Shaoguan address: http://attack.onebox.so.com/Level 1Q: The second level needs to be accessed from hack.360.cn. Simply clicking a button will not work !~~A: Set the access path to http://hack.360.cn/. you can use the browser plug-in (HackBar) to
Share a concurrent script that simulates multiple threads in Linux. You can use this script to execute related commands simultaneously on a defined number of servers, compared with a common for/while LOOP, a single execution can only be executed one
To Ping all IP addresses in a CIDR Block and check whether the network connection status is normal, you can use many methods. The following describes two methods:Script 1#! /Bin/sh# Ping all IP addresses of a CIDR Block#2012/02/05Ip = 1 # modifying
This experiment is passed in the Centos/RHEL system. For other versions of linux/Unix, you only need to make appropriate modifications. This script requires that the SSH service must be enabled on the Unix-like server you manage, public and Private
Find:The following is an example of how to use the find command: /> Ls-l# List the test files contained in the current directory-Rw-r --. 1 root 48217 Nov 12 00:57 install. log-Rw-r --. 1 root 37 Nov 12 00:56 testfile. dat-Rw-r --. 1 root 10530 Nov 1
A simple Shell script can be directly saved and pptp. sh can be executed.
1. Script:
yum remove -y pptpd ppp
iptables --flush POSTROUTING --table nat
iptables --flush FORWARD
rm -rf /etc/pptpd.conf
rm -rf /etc/ppp
yum -y install make libpcap
Because http is transmitted in plain text, the information on the site is easily visible to others. To ensure the security of our site, there are three common methods: authentication, source control, and encrypted access (https ).
1.Identity
1. LILO Security Settings vi/etc/lilo. conf. anaconda // modify the LILO file ==================================== ==================......Restricted // join this linePassword = 111111 // Add this line and set the password to 111111......============
Nginx is a good web server and provides a comprehensive speed limit function. The main functional modules are ngx_http_core_module, ngx_http_limit_conn_module, and ngx_http_limit_req_module. The first module includes the limit_rate function (limited
[Note: to prevent the spread of malicious samples, replace {BLOCKED} with some information in the article.]
Overview
Recently we captured a number of attacks using Adobe Flash Vulnerability (CVE-2014-0502), the attacker on a technical blog in
Decrypts the PHP file encrypted with zend
Similar garbled characters may occur when the PHP file encrypted with zend is opened with notpad ++.
The following uses the decryption tool for decryption.
Http://pan.baidu.com/s/1i3n4ysX
Download
During the Penetration Process, the tool found is not applicable, and the Code itself is king. The three programs below are suitable tools that cannot be found on the network during penetration. They are short and practical.
1. Record the root
City hotspot background management does not have the permission to directly download any file, as long as the path is correct, root permission download plus a variety of insecure vulnerabilities 1. The vulnerability file is/DrcomManager/download.
Today, someone in the Group sent me an Android mobile phone text message blocker Trojan. Ask me if I want to buy it. So I cheated on the test ..First, a URL is found, and penetration begins.This is the homepage disguised as a silly siteWe will
When learning varnish these two days and learning vcl, I don't understand the difference between pipe and pass and how to differentiate and apply it. After two days of searching, the concept was finally clarified. Now I will share my record with you
If there is any misunderstanding in the summary, please submit it. Vulnerability nature: php uses the php_escape_shell_cmd function to escape the command line string and process it as a single byte. When the operating system sets the wide byte
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.