Almost all enterprises have paid more attention to network security. They have successively purchased firewalls and other devices to block security factors from the Internet. However, Intranet attacks and intrusions are still rampant. Facts have proved that the company's internal insecurity is far more terrible than the external harm.
Most enterprises pay attention to improving the border security of enterprise networks, but do not mention their inves
[Post] Six secrets of Intranet Security Post by: 2009-8-18 12:20:00
The development of the information industry has dramatically changed people's lives. However, it has also laid the groundwork for many security risks: data loss, information leakage, worms, and network abuse. Data shows that 70% of enterprise users in China are at a "high risk" level, and the annual economic losses caused by network leaks reach tens of billions.
BT Operation Principle Analysis and Intranet speed-up method (transfer)
Because Intranet users cannot provide an external port, they cannot act as servers. however, when using BT, we found that it could allow Intranet users to send messages. As a programmer, we couldn't help downloading its source code for analysis (to see it, I also specifically wrote Python :})
Front-facing conditionsTo achieve the purpose: to develop the local computer needs to connect with no network address of the RDS, through the ECS forwarding connection to the RDS databaseClient PC terminal can SSH login to the ECS server with public network.ECS servers with a public network can access other intranet ECS servers through the intranet.ECS Server with public network can access RDS via intranet
Intranet Infiltration some commands to collect and organize
=====
Some command to gather information
=====
@ Query Some of the circumstances of this machine
Ipconfig/all
@ Query machines with relationships
Net View
@ Query has several fields
Nei view/damin
@ View the list of computers in the TestDomain domain
NET View/domain:testdomain
@ query groups within a field
NET Group/domain
@ Divide Network Segment
dsquery subnet
@ query users in the domain
N
Many programs in the local area network can be applicable, but between the external network and intranet and between intranet and intranet is not feasible. The problem is NAT, this article will introduce the next 5 Nat penetration method, solve the internal and external network exchange. 1. Fully conical (full Cone) NAT
Host A and Host B in different
The author of the school through ADSL set up routes to share the Internet. The extranet gateway and DNS are 10.0.0.138, the external network port IP address is 10.0 0.1, and the subnet mask is 255.255.255.0. Self-built sites are placed on the server, on the server has been
IIS is installed and set up, and the "Default Web site" IP address points to 10.0.0.1.
In the default state, you can access the extranet, but you cannot access the intranet. If yo
As more and more Linux servers are installed on the Intranet, you must upload the installation disk to install software on each server. It is troublesome and time-consuming to configure the local yum service. You can install the yum service on a Linux server on the Intranet, and then other servers can directly modify the repo file to use the yum service. Configuration http://www.linuxidc.com/Linux/2013-08/8
Many of the calling resources (databases, web interfaces, etc.) in the intranet environment of the company are mapped by domain name-IP through the intranet DNS service.However, when the DNS mappings are changed, the resources connected in the application are not changed.Previously, it was generally considered that the Linux DNS cache resulted in a complete analysis today, with the following results:1. Cach
Intranet penetration-domain penetration Basics1. Domain environment construction + recognition domain + experiment environment
1. Preface:I have always wanted to penetrate the domain, but unfortunately I have not met a good domain environment. I have read many articles about Domain penetration by others. So I set up my own environment to test ...... [This is the gap between diaosi and Gao fushuai.
Learn what domains are from building them. Then I lear
Amazing technology: using php socket5 proxy for Intranet penetration testing
During penetration testing, we often encounter webshells, but webserver provides web services through web port ing on the Intranet. If you have protection software that causes abnormal server permissions, you cannot create socket proxy and port forwarding. At this time, if you want to penetrate the
Configure routes in windows to solve the problem of simultaneous disconnection between the Intranet and the Internet
This is the most basic network knowledge, but I encountered this problem a few days ago and found that I almost forgot it. I will write it down here.Basic Principles
First, the first two images
Set the Network Packet Flow under the correct route
There are two default route settings for the Network Packet Flow
When your computer is c
A website in sogou is incorrectly configured and directly posts data to the Intranet.
A website in sogou is incorrectly configured and directly posts data to the Intranet.
CVE-2014-3393, Cisco Adaptive Security Appliance (ASA) Software has Security vulnerabilities in the implementation of the Clientless ssl vpn entry custom framework, unauthenticated remote attackers can exploit this vulnerability to modify
Guangxi Education and Training Network Arbitrary File Upload from getshell to intranet fall
Guangxi Education and Training Network Arbitrary File Upload from getshell to intranet fallDetailed description:
Http ://**.**.**.**/First, googleSite: **. ** adminExpected result: http: // **. **/bbs/toplist. jsp? Page = 1 orders = 7It contains all user namesNew users are added every day.Site: **. ** filetype: doc
From FoolishQiangblog
Some people often ask me this question "how to enter the intranet" and how to answer it. In summary, it is a sentence "break through the gateway and use port redirection to enter the intranet ".
The first choice is to break through the gateway (GetWay), which is easy to understand, because an intranet must always access the internet through
Bilibili Intranet roaming: redis obtains the root permission
I pretended to listen to a port on VPS, and then suddenly rebounded to a shell. Well, I pretend I don't know which month a crontab backdoor brought me into Bilibili's intranet again.There are many unauthorized redis access in the Intranet. Why not ask magic conch?Detailed description:
I pretended to lis
Teamviewer vpn + win7 vpn create a remote access to the Intranet environment1. teamviewer vpn is the simplest. Select vpn as follows. However, you must select this feature when installing teamviewer.Connect and remember the partner ip address.2. Set up an "incoming connection" for the Intranet PC in win7 vpn ".Create a vpn connection on an Internet computerThen you will find that the connection is on, and t
ExploitationIptablesSetInternetPort allIngToIntranetThe specific operation process is as follows:
Etc/init. d/iptables start iptables
Initialize iptables and delete previous rules,
Iptables-F
Iptables-X
Iptables-Z
Iptables-F-t nat
Iptables-X-t nat
Iptables-Z-t nat
Allow SSH access, or you will not be able to access it later.
Iptables-a input-p TCP -- dport 22-j ACCEPT
Set Default inbound and outbound rules
Iptables-P INPUT DROP
Iptables-P OUTPUT ACCEPT
Iptables-P FORWARD ACCEPT
Iptables-a input-
Laptop Intranet/Internet (Wireless and Local Network) preferred, laptop order
I. Problems
Work needs. You need to switch between the Intranet and Internet every day. The intranet is Wireless wifi, and the Internet is connected by a network cable. When the network cable is connected to the computer at the beginning, the local connection is used by default. Ev
Recently, I was working on an internal knowledge base system, requiring that it can only be used in an Intranet environment. I virtualized a server on a physical server. After installing the CentOS6.4 system, during environment deployment, it is found that the system is installed with minimal installation. Many Development Kits are not installed. However, the server cannot access the Internet and cannot use the Internet yum source to install the softw
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.