HW弹药库之红队作战⼿册尝试⽬标DNS是否允许区域传送,如果不允许则继续尝试⼦域爆破 批量抓取⽬标所有⼦域 Web banner 批量对⽬标所有⼦域集中进⾏基础服务端⼝探测识别 批量识别⽬标 所有存活Web站点的Web程序指纹 及其详细版本 从 Git 中查找⽬标泄露的各类 敏感⽂件 及 账号密码,偶尔甚⾄还能碰到⽬标不⼩⼼泄露的各种云的 "AccessKe y" 从⽹盘 / 百度⽂库 中查找⽬标泄露的各类 敏感⽂件 及 账号密码 CVE-2014-4210 SSRF 控制台弱⼝令,部署webshell Jboss CVE-2015-7501 CVE-2017-7504 CVE-2017-12149 未授权访问,部署webshell 控制台弱⼝令,部署webshell wildfly [jboss 7.x 改名为 wildfly] 控制台弱⼝令,部署webshell Tomcat 直接把8009端⼝暴露在外⽹的不太多,稍鸡肋 ] 控制台弱⼝令,部署webshelll [ 注: 7.x版本后,默认加了防爆机制 ] Jekins CVE-2018-1999002 [任意⽂件读取] 未授权访问,任意命令执⾏ 控制台弱⼝令,任意命令执⾏ ElasticSearch CVE-2014-3120 [专⻔针对⽼版本(⽆沙盒)RCE] CVE-2015-14270 码力 | 19 页 | 1.20 MB | 1 年前3
Flashcat 让监控分析变简单,Flashcat产品技术交流⻓ 3. 缺乏对重要故障场景的应急预案的梳理和演练 效果: 1. 通过落地Flashcat平台,公司A级产品线北极星指标监控实现了全覆盖,P3级 及以上故障北极星监控发现率为100%,MTTI控制在5分钟以内。真正做到了先 于⽤户发现问题,让故障处理变被动为主动。 。 2. 故障定位能⼒建设也已取得重要进展,我们和业务⼀起梳理了公司A级产品线 核⼼主流程依赖的接⼝和模块,并将梳理结果落地到Flashcat灭⽕图系统,并0 码力 | 43 页 | 6.54 MB | 1 年前3
MITRE Defense Agile Acquisition Guide - Mar 2014Agile approach, program managers need to work with stakeholders representing the requirements, systems engineering, contracting, cost estimating, and testing communities to design processes around short processes. It presents options for structuring a program, developing a contract strategy, shaping systems engineering processes, managing requirements, and developing cost estimates for programs with a ....................................................................................... 20 9 Systems Engineering ....................................................................................0 码力 | 74 页 | 3.57 MB | 6 月前3
The DevOps Handbookthroughout the organization 2. Ch. 19 – Enable and Inject Learning into Daily Work a. Complex systems are impossible to predict for all outcomes i. Dr. Steven Spear - resilient organizations are “skilled the tools that we gave them.” 2. Accidents are due to the inevitable design problems in complex systems that we build; they are system problems – not individual problems iii. Effective practices 1. Business Review): organizations are typically structured as:1. Standardized Model – where routine and systems govern everything; including strict compliance with budget and schedule 2. Experimental Model –0 码力 | 9 页 | 25.13 KB | 6 月前3
Cynefin - Agile for Defenseself-evident to a reasonable person • Sense - Categorize - Respond • Apply “Best Practices” Ordered Systems Obvious Sense Categorize Respond Best Practice Rigid ConstraintsComplicated • Cause & Effect Practices” Ordered Systems Obvious Sense Categorize Respond Best Practice Complicated Sense Analyze Respond Good Practice Rigid Constraints Governing ConstraintsComplex • Systems are without agents also modify the system • Probe - Sense - Respond • Apply “Emergent Practices” Unordered Systems Obvious Sense Categorize Respond Best Practice Complicated Sense Analyze Respond Good0 码力 | 17 页 | 3.75 MB | 6 月前3
The DevOps HandbookWay: The Principles of Feedback 27 i. KEEP PUSHING QUALITY CLOSER TO THE SOURCE 1. In complex systems, adding more inspection steps and approval processes actually increases the likelihood of future organization c. Most admired DevOps organizations and successful 2015 IPO. b. CONSIDER BOTH SYSTEMS OF RECORD AND SYSTEMS OF ENGAGEMENT i. Gartner Bi-modal IT 1. Type 1 – System of Record – “Doing it right” production environment and ensuring service levels are met v. Infosec – team responsible for securing systems and data vi. Release Managers – the people responsible for coordinating the production deployment0 码力 | 8 页 | 22.57 KB | 6 月前3
A Seat at the Table: IT Leadership in the Age of Agility - Part 2exactly what IT leaders must avoid; continuously transforming and modernizing the company’s IT systems makes Fowler’s strangler pattern into an IT strategy rather than just a coding tactic. If you missed planning, and cost reduction. It documented as-is and to-be architectures, demonstrated alignment of systems with business needs, and did the “rigorous” up-front analysis and centralized planning that could Changed in a way that now favors “building” over “buying.” There are now ways of custom-developing systems that preserve many of the advantages of buying off the shelf. The risk of developing a system0 码力 | 7 页 | 387.61 KB | 6 月前3
No Silver Bullet – Essence and Accident in Software Engineeringestablishing software requirements • Growing software organically, adding more and more functions to systems as they are run, used, and tested”Who said it?Frederick Brooks Jr. • Joined IBM in 1956 • Manager Difficulty“Let us consider the inherent properties of this irreducible essence of modern software systems: complexity, conformity, changeability, and invisibility.”Complexity • Software entities are more other high-level language advances • Object-oriented programming • Artificial intelligence • Expert systems • “Automatic” programming • Graphical programming • Program verification • Environments and tools0 码力 | 35 页 | 1.43 MB | 6 月前3
The DevOps HandbookAdrian Cockcraft – “Monitoring is so important that our monitoring systems need to be more available and scalable than the systems being monitored.” c. CREATE APPLICATION LOGGING TELEMETRY THAT HELPS Blue- Green, Canary release patterns b. DEV SHARES PAGER ROTATION DUTIES WITH OPS i. Complex systems will inevitably have unexpected problems ii. Prevent upstream work from locally optimizing at the that enable change implementers to fully own the quality of their change ii. Create ever-safer systems of work iii. John Allspaw – A newly hired junior engineer asked permission to deploy a small HTML0 码力 | 8 页 | 24.02 KB | 6 月前3
Open Discussion on Project Planningleaders must encourage systems engineers to engage developers, testers, users, and other stakeholders in their disciplined engineering processes. (No ivory towers) While Agile systems engineering involves collaboration and strengthen teaming arrangements. Ensure that once a clear architecture is in place, systems engineers continue to refine it as they learn more from the development sprints and releases. Cost0 码力 | 2 页 | 49.30 KB | 6 月前3
共 14 条
- 1
- 2













