<menu id="guoca"></menu>
<nav id="guoca"></nav><xmp id="guoca">
  • <xmp id="guoca">
  • <nav id="guoca"><code id="guoca"></code></nav>
  • <nav id="guoca"><code id="guoca"></code></nav>

    紅藍對抗—藍隊手冊

    VSole2022-03-18 14:22:22
    原文鏈接 :https://www.cnblogs.com/backlion

    0x01 前言

    紅藍對抗的思想最早可追溯到我國現存最早的一部兵書《孫子兵法》,在孫子·謀攻篇有這么一句話:“知彼知己,百戰不殆;”,意為如果對敵我雙方的情況都能了解透徹,打多少次仗都不會失敗。在信息安全領域目前大家都有一個共識:“未知攻,焉知防”,攻防對抗本身是一個持續的過程,在具體的對抗中,對對手了解越多就會占據主導地位。紅藍對抗的主要目的在于,提高公司安全成熟度及其檢測和響應攻擊的能力。Red Teams attack, and Blue Teams defend, but the primary goal is shared between them: improve the security posture of the organization. 

    0x02 準備工作

    1 ) 組織結構圖

    2 ) 全網拓撲圖

    3 ) 各系統邏輯結構圖

    4 ) 各系統之間的調用關系

    5 ) 數據流關系

    6 ) 核心資產清單

    7 ) 應急響應計劃

    8 ) 業務連續性計劃

    9 ) 災難恢復計劃 

    0x03 簡單安全評估

    1.端口掃描和漏洞檢測

    1.1主機發現(Ping探測)

    # nmap -sn -PE IP地址或地址段

    1.2端口掃描

    # nmap –open IP地址或地址段

    1.3服務版本檢測

    # nmap -sV IP地址或地址段

    1.4掃描多個端口

    # nmap -p 80,443 IP地址或地址段

    1.5 UDP掃描

    # nmap -sU -p 53 IP地址或地址段

    1.6 TCP/UDP掃描(-Pn 跳過主機發現)

    # nmap -v -Pn -SU -ST -p U:53,111,137,T:21-25,80,139,8080 IP地址或地址段

    1.7 Nessus掃描

    # nessus -q -x -T html 服務器IP 服務器端口 管理員帳號 密碼 目標.txt 輸出報告.html

    1.8 OPENVAS掃描

    # apt -y install pcregrep

    # wget https://goo.gl/TYbLwE

    # chmod +x openvas-automate.sh && ./openvas-automate.sh 目標IP

    2. WINDOWS系統篇

    2.1 網絡發現

    基本網絡發現:

    # C:> net view /all

    # C:> net view 主機名

    Ping探測:

    # C:> for /L %I in (1,1,254) do ping -w 30 -n 1 192.168.1.%I | find "回復" >> 輸出.txt

    2.2 DHCP

    啟用DHCP服務器日志功能:

    # C:> reg add HKLMSystemCurrentControlSetServicesDhcpServerParameters /v ActivityLogFlag /t REG_DWORD /d 1

    默認日志文件目錄:

    C:> %windir%System32Dhcp

    2.3 DNS

    啟用DNS服務器日志功能:

    # C:> DNSCmd DNS服務器名 /config /logLevel 0x8100F331

    # 配置日志文件目錄:

    C:> DNSCmd DNS服務器名 /config /LogFilePath C:dns.log

    # 配置日志文件大小:

    C:> DNSCmd DNS服務器名 /config /logfilemaxsize 0xffffffff

    2.4 哈希值

    文件校驗和完整性驗證(FCIV):

    Ref:http://support2.microsoft.com/kb/841290

    # 單個文件:

    C:> fciv.exe 文件名

    # 計算C盤所有文件并把結果保存到文件中:

    C:> fciv.exe c: -r -sha1 -xml 結果.xml

    # 列出所有hash值:

    C:> fciv.exe -list -sha1 -xml 結果.xml

    # certutil & PowerShell

    # certutil -hashfile 文件名 SHA1

    # PS C:> Get-FileHash 文件名 | Format-List

    # PS C:> Get-FileHash -algorithm md5 文件名

    2.5 NETBIOS

    nbtstat 掃描

    # C:> nbtstat -A 目標IP地址

    NetBIOS緩存

    # C:> nbtstat -c

    批量掃描

    # C:> for /L %I in (1,1,254) do nbtstat -An 192.168.1.%I

    2.6 微軟基線安全分析器(MBSA)

    掃描單個IP

    # C:> mbsacli.exe /target IP地址 /n os+iis+sql+password

    掃描IP地址段

    # C:> mbsacli.exe /r IP地址段 /n os+iis+sql+password

    3. LINUX系統篇

    3.1 網絡發現

    查看開放的SMB共享

    # smbclient -L 目標主機名

    Ping探測

    # for ip in ip>/dev/null; [ Misplaced &ip UP" || : ; done

    3.2 DHCP

    DHCP日志

    RHEL/CentOS

    # cat /var/lib/dhcpd/dhcpd. leases

    Debian/Ubuntu

    # grep -Ei 'dhcp' /var/log/syslog.1

    3.3 DNS

    DNS日志

    # rndc querylog && tail -f /var/log/messages | grep named

    3.4 哈希值

    計算某目錄下所有可執行文件的HASH值

    # find /sbin -type f -exec md5sum {} >> md5sums.txt ;

    # md5deep -rs /sbin > md5sums.txt

    3.5 NETBIOS

    nbtstat 掃描

    # nbtscan 目標IP地址或IP地址段

    舉例:nbtscan 192.168.1.2-100

    4. 安全加固

    4.1 WINDOWS系統篇

    4.1.1 禁用/停止服務

    # C:> sc query

    # C:> sc config "服務名" start= disabled

    # C:> sc stop "服務名"

    # C:> wmic service where name="服務名" call ChangeStartmode Disabled

    4.1.2 防火墻管理

    # 列出所有規則:

    # C:> netsh advfirewall firewall show rule name=all

    # 啟用或禁用防火墻:

    C:> netsh advfirewall set currentprofile state on

    C:> netsh advfirewall set currentprofile firewallpolicy blockinboundalways,allowoutbound

    C:> netsh advfirewall set publicprofile state on

    C:> netsh advfirewall set privateprofile state on

    C:> netsh advfirewall set domainprofile state on

    C:> netsh advfirewall set allprofile state on 

    C:> netsh advfirewall set allprof ile state off

    # 配置舉例:

    netsh advfirewall firewall add rule name="開放TCP:80端口" dir=in action=allow protocol=TCP localport=80

    netsh advfirewall firewall add rule name="開放TCP:443端口" dir=in action=allow protocol=TCP localport=443

    netsh advfirewall firewall add rule name="屏蔽TCP:445端口" dir=in action=block protocol=TCP localport=445

    netsh advfirewall firewall add rule name="允許MyApp" dir=in action=allow program="C:MyAppMyApp.exe" enable=yes

    4.1.3 清除DNS緩存和Netios緩存

    # C:> ipconfig /flushdns

    # C:> nbtstat -R

    4.1.4 應用控制

    # AppLocker配置

    # 導入Applocker模塊

    PS C:> import-module Applocker

    # 查看system32目錄下所有exe文件的Applocker信息

    PS C:> Get-ApplockerFileinformation -Directory C:WindowsSystem32 -Recurse -FileType Exe

    # 增加一條針對system32目錄下所有的exe文件的允許規則

    PS C:> Get-Childitem C:WindowsSystem32*,exe | Get-ApplockerFileinformation | New-ApplockerPolicy -RuleType Publisher, Hash -User Everyone -RuleNamePrefix System32

    4.1.5 IPSEC

    #使用預共享密鑰的方式新建一條IPSEC本地安全策略,應用到所有連接和協議

    C:> netsh ipsec static add filter filterlist=MyIPsecFilter srcaddr=Any dstaddr=Any protocol=ANY

    C:> netsh ipsec static add filteraction name=MyIPsecAction action=negotiate

    C:> netsh ipsec static add policy name=MyIPsecPolicy assign=yes

    C:> netsh ipsec static add rule name=MyIPsecRule policy=MyIPsecPolicy filterlist=MyIPsecFilter filteraction=MyIPsecAction conntype=all activate=yes psk=密碼

    #新建一條允許訪問外網TCP 80和443端口的IPSEC策略

    C:> netsh ipsec static add filteraction name=Allow action=permit

    C:> netsh ipsec static add filter filterlist=WebFilter srcaddr=Any dstaddr=Any protocol=TCP dstport=80

    C:> netsh ipsec static add filter filterlist=WebFilter srcaddr=Any dstaddr=Any protocol=TCP dstport=443

    C:> netsh ipsec static add rule name=WebAllow policy=MyIPsecPolicy filterlist=WebFilter filteraction=Allow conntype=all activate=yes psk=密碼 

    #查看和禁用某條IPSEC本地安全策略

    C:> netsh ipsec static show policy name=MyIPsecPolicy

    C:> netsh ipsec static set policy name=MyIPsecPolicy assign=no

    # 新建一條IPSEC對應的防火墻規則,源地址和目的地址為any

    C:> netsh advfirewall consec add rule name="IPSEC" endpointl=any endpoint2=any action=requireinrequireout qmsecmethods=default

    # 新建一條IPSEC對應的防火墻規則,所有出站請求必須提供預共享密鑰

    C:> netsh advfirewall firewall add rule name="IPSEC_Out" dir=out action=allow enable=yes profile=any localip=any remoteip=any protocol=any interfacetype=any security=authenticate

    4.1.6 其他安全策略

    # 禁用遠程桌面連接

    C:> reg add "HKLMSYSTEMCurrentControlSetControlTerminalServer" /f /v fDenyTSConnections /t REG_DWORD /d 1

    # 只發送NTLMv2響應(防止“永恒之藍”漏洞攻擊)

    C:> reg add HKLMSYSTEMCurrentControlSetControlLsa /v lmcompatibilitylevel /t REG_DWORD /d 5 /f

    # 禁用IPV6

    C:> reg add HKLMSYSTEMCurrentControlSetservicesTCPIP6Parameters /v DisabledComponents /t REG_DWORD /d 255 /f 

    # 禁用sticky鍵

    C:> reg add "HKCUControlPanelAccessibilityStickyKeys" /v Flags /t REG_SZ /d 506 /f

    # 禁用管理共享(Servers/Workstations)

    C:> reg add HKLMSYSTEMCurrentControlSetServicesLanmanServerParameters /f /v AutoShareServer /t REG_DWORD /d 0

    C:> reg add HKLMSYSTEMCurrentControlSetServicesLanmanServerParameters /f /v AutoShareWks /t REG_DWORD /d 0

    # 禁用注冊表編輯器和CMD命令提示符

    C:> reg add HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem /v DisableRegistryTools /t REG_DWORD /d 1 /f

    C:> reg add HKCUSoftwarePoliciesMicrosoftWindowsSystem /v DisableCMD /t REG_DWORD /d 1 /f

    # 啟用UAC

    C:> reg add HKLMSOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystem /v EnableLUA /t REG_DWORD /d 1 /f

    # 啟用防火墻日志

    C:> netsh firewall set logging droppedpackets = enable

    C:> netsh firewall set logging connections = enable 

    4.2 LINUX系統篇

    4.2.1 服務管理

    # 查看服務狀態

    service –status-all

    ps -ef OR ps -aux

    initctl list

    systemctl list-unit-files

    # 啟動,停止和禁用服務

    # For Upstart services:

    /etc/init.d/apache2 start | stop | status

    service apache2 start | stop | status

    update-rc.d apache2 disable

    # For Systemd services:

    systemctl start | stop | status ntp.service

    systemctl disable sshd.service

    4.2.2 防火墻管理

    # iptables 常用操作:

    iptables-save > filewall_rules.bak # 導出當前規則

    iptables -vnL –line # 列出所有規則

    iptables -S # 同上

    iptables -P INPUT DROP # 默認策略,禁止所有連接

    iptables -A INPUT -s 10.10.10.10 -j DROP # 禁止單個IP

    iptables -A INPUT -s 10,10.10.0/24 -j DROP # 禁止一個網段

    iptables -A INPUT -p tcp –dport ssh -s 10.10.10.10 -j DROP # 禁止某IP訪問本機SSH服務

    iptables -A INPUT -p tcp –dport ssh -j DROP # 禁止訪問本機SSH服務

    iptables -I INPUT 5 -m limit –limit 5/min -j LOG –log-prefix "

    iptables denied: " –log-level 7 # 啟用日志

    iptables -F # 清除所有已加載的工作

    4.2.3 DNS緩存

    # Unix/Linux系統沒有系統級別DNS緩存

    4.2.4 配置IPSEC

    # 在兩臺服務器之間建立IPSEC通道

     1.)添加防火墻規則允許IPSEC協議

    iptables -A INPUT -p esp -j ACCEPT

    iptables -A INPUT -p ah -j ACCEPT

    iptables -A INPUT -p udp –dport 500 -j ACCEPT

    iptables -A INPUT -p udp –dport 4500 -j ACCEPT

    2.)安裝Racoon 

    apt -y install racoon

    3.)編輯配置文件:/etc/ipsec-tools.conf

    flush;

    spdflush;

    spdadd 主機A的IP地址 主機B的IP地址 any -P out ipsec

     esp/transport//require;

    spdadd 主機B的IP地址 主機A的IP地址 any -P in ipsec

     esp/transport//require;

    4.)編輯配置文件:/etc/racoon/racoon.conf

    log notify;

    path pre_shared_key "/etc/racoon/psk.txt";

    path certificate "/etc/racoon/certs";

    remote anonymous {

     exchange_mode main,aggressive;proposal {   encryption_algorithm aes_256;   hash_algorithm sha256;   authentication_method

    pre_shared_key;

        dh_group modp1024;

     generate_policy off;

    sainfo anonymous{ 

     pfs_group 2;encryption_algorithm aes_256;authentication_algorithm hmac_sha256;compression_algorithm deflate;

    }  

    5.)添加預共享密鑰

    主機A:echo 主機B 123 >> /etc/racoon/psk.txt

    主機B:echo 主機A 123 >> /etc/racoon/psk.txt

    6.)重啟服務,檢查協商及配置策略

    service setkey restart

    setkey -D

    setkey -DP

    5. 檢測(Visibility)

    5.1 網絡安全監控

    5.1.1 數據包捕捉與分析

    1.)TCPDUMP

    tcpdump -tttt -n -vv # 打印時戳、不進行名稱解析及verbose方式顯示

    tcpdump -nn -c 1000 | awk '{print $3}' | cut -d. -f1-4 | sort -n | uniq -c | sort -nr # 捕捉1000個數據包,找出Top talkers 

    tcpdump -w target.pcap -i any dst targetIP and port 80 # 在所有接口上捕捉目標IP為:targetIP且端口為80的數據包并寫入target.pcap文件

    tcpdump host 10.0.0.1 && host 10.0.0.2 # 捕捉兩個主機之間的數據包

    tcpdump not net 10.10 && not host 192.168.1.2 #檢視非10.10網段及非192.168.1.2主機的數據包

    tcpdump host 10.10.10.10 && (10.10.10.20 or 10.10.10.30) # 檢視主機A和主機B或C的數據包

    tcpdump -n -s0 -C 100 -w 001.pcap # 輪詢,文件大小超過100M后自動創建新文件

    tcpdump -w – | ssh ServerIP -p 50005 "cat – > /tmp/remotecapture.pcap" # 保存捕獲的數據包到遠程服務器上的/tmp/remotecapture.pcap文件

    tcpdump -n -A -s0 port http or port ftp or port smtp or port imap or port pop3 | egrep -i 'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|Passwd=|password=|pass:|user:|username:|password:|login:|pass|user' –color=auto –line-buffered -B20 # 抓取明文密碼

    tcpdump -s 1500 -A '(tcp[((tcp[12:1] & 0xf0) >> 2)+5:1] = 0x01) and (tcp[((tcp[12:1] & 0xf0) >> 2):1] = 0x16)' #查找自簽名證書

    2.)TSHARK

    tshark -nr 001.pcap -Y "ssl.handshake.ciphersuites" -Vx | grep "ServerName:" | sort | uniq -c | sort -r # 提取證書Server Name字段 

    tshark -D # 列出所有接口

    tshark -i eth0 -i eth1 # 監聽多個接口

    tshark -nn -w 001.pcap # 禁用名稱解析并保存到文件

    tshark arp or icmp # 捕捉arp或者icmp

    tshark "host 主機A && host 主機B" # 捕捉兩個主機之間的數據包

    tshark -r 001.pcap # 對已保存的數據包進行分析

    tshark -n -e ip.src -e ip.dst -T fields -E separator=, -2 -R ip -r 001.pcap # 提取源/目的IP地址

    tshark -n -e ip.src -e dns,qry.name -E separator=';' -T fields port 53 # 提取DNS查詢的源IP及DNS查詢的域名

    tshark -2 -R http.request -T fields -E separator=';' -e http.host -e http.request.uri -r 001.pcap # 提取HTTP請求中的host參數和請求uri

    tshark -n -c 150 I awk '{print $4}' I sort -n | uniq -c | sort -nr # 提取top talkers

    tshark -q -z io,phs -r 001.pcap # 協議統計tshark -n -c 100 -e ip.src -Y "dns.flags.response eq 1" -T fields port 53 # 提取響應的DNS服務器地址

    tshark -n -e http.request.uri -Y http.request -T fields | grep exe # 提取通過http下載exe可執行文件的數據包

    3.)SNORT

    snort -T -c /etc/snort/snort.conf # 測試配置文件配置

    snort -dv -r 001.log # 分析數據包

    snort -dvr 001.log icmp # 取icmp數據包 

    snort -K ascii -l 001 # 抓包,ASCII格式顯示

    snort -q -A console -i eth0 -c /etc/snort/snort.conf # 在終端打印

    snort eventsecho 'log tcp 192.168.1.0/24 any -> 192.168.1.95 22 ( msg: "ssh access" ; sid:1618008; )' > 001.rule && snort -T -c 001.rule # 規則測試

    mkdir logs && snort -vd -c 001.rule -r 001.pcap -A console -l logs # 執行規則

    4.)Bro NSM

    apt -y install bro bro-aux

    pip install bro-pkg

    bro-pkg install bro/hosom/file-extraction

    wget https://www.malware-traffic-analysis.net/2018/01/12/2018-01-12-NanoCore-RAT-traffic.pcap.zip

    wget https://www.bro.org/static/exchange-2013/faf-exercise.pcap

    bro -r 2018-01-12-NanoCore-RAT-traffic.pcap # 從pcap文件中讀取數據并創建相關日志文件

    bro -r faf-exercise.pcap /root/.bro-pkg/scratch/file-extraction/scripts/plugins/extract-pe.bro && ls -lhct ./extract_files/ # 提取exe文件

    bro -r faf-exercise.pcap /usr/share/bro/policy/frameworks/files/extract-all-files.bro # 提取多個類型的文件

    bro -C -r faf-exercise.pcap && cat ssl.log | bro-cut server_name , subject , issuer # 提取證書中的server_name,issuer和subjects字段 

    cat conn.log | bro-cut id.orig_h , id.orig_p , id.resp_h , id.resp_p , proto , conn_state # 提取源IP,源端口,目的IP,目的端口,協議類型,tcp標記

    cat dns.log | bro-cut query | sort -u # 提取DNS查詢namecat http.log | bro-cut id.orig_h , id.orig_p , id.resp_h , id.resp_p , host , uri , referrer # 提取源IP,源端口,目的IP,目的端口,host,uri,referrer字段 

    cat http.log | bro-cut user_agent | sort -u # 提取user_agent字段

    5.)EDITCAP

    editcap -F pcap -c 1000 orignal.pcap out_split.pcap # 以1000為單位進行分割

    editcap -F pcap -t+3600 orignal.pcap out_split.pcap # 以1小時為單位進行分割

    6.)MERGECAP

    mergecap -w merged_cap.pcap capl.pcap cap2.pcap cap3.pcap # 合并多個文件

    7.)PacketTotal

    https://www.packettotal.com/app/analysis?id=c8c11b792272ac19a49299a3687466be&name=files

    8.)NetworkMiner

    http://netres.ec/?b=173588E

    5.2 蜜罐技術

    5.2.1 WINDOWS系統篇 

    1.)端口蜜罐

    # 原理:監聽一些端口,客戶端成功建立TCP連接后,記錄訪問日志,然后添加防火墻規則封禁此IP

    PS C:> certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Pwdrkeg/honeyport/master/honeyport.ps1

    PS C:> .honeyport.ps1 -Ports 4444,22,21,23 -WhiteList 192.168.10.1,192.168.10.2 -Block $true -Verbose

    PS C:> Get-EventLog HoneyPort # 查看日志信息

    PS C:> stop-job -name HoneyPort # 停止任務

    PS C:> remove-job -name HoneyPort # 移除任務

    5.3.2 LINUX系統篇

    1.)端口蜜罐

    # 原理同上

    wget https://raw.githubusercontent.com/gchetrick/honeyports/master/honeyports-0.5.pypython honeyports-0.5.py -p 1234 -h 192.168.1.100 -D

    2.) (PASSIVE)監控DNS解析

    apt -y install dnstop

    dnstop -l 3 eth0

    dnstop -l 3 001.pcap | out.txt 

    5.3 日志審計

    5.3.1 WINDOWS

    # 增加日志文件大小進行日志審計

    C:> reg add HKLMSoftwarePoliciesMicrosoftWindowsEventlogApplication /v MaxSize /t REG_DWORD /d 0x19000

    C:> reg add HKLMSoftwarePoliciesMicrosoftWindowsEventlogSecurity /v MaxSize /t REG_DWORD /d 0x64000

    C:> reg add HKLMSoftwarePoliciesMicrosoftWindowsEventLogSystem /v MaxSize /t REG_DWORD /d 0x19000

    # 查看Windows事件日志-安全日志的配置

    C:> wevtutil gl Security

    # 檢查審核策略

    auditpol /get /category:*

    # 對所有項啟用成功和失敗的審核策略

    C:> auditpol /set /category:* /success:enable /failure:enable

    # 查看已配置的事件日志的概要信息

    PS C:> Get-Eventlog -list

    # 取最近5條應用程序日志

    PS C:> Get-Eventlog -newest 5 -logname application | Format-List

    # 取Eent ID:4672的所有日志

    PS C:> Get-Eventlog Security | ? { $_.Eventid -eq 4672} 

    # 登錄與注銷事件

    PS C:> Get-Eventlog Security

    4625,4634,4647,4624,4625,4648,4675,6272,6273,6274,6275,6276,6277,6278,6279,6280,4649,4778,4779,4800,4801,4802,4803,5378,5632,5633,4964 -after ((get-date).addDays(-1))

    # DPAPI行為,進程終止,RPC事件

    PS C:> Get-EventLog Security 4692,4693,4694,4695,4689,5712 -after ((get-date).addDays(-1)

    # 文件共享,文件系統,SAM,注冊表,證書時間

    PS C: Get-EventLog Security

    4671,4691,4698,4699,4700,4701,4702,5148,5149,5888,5889,5890,4657,5039,4659,4660,4661,4663,4656,4658,4690,4874,4875,4880,4881,4882,4884,4885,4888,4890,4891,4892,4895,4896,4898,5145,5140,5142,5143,5144,5168,5140,5142,5143,5144,5168,5140,5142,5143,5144,5168,4664,4985,5152,5153,5031,5140,5150,5151,5154,5155,5156,5157,5158,5159 -after ((get-date).addDays(-1))

    # 查看Eent ID:4672的詳細信息

    Get-Eventlog Security | ? { $_.Eventid -eq 4672} | Format-List

    5.3.2 LINUX

    # 認證日志

    tail /var/log/auth. log 

    grep -i "fail" /var/log/auth. log

    tail /var/log/secure

    grep -i "fail" /var/log/secure

    # samba,cron,sudo相關日志

    grep -i samba /var/log/syslog

    grep -i samba /var/log/messages

    grep -i cron /var/log/syslog

    grep -i sudo /var/log/auth. log

    grep -i sudo /var/log/secure

    # Apache 404錯誤日志

    grep 404 apache.log | grep -v -E "favicon.ico|robots.txt"

    # 監控新文件,5分鐘刷新一次

    watch -n 300 -d ls -lR /web_root

    5.4 響應(取證)

    5.4.1 WINDOWS系統篇

    1.)系統信息

    C:> echo %DATE% %TIME%

    C:> hostname

    C:> systeminfo

    C:> systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

    C:> wmic csproduct get name

    C:> wmic bios get serialnumber

    C:> wmic computersystem list brief

    C:> psinfo -accepteula -s -h -d

    2.)用戶信息

    C:> whoamiC:> net users

    C:> net localgroup administrators

    C:> net group administrators

    C:> wmic rdtoggle list

    C:> wmic useraccount list

    C:> wmic group list

    C:> wmic netlogin get name,lastlogon,badpasswordcount

    C:> wmic netclient list brief

    C:> doskey /history > history.txt

    3.)網絡信息

    C:> netstat -e

    C:> netstat -naob

    C:> netstat -nr

    C:> netstat -vb

    C:> nbtstat -s

    C:> route print

    C:> arp -a

    C:> ipconfig /displaydns

    C:> netsh winhttp show proxy

    C:> ipconfig /allcompartments /all

    C:> netsh wlan show interfaces

    C:> netsh wlan show all

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsConnectionsWinHttpSettings"

    C:> type %SYSTEMROOT%system32driversetchosts

    C:> wmic nicconfig get descriptions,IPaddress,MACaddress

    C:> wmic netuse get name,username,connectiontype, localname

    4.)服務信息

    C:> at

    C:> tasklist

    C:> tasklist /svc

    C:> tasklist /SVC /fi "imagename eq svchost.exe"

    C:> tasklist /SVC /fi "imagename eq svchost.exe"

    C:> schtasks

    C:> net start

    C:> sc query

    C:> wmic service list brief | findstr "Running"

    C:> wmic service list conf ig 

    C:> wmic process list brief

    C:> wmic process list status

    C:> wmic process list memory

    C:> wmic job list briefPS

    C:> Get-Service | Where-Object { $_.Status -eq "running" }

    5.)策略、補丁、環境變量信息

    C:> set

    C:> gpresult /r

    C:> gpresult /z > output.txt

    C:> gpresult /H report.html /F

    C:> wmic qfe

    6.)自啟動信息

    C:> wmic startup list full

    C:> wmic ntdomain list brief

    6.1)檢查自啟動文件目錄

    C:> dir "%SystemDrive%ProgramDataMicrosoftWindowsStart MenuProgramsStartup"

    C:> dir "%SystemDrive%Documents and SettingsAll UsersStart MenuProgramsStartup"

    C:> dir %userprofile%Start MenuProgramsStartup

    C:> %ProgramFiles%Startup

    C:> dir C:WindowsStart MenuProgramsstartup

    C:> dir "C:Users%username%AppDataRoamingMicrosoftWindowsStart MenuProgramsStartup"

    C:> dir "C:ProgramDataMicrosoftWindowsStart MenuProgramsStartup"

    C:> dir "%APPDATA%MicrosoftWindowsStart MenuProgramsStartup"

    C:> dir "%ALLUSERSPROFILE%MicrosoftWindowsStart MenuProgramsStartup"

    C:> dir "%ALLUSERSPROFILE%Start MenuProgramsStartup"

    C:> type C:Windowswinstart.bat

    C:> type %windir%wininit.ini

    C:> type %windir%win.ini

    C:> type C:Autoexec.bat"

    6.2)使用autoruns

    C:> autorunsc -accepteula -m

    6.3)自啟動注冊表位置

    HKEY_CLASSES_ROOT:

    C:> reg query HKCRComfileShellOpenCommand

    C:> reg query HKCRBatfileShellOpenCommand

    C:> reg query HKCRhtafileShellOpenCommand

    C:> reg query HKCRExefileShellOpenCommand

    C:> reg query HKCRExefilesShellOpenCommand

    C:> reg query HKCRpiffileshellopencommand

    HKEY_CURRENT_USERS:

    C:> reg query "HKCUControl PanelDesktop"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerRun"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRun"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRunonce"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRunOnceEx"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRunServices"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionRunServicesOnce"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionWindowsRun"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionWindowsLoad"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionWindowsScripts"

    C:> reg query "HKCUSoftwareMicrosoftWindowsNTCurrentVersionWindows" /f run

    C:> reg query "HKCUSoftwareMicrosoftWindowsNTCurrentVersionWindows" /f load

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerRun"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerRecentDocs"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerComDlg32LastVisitedMRU"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerComD1g32OpenSaveMRU"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerComDlg32LastVisitedPidlMRU"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerComD1g32OpenSavePidlMRU" /s

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerRunMRU"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerUser Shell Folders"

    C:> reg query "HKCUSoftwareMicrosoftWindowsCurrentVersionAppletsRegEdit" /v LastKey

    C:> reg query "HKCUSoftwareMicrosoftInternetExplorer" TypedURLs

    C:> reg query "HKCUSoftwarePoliciesMicrosoftWindowsControlPanelDesktop"HKEY_LOCAL_MACHINE:

    C:> reg query "HKLMSOFTWAREMicrosoftActive SetupInstalled Components" /s

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionexplorerUser Shell Folders"

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionexplorerShell Folders"

    C:> reg query "HKLMSoftwareMicrosoftWindowsCurrentVersionexplorerShellExecuteHooks"

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects" /s

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorerRun"

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun"

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunonce"

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunOnceEx"

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunServices"

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunServicesOnce"

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionWinlogonUserinit"

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsCurrentVersionshellServiceObjectDelayLoad"

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsNTCurrentVersionScheduleTaskCacheTasks" /s

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsNTCurrentVersionWindows"

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsNTCurrentVersionWindows" /f Appinit_DLLs

    C:> reg query "HKLMSOFTWAREMicrosoftWindowsNTCurrentVersionWinlogon" /f Shell 

    C:> reg query "HKLMSOFTWAREMic rosoftWindowsNTCurrentVersionWinlogon" /f Userinit

    C:> reg query "HKLMSOFTWAREPoliciesMicrosoftWindowsSysternScripts"

    C:> reg query "HKLMSOFTWAREClassesbatfileshellopencornrnand"

    C:> reg query "HKLMSOFTWAREClassescornfileshellopencornrnand"

    C:> reg query "HKLMSOFTWAREClassesexefileshellopencommand"

    C:> reg query "HKLMSOFTWAREClasseshtafileShellOpenCommand"

    C:> reg query "HKLMSOFTWAREClassespiffileshellopencommand"

    C:> reg query "HKLMSOFTWAREWow6432NodeMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects" /s

    C:> reg query "HKLMSYSTEMCurrentControlSetControlSessionManager"

    C:> reg query "HKLMSYSTEMCurrentControlSetControlSessionManagerKnownDLLs"

    C:> reg query "HKLMSYSTEMControlSet001ControlSessionManagerKnownDLLs"

    7.)取日志文件

    C:> wevtutil epl Security C:bakSecurity-logs.evtx

    C:> wevtutil epl System C:bakSystem-logs.evtx

    C:> wevtutil epl Application C:bakApplication-logs.evtx 

    8.)文件、目錄、共享信息

    C:> net use 目標IP

    C:> net share

    C:> net session

    C:> wmic volume list brief

    C:> wmic logicaldisk get description,filesystem,name,size

    C:> wmic share get name,path

    # 查找多個類型的文件或某個文件

    C:> dir /A /S /T:A *.exe *.dll *.bat *.PS1 *.zip

    C:> dir /A /S /T:A evil.exe

    # 查找2017/1/1之后創建的文件

    C:> forfiles /p C: /M *.exe /S /D +2017/1/1 /C "cmd /c echo @fdate @ftime @path"

    C:> for %G in (.exe, .dll, .bat, .ps) do forfiles -p "C:" -m *%G -s -d +2017/1/1 -c "cmd /c echo @fdate @ftime @path"

    # 查找文件大小>20MB的文件

    forfiles /S /M * /C "cmd /c if @fsize GEQ 2097152 echo @path @fsize"

    # 在Alternate Data Streams中查找文件

    C:> streams -s 文件或目錄

    # 檢查數字簽名,vt掃描

    C:> sigcheck -e -u -vr -s C:

    C:> listdlls.exe -u# 掃描病毒

    C:> "C:Program FilesWindows DefenderMpCmdRun.exe" -SignatureUpdate

    C:> "C:Program FilesWindows DefenderMpCmdRun.exe" -Scan“

    5.4.2 LINUX篇

    1.)系統信息

    uname -a

    uptime

    timedatectl

    mount

    2.)用戶信息

    Wlastlog last

    faillog -a

    cat /etc/passwd

    cat /etc/shadow

    cat /etc/group

    cat /etc/sudoers

    # 查找UID為0的用戶

    awk -F: '($3 == "0") {print}' /etc/passwd

    egrep ':0+' /etc/passwd

    cat /root/.ssh/authorized_keys

    lsof -u root 

    cat /root/.bash_history

    3.)網絡信息

    # 查看網絡接口

    ifconfig OR ip a l

    # 查看監聽端口

    netstat -tupnl

    # 查看網絡連接

    netstat -tupnlanetstat -tupnlax

    # 路由信息

    route OR netstat -r OR ip r l

    # ARP表

    arp -ne

    # 監聽端口的進程

    lsof -i

    4.)服務信息

    # 列出所有進程

    ps aux OR ps -ef

    # 已加載內核模塊

    lsmod

    # 打開的文件

    lsof 

    lsof -c sshd

    lsof -p PID

    lsof -nPi | cut -f1 -d" " | uniq | tail -n +2

    # 監控日志

    less +F /var/log/messages

    tail -F /var/log/messages

    journalctl -u ssh.service -f

    # 列出所有服務

    chkconfig –list

    systemctl list-units

    5.)策略、補丁、環境變量信息

    # 檢查pam.d目錄相關文件

    cat /etc/pam.d/common*

     # 自啟動信息 – 計劃任務

    crontab -l

    crontab -u root -l

    cat /etc/crontab

    ls /etc/cron,*

    6.)命令歷史

    cat /root/.*history

    7.)文件、目錄、共享信息

    df -ah

    ls -lhcta /etc/init.d/

    stat -x filenamefile

    filename

    # 特殊屬性文件

    lsattr -R / | grep "-i-"

    # 全局可寫文件

    find / -xdev -type d ( -perm -0002 -a ! -perm -1000 ) -print

    # 某時間點之后新建的文件

    find / -newermt 2018-01-22q

    # 打印文件的所有屬性信息

    find /labs -printf "%m;%Ax;%AT;%Tx;%TT;%Cx;%CT;%U;%G;%s;%pn"

    # 查看文件的元數據stat 文件名

    8.) 簡單基線檢查

    wget https://raw.githubusercontent.com/pentestmonkey/unix-privesc-check/1_x/unix-privesc-check && ./unix-privesc-check > output.txt

    9.) 檢測rootkit

    chkrootkit

    rkhunter –update && rkhunter -check

    tiger && less /var/log/tiger/security.report.*

    lynis && lynis audit system && more /var/logs/lynis. log 

    10.) Fastir Collector Linux,收集artefacts,包括:內核版本、內核模塊、網卡、系統版本、主機名、登錄、網絡連接、SSH know_host、日志文件、進程數據、自啟動等信息

    wget https://raw.githubusercontent.com/SekoiaLab/Fastir_Collector_Linux/master/fastIR_collector_linux.py

    python fastIR_collector_linux.py –debug –output_dir output

    11.) Sysdig and Sysdig Falco 行為監控

    # 觀察root用戶查看過的目錄

    sysdig -p"%evt.arg.path" "evt.type=chdir and user.name=root"

    # 觀察SSHD行為

    sysdig -A -c echo_fds fd.name=/dev/ptmx and proc.name=sshd

    # id為5459的登錄shell執行過的所有命令

    sysdig -r trace.scap.gz -c spy_users proc.loginshellid=5459

    # 安裝,啟動falco

    curl -s https://s3.amazonaws.com/download.draios.com/DRAIOS-GPG-KEY.public | apt-key add -curl -s -o /etc/apt/sources.list.d/draios.list http://download.draios.com/stable/deb/draios.list

    sudo apt update

    apt -y install falco

    modprobe sysdig-probe

    service falco start 

    falco

    5.4.2 病毒樣本分析 

    # 靜態分析

    # 掛載Sysinternals工具集

    live.sysinternals.comtools

    # 檢查數字簽名

    C:> sigcheck.exe -u -e C:malware

    C:> sigcheck.exe -vt malware.exe

    # 16機制和ASCII方式查看PE文件

    hexdump -C -n 500 malware.exe

    od -x mailware.exe

    xxd malware.exe

    strings -a malware.exe | more

    # 內存鏡像分析

    python vol.py -f malware_memory_dump.raw -profile=Win7SPFix64 malfind -D /output

    python vol.py -f malware_memory_dump.raw -profile=Win7SPFix64 malfind -p PID -D /output

    python vol.py -f malware_memory_dump.raw -profile=Win7SPFix64 pslist

    python vol.py -f malware_memory_dump.raw -profile=Win7SPFix64 pstree 

    python vol.py -f malware_memory_dump.raw -profile=Win7SPFix64 dlllist

    python vol.py -f malware_memory_dump.raw -profile=Win7SPFix64 dlldump -D /output

    # HASH分析

    curl -v –request POST –url https://www.virustotal.com/vtapi/v2/file/report' -d apikey=VT API KEY -d 'resource=樣本文件hash'

    curl -v -F 'file=malware.exe' -F apikey=VT API KEY>https://www.virustotal.com/vtapi/v2/file/scanwhois -h hash,cymru.com 樣本文件hash

    # 獲取磁盤和內存鏡像

    # WINDOWS

    C:> psexec.exe IP -u administrator -p 123 -c mdd_l.3.exe –o C:memory.dmp

    C:> dc3dd.exe if=.c: of=d:diskiamge.dd hash=md5 log=d:output.log

    # LINUX

    dd if=/dev/fmem of=/tmp/mem_dump.dd

    # 使用LiME

    get https://github.com/504ensicslabs/LiME/archive/master.zip

    unzip master.zip

    cd LiME-master/src 

    make

    cp lime-*.ko /media/USB/

    insmod lime-3.13.0-79-generic.ko "path=/media/USB/mem_dump.lime format= raw"

    # 從內存中拷貝PE文件

    cp /proc/進程ID/exe /output

    # 創建進程core dump

    gcore 進程ID

    strings -a gcore.* | more

    dd if=/dev/sda of=/root/sda.dd

    dd if=/dev/sda | ssh root@RemoteIP "dd of=/root/sda.dd"

    # 通過netcat傳送接收鏡像文件

    bzip2 -c /dev/sda | nc 8.8.8.8 53

    nc -p 53 -l | bzip2 -d | dd of=/root/sda.dd

    6. 常用技巧和工具

    6.1 技巧

    6.1.1 WINDOWS系統篇

    # 將命令結果通過管道輸出到粘帖板,然后將粘帖板的內容重定向到文件

    C:> some_command.exe | clip

    PS C:> Get-Clipboard > clip.txt 

    # 檢查注冊表某路徑是否存在

    PS C:> Test-Path "HKCU:SoftwareMicrosoft123"

    # 可靠文件復制

    robocopy c:src 目標計算機dst /E

    # 檢查某目錄是否存在ps1,vbs擴展的文件

    PS C:> Test-Path C:ScriptsArchive* -include *.ps1, *.vbs

    # 合并多個文件

    C:> type 1.txt 2.txt > output.txt

    # 多個桌面窗口(Desktops)

    C:>"%ProgramFiles%Internet Exploreriexplore.exe" https://live.sysinternals.com/desktops.exe

    # 在遠程計算機執行命令

    C:> psexec.exe 遠程計算機 -u admin -p 123 /c c:123.exe

    PS C:> Invoke-Command -遠程計算機 { ls }

    # 比較兩個文件的差異

    PS C:> Compare-Object (-Content 1.log) -DifferenceObject (Get-Content 2.log)

    # 進制轉換與編碼

    C:> set /a 0xff

    PS C:> 0xff

    C:> certutil -decode BASE64編碼文件 output.file

    # 解碼XOR,搜索關鍵字:http 

    C:> xorsearch.exe -i -s input.file http

    6.1.2 LINUX系統篇

    1.)SNORT

    # 通過ssh在遠程服務器上抓包

    ssh root@8.8.8.8 tcpdump -i any -U -s 0 -w – 'not port 22'

    # SNORT規則檢測Meterpreter

    # Snort rules by Didier Stevens (http://DidierStevens.com)

    alert tcp HOME_NET any -> EXTERNAL_NET HTTP_PORTS (msg:"Metasploit Meterpreter"; flow:to_server,established; content:"RECV"; http_client_body; depth:4; fast_pattern; isdataat:!0,relative; urilen:23<>24,norm; content:"POST"; pcre:"/^/[a-z0-9]{4,5}_[a-z0-9]{16}//Ui"; classtype:trojan-activity; reference:url,blog.didierstevens.com/2015/05/11/detecting-network-traffic-from-metasploits-meterpreter-reverse-http-module/; sid:1618008; rev:1;)

    https://didierstevens.com/files/software/snort-rules-V0_0_1.zip

    # SNORT規則檢測PSEXEC

    alert tcp HOME_NET any -> HOME_NET [139,445] (msg:"POLICY-OTHER use of psexec remote administration tool"; flow:to_server,established; content:"|FF|SMB|A2|"; depth:5; offset:4; content:"|5C 00|p|00|s|00|e|00|x|00|e|00|c|00|s|00|v|00|c"; nocase; metadata:service netbios-ssn; reference:url,technet.microsoft.com/en-us/sysinternals/bb897553.aspx; classtype:policy-violation; sid:24008; rev:1;) 

    alert tcp HOME_NET any -> HOME_NET [139,445] (msg:"POLICY-OTHER use of psexec remote administration tool SMBv2"; flow:to_server,established; content:"|FE|SMB"; depth:8; nocase; content:"|05 00|"; within:2; distance:8; content:"P|00|S||E|00|X|00|E|00|S|00|V|00|C|00|"; fast_pattern:only; metadata:service netbios-ssn; reference:url,technet.microsoft.com/en-us/sysinternals/bb897553.aspx; classtype:policy-violation; sid:30281; rev:1;)

    2. ) Bro NSM

    # 檢測橫向滲透

    wget https://raw.githubusercontent.com/richiercyrus/Bro-Scripts/master/detect-mal-smb-files.bro

    bro -r faf-exercise.pcap detect-mal-smb-files.bro

    less notice.log

    # 檢測勒索軟件

    wget https://raw.githubusercontent.com/fox-it/bro-scripts/master/smb-ransomware/smb-ransomware.bro

    bro -r faf-exercise.pcap smb-ransomware.bro

    3.) 檢測DOS/DDOS 

    # 檢測攻擊類型SYN Flood,ICMP Flood,UDP Flood

    tshark -r 001.pcap -q -z io,phs

    tshark -c 1000 – -z io,phs

    tcpdump -tnr $ | awk -F '.' '{print $1"."$2"."$3"."$4}' | sort | uniq -c | sort -n | tail

    tcpdump -qnn "tcp[tcpflags] & (tcp-syn) != 0"

    netstat -s

    tcpdump -nn not arp and not icmp and not udp

    netstat -n | awk '{print $6}' | sort | uniq -c | sort -nr | head

    # 應用層

    tshark -c 10000 -T fields -e http.host | sort | uniq -c | sort -r | head -n 10

    tshark -r capture6 -T fields -e http.request.full_uri | sort | uniq -c | sort -r | head -n 10c

    tcpdump -n 'tcp[32:4] = 0x47455420' | cut -f 7- -d":"

    # 查找http請求中包含:GIF,ZIP,JPEG,PDF,PNG擴展的數據包

    tshark -Y "http contains "ff:d8"" || "http contains "GIF89a"" || "http contains "x50x4Bx03x04"" || "http contains "xffxd8"" || "http contains "%PDF"" || "http contains "x89x50x4Ex47""

    取'user-agent'和refer字段

    tcpdump -c 1000 -Ann I grep -Ei 'user-agent' | sort | uniq -c | sort -nr | head -1

    tcpdump -i en0 -A -s 500 | grep -i refer 

    # 第二層攻擊 

    tcpdump 'arp or icmp' 

    tcpdump -tnr 001.pcap ARP | awk -F '.' '{print 1"."2"."3"."4}' | sort | uniq -c | sort -n | tail

    tshark -r 001.pcap -q -z io,phs | grep arp.duplicate-address-detected

    6.2 兵器譜

    1.)KALI 滲透測試發行版

    https://www.kali.org

    2.)SIFT SANS 取證工具箱

    http://sift.readthedocs.org/

    3.)REMNUX 軟件逆向和病毒分析發行版

    https://remnux.org

    4.) OPENVAS

    http://www.openvas.org

    5.) Security Onion 入侵檢測、網絡安全監控、日志分析發行版

    https://securityonion.net

    6.)OSSEC 開源主機入侵檢測系統

    http://ossec.github.io 

    0x4 參考

     https://www.4hou.com/technology/10173.html

      https://github.com/fu4ck/btfm


    log文件ipsec
    本作品采用《CC 協議》,轉載必須注明作者和本文鏈接
    前言看到一篇文章講到這個內容,就打算自己也整理一下順便梳理一下思路0X01 信息收集1.收集系統信息:系統信息至關重要,關乎我們后面怎么提權中文系統:systeminfo|findstr /B /C:"OS 名稱" /C:"OS 版本". OS 名稱: Microsoft Windows Server 2008 R2 Standard. 禁用 入站 Internet Explorer / C:\Program Files \In. 800 TCP 啟用 入站 test
    內網滲透合集(二)
    2023-01-28 09:35:05
    接下來在內網肉雞再次執行:htran -p -slave 公網肉雞IP 119 127.0.0.1 8009?linux也有實現,感覺使用方法更加明朗,且與windows下的兼容 在此推薦下。把windows的小做修改下,重新編譯了下,源程序比較簡單就不上傳工程文件了,直接給個C文件,自己編譯下即可。linux下實現大同小異,只不過用的fork實現子線程。此時在滲透測試端192.168.10.50可看到通道連接成功,效果如圖4。
    紅藍對抗—藍隊手冊
    2022-03-18 14:22:22
    紅藍對抗的主要目的在于,提高公司安全成熟度及其檢測和響應攻擊的能力。
    ?RV110W路由器漏洞復現
    2021-10-31 06:43:42
    被xuanxuan老師種草了~,"一定要摸真實的設備"這句話余音繞梁,終于狠下心買了一個二手的RV110W,
    以往工作揭示了所涉及協議中的一些安全性和隱私性問題,這些工作對AirDrop進行了廣泛的研究。對將目標連接到攻擊者控制的Wi-Fi網絡的PWS進行攻擊。最近,有幾項研究發現了蘋果專有的無線協議中的嚴重漏洞。AWDL協議和對AirDrop的中間設備攻擊。到目前為止,迄今為止的工作已經深入分析了一種服務,即。但是,所涉及的上層協議仍然是未知的。
    因此做為運維人員,就必須了解一些安全運維準則,同時,要保護自己所負責的業務,首先要站在攻擊者的角度思考問題,修補任何潛在的威脅和漏洞。 本文主要分為如下部分展開:
    信息搜集:開源情報信息收集、創建企業密碼字典進入內網:基于企業弱賬號漏洞、基于系統漏洞進入、網站應用程序滲透隱匿攻擊:Command and Control、代理內網跨邊界應用:內網跨邊界轉發、內網跨邊界代理穿透、shell反彈等
    CS:GO 從0到0day!
    2023-05-31 14:30:11
    ,并詳細介紹了4種不同的邏輯漏洞。公共研究眾所周知,該公司并不是第一個在CS:GO游戲中尋找漏洞的組織,因此,可以在互聯網上搜索到很多有用的博文和PPT。專門下載舊版本,但同時該功能似乎已被 Valve 公司禁用。為了全面測試并制定漏洞利用策略,該組織決定用 Python 實現自己早期階段的服務器。函數將字符串的長度限制為 256 個字符,從而從文件名中截斷不需要
    之前剛發這篇文章不久就被要求刪除了,最近官方應該也都修的差不多了,所以再重新發一遍,僅供參考!!!隔天@Sp4ce師傅就對這個漏洞進行了研究,并記錄了這個遠程命令執行漏洞的整個分析過程,太牛了。0x02 影響版本向日葵個人版≤11.0.0.33,已測試存在遠程命令執行漏洞的一些版本如下,目前官方已經發布了漏洞修復程序,只需將向日葵升級至最新版即可。
    騎士人才系統,是一項基于 PHP+MYSQL 為核心開發的一套 免費+開源 專業人才招聘系統,使用了ThinkPHP框架(3.2.3);由太原迅易科技有限公司于2009年正式推出。為個人求職和企業招聘提供信息化解決方案, 騎士人才系統具備執行效率高、模板切換自由、后臺管理功能靈活、模塊功能強大等特點,自上線以來一直是職場人士、企業HR青睞的求職招聘平臺。
    VSole
    網絡安全專家
      亚洲 欧美 自拍 唯美 另类