360 hacker game HackGame (1-10) clearance strategy

Shaoguan address: http://attack.onebox.so.com/Level 1Q: The second level needs to be accessed from hack.360.cn. Simply clicking a button will not work !~~A: Set the access path to http://hack.360.cn/. you can use the browser plug-in (HackBar) to

Simulate concurrent shell scripts with multiple threads in Linux

Share a concurrent script that simulates multiple threads in Linux. You can use this script to execute related commands simultaneously on a defined number of servers, compared with a common for/while LOOP, a single execution can only be executed one

Bash shell script exercises

1. Determine the disk space used Df-h | grep-v File | sed's/% // G' | awk '{if ($5> 80) print "The used space exceeds 80% :", $6} 'or #! /Bin/bash # Filename: disk. sh # Date: 20110322 DISK_warn = 80 DISK_per = 'df-h | grep-v Filesystem | awk

Shell detects the network status script of the IP address of the entire network segment through ping

To Ping all IP addresses in a CIDR Block and check whether the network connection status is normal, you can use many methods. The following describes two methods:Script 1#! /Bin/sh# Ping all IP addresses of a CIDR Block#2012/02/05Ip = 1 # modifying

Shell script file execution Analysis

I. shell script parent-child Process Analysis Code: #!/bin/bash echo $$ ps -ef |grep `echo $$` echo "-------------------------------------" ( pwd;echo $$;ps -ef |grep `echo $$`;) echo "-------------------------------------" { pwd;echo $$;ps -

Use shell scripts to automatically remotely update Linux servers

This experiment is passed in the Centos/RHEL system. For other versions of linux/Unix, you only need to make appropriate modifications. This script requires that the SSH service must be enabled on the Unix-like server you manage, public and Private

Five common centos server monitoring script codes

1. View host Nic traffic #! /Bin/bash # Network # Mike. Xu While:; do Time = 'date + % m "-" % d "" % k ":" % m' Day = 'date + % m "-" % d' Rx_before = 'ifconfig eth0 | sed-n "8" p | awk '{print $2}' | cut-c7 -' Tx_before = 'ifconfig eth0 | sed-n "8"

Common CentOS Shell skills: find xargs

Find:The following is an example of how to use the find command: /> Ls-l# List the test files contained in the current directory-Rw-r --. 1 root 48217 Nov 12 00:57 install. log-Rw-r --. 1 root 37 Nov 12 00:56 testfile. dat-Rw-r --. 1 root 10530 Nov 1

One-click installation of pptp vpn book under CentOS6.5

A simple Shell script can be directly saved and pptp. sh can be executed. 1. Script: yum remove -y pptpd ppp iptables --flush POSTROUTING --table nat iptables --flush FORWARD rm -rf /etc/pptpd.conf rm -rf /etc/ppp yum -y install make libpcap

Apache site security in CentOS

Because http is transmitted in plain text, the information on the site is easily visible to others. To ensure the security of our site, there are three common methods: authentication, source control, and encrypted access (https ). 1.Identity

Several small steps to build a Secure Linux System

1. LILO Security Settings vi/etc/lilo. conf. anaconda // modify the LILO file ==================================== ==================......Restricted // join this linePassword = 111111 // Add this line and set the password to 111111......============

Nginx speed limit can defend against CC and DDOS attacks.

Nginx is a good web server and provides a comprehensive speed limit function. The main functional modules are ngx_http_core_module, ngx_http_limit_conn_module, and ngx_http_limit_req_module. The first module includes the limit_rate function (limited

Analysis on the flood attack event of a technical blog in China

[Note: to prevent the spread of malicious samples, replace {BLOCKED} with some information in the article.] Overview Recently we captured a number of attacks using Adobe Flash Vulnerability (CVE-2014-0502), the attacker on a technical blog in

Decrypts the PHP file encrypted with zend

Decrypts the PHP file encrypted with zend Similar garbled characters may occur when the PHP file encrypted with zend is opened with notpad ++. The following uses the decryption tool for decryption. Http://pan.baidu.com/s/1i3n4ysX   Download

Short and practical Python script for penetration

During the Penetration Process, the tool found is not applicable, and the Code itself is king. The three programs below are suitable tools that cannot be found on the network during penetration. They are short and practical. 1. Record the root

Arbitrary city hotspot Download Vulnerability + insecure factors + Weak Password

City hotspot background management does not have the permission to directly download any file, as long as the path is correct, root permission download plus a variety of insecure vulnerabilities 1. The vulnerability file is/DrcomManager/download.

Removes the android Trojan Horse

Today, someone in the Group sent me an Android mobile phone text message blocker Trojan. Ask me if I want to buy it. So I cheated on the test ..First, a URL is found, and penetration begins.This is the homepage disguised as a silly siteWe will

Differences between varnish pipe and pass

When learning varnish these two days and learning vcl, I don't understand the difference between pipe and pass and how to differentiate and apply it. After two days of searching, the concept was finally clarified. Now I will share my record with you

PhpMyAdmin vulnerability exploitation summary With Metasploit

I. Affected Versions: 3.5.x Overview: PhpMyAdmin has the PREG_REPLACE_EVAL vulnerability. Exploitation module: exploit/multi/http/phpmyadmin_preg_replace CVE-2013-3238 (CVE)   Ii. Affected Version: phpMyAdmin v3.5.2.2 Overview:

Summary of PHP multi-byte encoding Vulnerabilities

If there is any misunderstanding in the summary, please submit it. Vulnerability nature: php uses the php_escape_shell_cmd function to escape the command line string and process it as a single byte. When the operating system sets the wide byte

Total Pages: 1330 1 .... 489 490 491 492 493 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.