Open_basedir Security Configuration in Apache

Open_basedir Security Configuration in Apache Open_basedir =.:/tmp/ This setting allows access to the current directory (that is, the directory where the PHP script file is located) and the/tmp/directory, effectively preventing php trojans from

Baidu COM control BaiduSetupAx Remote Stack Overflow Vulnerability

Baidu COM control BaiduSetupAx Remote Stack Overflow Vulnerability The length verification of the COM control BaiduSetupAx parameter is incomplete. Malformed parameters can cause stack overflow. This control will install and run the download program

Record a Linux Server intrusion detection process

Record a Linux Server intrusion detection process0 × 00 Preface The story is like this. On the first day of the New Year, the customer responded that their servers could not be accessed. Looking at the routes, the customer found that the UDP traffic

DDOS attack analysis method and Analysis

DDOS attack analysis method and AnalysisIntroduction to DDOS The full name of DDOS in English is Distributed Denial of Service Distributed Denial of attack. It is the most common and difficult to defend against network attacks. Similar to

I learned from the Superfish event

I learned from the Superfish event0x00 preface & superfish event There are many reports at home and abroad about the Superfish incident. However, I personally feel that the vulnerability incidents are very sensitive in China, and they are the first

Anti-Virus Defense Research: monitoring the replication and auto-deletion of malicious programs

Anti-Virus Defense Research: monitoring the replication and auto-deletion of malicious programsI. Preface monitors the changes of directories in computer systems and files in directories in real time to effectively detect changes to files. In

Anti-Virus Attack and Defense Research: self-starting using the registry

Anti-Virus Attack and Defense Research: self-starting using the registryI. PrefaceAs I mentioned in the previous article, as long as you do not double-click a virus Trojan, it will not run. When it comes to running, there are many ways to realize

Virus Trojan scan: Analysis of hexadecimal code of QQ Trojan Horse stealing

Virus Trojan scan: Analysis of hexadecimal code of QQ Trojan Horse stealingI. Preface according to my personal habits, I will use some automated tools before using reverse analysis of viruses such as IDA Pro and OllyDBG, through static or dynamic

Research on Anti-Virus Defense: DLL injection (medium)-Compiling of DLL injection and uninstallation

Research on Anti-Virus Defense: DLL injection (medium)-Compiling of DLL injection and uninstallationI. preface the DLL usage method I discussed in the previous article is very passive for the DLL file itself. It needs to wait for the program to call

An example of webshell troubleshooting

An example of webshell troubleshooting About the website, Linode Tokyo's high-end VPS, CentOS system, LNMP environment, and run Discuz X 2.5, with a high access volume.Start searching with the following command:Find.-name "*. php"-print0 | xargs-0

Research on Anti-Virus Defense: DLL injection (lower) -- DLL-free Injection

Research on Anti-Virus Defense: DLL injection (lower) -- DLL-free Injection I. Preface generally, to inject a program compiled by myself into other processes, you must use a DLL file. This method has been discussed in the previous article. But in

Research on Anti-Virus Defense: DLL injection (I)-compiling DLL files

Research on Anti-Virus Defense: DLL injection (I)-compiling DLL filesI. Preface all the dialog box programs I have previously compiled for computer virus simulation are exe files. Therefore, a process will be generated during running and the process

How to detect an APP: Getting others' information from decryption to batch

How to detect an APP: Getting others' information from decryption to batch Comment: when mining web vulnerabilities of Android apps, apps that seem to be safe will also Encrypt http requests, the author of this article provides a good basic solution:

Zabbix security: Execute the command to obtain the shell after cracking the weak password.

Zabbix security: Execute the command to obtain the shell after cracking the weak password. If your Zabbix Admin password is too weak or you use the default password (Admin/zabbix) and the password is cracked by a hacker, The Zabbix server is no

ElasticSearch command execution vulnerability: rebound shell through perl

ElasticSearch command execution vulnerability: rebound shell through perl ElasticSearch is a Lucene-based search server. It provides a distributed full-text search engine with multi-user capabilities, based on RESTful web interfaces. Elasticsearch

Optimistic about your portal-data transmission on the client-modifying referer with java

Optimistic about your portal-data transmission on the client-modifying referer with java1. Referer is used to indicate where the browser is from to the WEB server. However, it is not completely secure. Write an example to modify the referer in the

A weak password in a system in Jinshan cloud causes command execution (intranet allowed)

A weak password in a system in Jinshan cloud causes command execution (intranet allowed) Http: // 101.251.64.195: 8080/ Weak zabbix password causes Command Execution  However, it is worth mentioning that there is nothing in the Latest data of

ElasticSearchGroovy script Remote Code Execution Vulnerability emergency Summary

ElasticSearchGroovy script Remote Code Execution Vulnerability emergency SummaryI. Vulnerability description ElasticSearch is a JAVA-developed search and analysis engine. 2014, once exposed a Remote Code Execution Vulnerability (CVE-2014-3120), the

360 the vulnerability detection platform may be exploited and used as a new attack idea and fixed

360 the vulnerability detection platform may be exploited and used as a new attack idea and fixed Searches and operations that can be performed by everyone may lead to low-privilege hackers getting intrusions. New Ideas: Background vulnerabilities

Optimistic about your portal-data transmission on the client-insecure http information Header

Optimistic about your portal-data transmission on the client-insecure http information Header1. In the Internet, a large amount of data is transmitted through URL parameters. Most of the data is not transmitted through encryption. As I have learned,

Total Pages: 1330 1 .... 782 783 784 785 786 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.