当前位置:网站首页>Zhongke panyun-d module analysis and scoring standard

Zhongke panyun-d module analysis and scoring standard

2022-07-04 04:55:00 Beluga

Windows Target reinforcement (5 Two points )( common 100 branch )

need D Module environment private

1. Back door user

(1) The process or idea of vulnerability discovery (5 branch )

(2) Delete backdoor users , If the operation is correct on the command line (10 branch )

 

or

 

or

 

or

 

2. Administrator user password reinforcement

(1) The process or idea of vulnerability discovery (5 branch )

(2) Set complex passwords for administrator users , If the operation is correct on the command line (10 branch

 

3.HTTP.SYS Loophole (MS15_034)

(1) The process or idea of vulnerability discovery (5 branch )

(2) Ban IIS Kernel cache , Avoid using ms15_034 Vulnerability in progress DOS attack ,

Get rid of 【 Enable kernel caching 】 Hook in front of check box (10 branch )

(3) Vulnerability verification process (10 branch )

 

 

4. Blue hole of eternity (MS17_010)

(1) The process or idea of vulnerability discovery (5 branch )

(2) To guard against ms17_010 And so on , stop it Server service .(10 branch )

 

or

 

or

 

(3) Vulnerability verification process (10 branch )

5. Remote Desktop Protocol RDP Remote code execution vulnerability (MS12_020

(1) The process or idea of vulnerability discovery (5 branch )

(2) Avoid using ms12_020 Vulnerability in progress DOS Attack and appear blue screen phenomenon , Turn off Remote Desktop Services .(5 branch )

 

or

(3) Vulnerability verification process (10 branch )

 

Linux Target reinforcement (7 Two points )( common 100 branch )

1. Back door user

(1) The process or idea of vulnerability discovery (3 branch )

(2) Abnormal user found , Use command “userdel” Delete the user , You can also change the passwords of these two users (2 branch )

 

or

 

2. Administrator user password reinforcement

(1) The process or idea of vulnerability discovery (3 branch )

(2) modify root User's password (3 branch )

 

3. prohibit root User pass SSH Sign in

(1) The process or idea of vulnerability discovery (3 branch )

(2) prohibit root User pass SSH Service login server (4 branch )

 

4.SAMBA Service vulnerabilities ( Remote code execution )

(1) The process or idea of vulnerability discovery (8 branch )

(2) modify /etc/samba/smb.conf Profile reinforcement .(17 branch )

 

5. Database user weak password reinforcement

(1) The process or idea of vulnerability discovery (5 branch )

(2) Modify database users root Password , Prevent the other party from logging into the database by brute force cracking with too weak password ,(13 branch )

 

6. Prohibit database users from logging in from any place

(1) The process or idea of vulnerability discovery (7 branch )

(2) Prohibit database users root Log in from anywhere (10 branch )

 

or

 

etc. ,( As long as it is forbidden root It is correct for users to log in from any place )

7. Backdoor deletion

(1) The process or idea of vulnerability discovery (8 branch )

(2) Backdoor deletion (14 branch )

 

原网站

版权声明
本文为[Beluga]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/185/202207040411583589.html