Professor Wang's teaching summary:
Nginx Reverse Proxy Parsing Vulnerability
Redis is not authorized to access
DNS Domain Transfer Vulnerability
Rsync exploits?
SSH password-free login?
Zmap Nmap Scan to filter? Masscan
Hydra Password Blasting
THEHAVERSC Information Collection
Blasting and principle of weak password
There are some other scanning tools
Kali Agent Method (intranet infiltration)
Nessus Baseline Scan
Linux Hardening
Windows Hardening
Apache Prevents directory traversal
Tomcat-
Second, DNS domain delivery vulnerability with a command dnsenum sem.tsinghua.edu.cn, if there is a domain delivery vulnerability, the following lists the sub-domain name.
One, Redis unauthorized access (example)
1. First the target has been identified and there is a Redis unauthorized access vulnerability on this site.
Use Nmap to scan what the service and the corresponding port is.
2. Then access the IP to find the Web site root directory.
3. Connect with the Redis client and write a word to the Trojan.
4. Visit the website again to see if the Trojan is written successfully.
5. After the successful writing, use the kitchen knife connection, enter the password, you can go to the website backstage.
Linux Hardening methods:
To be Continued ...
Common Linux Services and corresponding vulnerabilities and defense measures