当前位置:网站首页>Zhongke panyun-d module analysis and scoring standard
Zhongke panyun-d module analysis and scoring standard
2022-07-04 04:55:00 【Beluga】
Windows Target reinforcement (5 Two points )( common 100 branch )
need D Module environment private
1. Back door user
(1) The process or idea of vulnerability discovery (5 branch )
(2) Delete backdoor users , If the operation is correct on the command line (10 branch )

or

or

or

2. Administrator user password reinforcement
(1) The process or idea of vulnerability discovery (5 branch )
(2) Set complex passwords for administrator users , If the operation is correct on the command line (10 branch

3.HTTP.SYS Loophole (MS15_034)
(1) The process or idea of vulnerability discovery (5 branch )
(2) Ban IIS Kernel cache , Avoid using ms15_034 Vulnerability in progress DOS attack ,
Get rid of 【 Enable kernel caching 】 Hook in front of check box (10 branch )

(3) Vulnerability verification process (10 branch )

4. Blue hole of eternity (MS17_010)
(1) The process or idea of vulnerability discovery (5 branch )
(2) To guard against ms17_010 And so on , stop it Server service .(10 branch )

or

or

(3) Vulnerability verification process (10 branch )

5. Remote Desktop Protocol RDP Remote code execution vulnerability (MS12_020)
(1) The process or idea of vulnerability discovery (5 branch )
(2) Avoid using ms12_020 Vulnerability in progress DOS Attack and appear blue screen phenomenon , Turn off Remote Desktop Services .(5 branch )

or

(3) Vulnerability verification process (10 branch )

Linux Target reinforcement (7 Two points )( common 100 branch )
1. Back door user
(1) The process or idea of vulnerability discovery (3 branch )
(2) Abnormal user found , Use command “userdel” Delete the user , You can also change the passwords of these two users (2 branch )

or

2. Administrator user password reinforcement
(1) The process or idea of vulnerability discovery (3 branch )
(2) modify root User's password (3 branch )

3. prohibit root User pass SSH Sign in
(1) The process or idea of vulnerability discovery (3 branch )
(2) prohibit root User pass SSH Service login server (4 branch )

4.SAMBA Service vulnerabilities ( Remote code execution )
(1) The process or idea of vulnerability discovery (8 branch )
(2) modify /etc/samba/smb.conf Profile reinforcement .(17 branch )

5. Database user weak password reinforcement
(1) The process or idea of vulnerability discovery (5 branch )
(2) Modify database users root Password , Prevent the other party from logging into the database by brute force cracking with too weak password ,(13 branch )

6. Prohibit database users from logging in from any place
(1) The process or idea of vulnerability discovery (7 branch )
(2) Prohibit database users root Log in from anywhere (10 branch )

or

etc. ,( As long as it is forbidden root It is correct for users to log in from any place )
7. Backdoor deletion
(1) The process or idea of vulnerability discovery (8 branch )
(2) Backdoor deletion (14 branch )

边栏推荐
- cmake
- 定制一个自己项目里需要的分页器
- 红队视角下的防御体系突破之第一篇介绍、阶段、方法
- STM32F1与STM32CubeIDE编程实例-74HC595驱动4位7段数码管
- 简单g++和gdb调试
- 分享一些我的远程办公经验
- RAC delete damaged disk group
- 1. Mx6u-alpha development board (simulating STM32 drive development experiment)
- Intersection traffic priority, illustration of intersection traffic rules
- 测试 CS4344 立体声DA转换器
猜你喜欢

Yolov6 practice: teach you to use yolov6 for object detection (with data set)

6-5漏洞利用-SSH弱口令破解利用

抓包整理外篇fiddler———— 会话栏与过滤器

Create ASM disk through DD

6-4 vulnerability exploitation SSH banner information acquisition

Sample template of software design document - learning / practice

Correct the classpath of your application so that it contains a single, compatible version of com.go

Utiliser des unités de mesure dans votre code pour une vie meilleure

附件六:防守工作簡報.docx

Many founders of technology companies provided enterpriser first with a round C financing of up to US $158million to help it invest in the next generation of global innovators
随机推荐
Kivy tutorial custom fonts (tutorial with source code)
cmake
Flutter ‘/usr/lib/libswiftCore.dylib‘ (no such file)
Error response from daemon: You cannot remove a running container 8d6f0d2850250627cd6c2acb2497002fc3
电子元器件商城与数据手册下载网站汇总
@Feignclient comments and parameters
牛客小白月赛49
MySQL JDBC programming
Using jsts in esmodule environment
MySQL 索引和事务
The "functional art" jointly created by Bolang and Virgil abloh in 2021 to commemorate the 100th anniversary of Bolang brand will debut during the exhibition of abloh's works in the museum
Correct the classpath of your application so that it contains a single, compatible version of com. go
Kivy教程之 07 组件和属性绑定实现按钮button点击修改label组件(教程含源码)
The second case analysis of the breakthrough of defense system from the perspective of the red team
How do good test / development programmers practice? Where to go
【MATLAB】MATLAB 仿真数字带通传输系统 — QPSK 和 OQPSK 系统
【MATLAB】MATLAB 仿真模拟调制系统 — DSB 系统
【MATLAB】MATLAB 仿真数字带通传输系统 — ASK、 PSK、 FSK 系统
附件六:防守工作简报.docx
2022年6月总结