自适应
Technology Management - learning / practice
Correct the classpath of your application so that it contains a single, compatible version of com.go
令人头痛的延时双删
6-5 vulnerability exploitation SSH weak password cracking and utilization
附件四:攻击方评分标准.docx
【MATLAB】MATLAB 仿真数字带通传输系统 — QPSK 和 OQPSK 系统