Recently, WinRAR has a 0-day extension defect, which can be used for phishing and other purposes. Original Author: An7i, translated by Exploit, moderator of the XI Science Forum. WinRAR is a very powerful compression and decompression software
The website server is always infected with Trojans, and the website header is injected with a large amount of js Code. After a long time, the solution is finally solved. The root cause of the problem is that when configuring the lampp server, 777
1x00 background
If a website is found to have a vulnerability, perform the test:
Is this a cgi script http://xxx.com/cgi-bin/printfile.cgi that gets web source code? File = http://www.baidu.com compiler is habitually tested after file .. /.. /.. /..
A considerable number of large and medium-sized enterprises are using Windows Server and. Net architecture to build enterprise Web services and applications. Therefore, Web Services and Web applications are usually supervised by ASP. NET and IIS.
We know that when you use the ls command to list files, different file types are displayed in different colors. How can we achieve this color-based text output? The answer is not complex, whether using shell or C language.
I. Implementation Method
First, I did not write the script functions here. If you are interested, you can do it yourself. You have not written the shell script for a long time. If you write this script today, you should review it, I have been using python for a long time.
1. Basic shell Parameters# Cat/etc/shells System shell location# Bsh, csh, ksh, and bash change the shell environment of the root user# Chsh changes the shell environment of common users# More/etc/passwd view shell environments of all users2. shell
1. First, cut apache logs by day
Vi/etc/httpd/conf/httpd. confErrorLog "| rotatelogs/var/log/httpd/% Y % m % derror_log 86400 480"CustomLog "| rotatelogs/var/log/httpd/% Y % m % daccess_log 86400 480" combined
Ii. Restart the apache service
Service
LAMP refers to the web servers built in Linux (operating system), Apache (HTTP server), MySQL (database software), and PHP. This website architecture is currently a popular and common Web architecture. It has advantages such as LAMP cross-platform
I helped my friend maintain the server of his website. Recently, the traffic surge and the server pressure surge. Let's look at the nginx log. There are a large number of POST requests for several specific php requests. One IP address will POST four
Some monitoring scripts or restart services. The failure is successfully output in red or green.
A function is used to encapsulate this function.
Function: receives string parameters, changes the OK in the received parameter [] to red, and the FAILD
Name: satool PS: (you can call a colleague a "dumb ")
Function: This script can run commands in batches, copy files, and perform simple logon. You can quickly log on without remembering the specific IP address of the application server.
Note: You
1. Install centos 6.2 64X
2. Customize system partitions,2.1/partition 100 GB;2.2.swap 2048 M;2.3./data Partition, use all available space.. Other requirements are customized based on service characteristics;
2. System slimming and uninstalling
Security Protection for a system is a very important task. To be a qualified system administrator, you must have knowledge about Linux security protection. Linux security protection is essential for administrators. We can start from some aspects:
1.
I think now that we have been in contact with VPS for a long time, we also know that CC attacks are common on the Internet. Without hard defense, finding software is the most direct method, for example, if iptables is used, but iptables cannot be
Lenovo Portal management platform login page Injection
Admin 'and 1 = (select @ version )--
Further detection shows that both tbpwd and tbuser are injected. Is there injection in the password box to save the plaintext?Default path: c: \ inetpub \
On the morning of the next day, the first thing to do at work is to log on to the server and check the export results.
A total of 1127 logs are found. I sorted the logs in ascending chronological order.
First, you must determine whether the IP
What is cross-protocol communication?
The cross-Protocol Communication Technology (Inter-Protocol Communication) refers to the technology in which two different protocols can exchange commands and data. One is called the target protocol and the
The first thing to note is that it is a webkit module, rather than chrome. Therefore, browsers such as Safari and the 360 secure browser speed mode all have the XSS filter function.Filtering Method:Use Fuzzy match to input parameters (GET query |
I learned these things in dvwa (Damn Vulnerable Web App). I installed dvwa in my free space. If you are interested, please check it out. DVWA
If you want a user name and password, you can contact me: sq371426@163.com
Dvwa is provided by google for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.