积分充值
 首页
前端开发
AngularDartElectronFlutterHTML/CSSJavaScriptReactSvelteTypeScriptVue.js构建工具
后端开发
.NetC#C++C语言DenoffmpegGoIdrisJavaJuliaKotlinLeanMakefilenimNode.jsPascalPHPPythonRISC-VRubyRustSwiftUML其它语言区块链开发测试微服务敏捷开发架构设计汇编语言
数据库
Apache DorisApache HBaseCassandraClickHouseFirebirdGreenplumMongoDBMySQLPieCloudDBPostgreSQLRedisSQLSQLiteTiDBVitess数据库中间件数据库工具数据库设计
系统运维
AndroidDevOpshttpdJenkinsLinuxPrometheusTraefikZabbix存储网络与安全
云计算&大数据
Apache APISIXApache FlinkApache KarafApache KyuubiApache OzonedaprDockerHadoopHarborIstioKubernetesOpenShiftPandasrancherRocketMQServerlessService MeshVirtualBoxVMWare云原生CNCF机器学习边缘计算
综合其他
BlenderGIMPKiCadKritaWeblate产品与服务人工智能亿图数据可视化版本控制笔试面试
文库资料
前端
AngularAnt DesignBabelBootstrapChart.jsCSS3EchartsElectronHighchartsHTML/CSSHTML5JavaScriptJerryScriptJestReactSassTypeScriptVue前端工具小程序
后端
.NETApacheC/C++C#CMakeCrystalDartDenoDjangoDubboErlangFastifyFlaskGinGoGoFrameGuzzleIrisJavaJuliaLispLLVMLuaMatplotlibMicronautnimNode.jsPerlPHPPythonQtRPCRubyRustR语言ScalaShellVlangwasmYewZephirZig算法
移动端
AndroidAPP工具FlutterFramework7HarmonyHippyIoniciOSkotlinNativeObject-CPWAReactSwiftuni-appWeex
数据库
ApacheArangoDBCassandraClickHouseCouchDBCrateDBDB2DocumentDBDorisDragonflyDBEdgeDBetcdFirebirdGaussDBGraphGreenPlumHStreamDBHugeGraphimmudbIndexedDBInfluxDBIoTDBKey-ValueKitDBLevelDBM3DBMatrixOneMilvusMongoDBMySQLNavicatNebulaNewSQLNoSQLOceanBaseOpenTSDBOracleOrientDBPostgreSQLPrestoDBQuestDBRedisRocksDBSequoiaDBServerSkytableSQLSQLiteTiDBTiKVTimescaleDBYugabyteDB关系型数据库数据库数据库ORM数据库中间件数据库工具时序数据库
云计算&大数据
ActiveMQAerakiAgentAlluxioAntreaApacheApache APISIXAPISIXBFEBitBookKeeperChaosChoerodonCiliumCloudStackConsulDaprDataEaseDC/OSDockerDrillDruidElasticJobElasticSearchEnvoyErdaFlinkFluentGrafanaHadoopHarborHelmHudiInLongKafkaKnativeKongKubeCubeKubeEdgeKubeflowKubeOperatorKubernetesKubeSphereKubeVelaKumaKylinLibcloudLinkerdLonghornMeiliSearchMeshNacosNATSOKDOpenOpenEBSOpenKruiseOpenPitrixOpenSearchOpenStackOpenTracingOzonePaddlePaddlePolicyPulsarPyTorchRainbondRancherRediSearchScikit-learnServerlessShardingSphereShenYuSparkStormSupersetXuperChainZadig云原生CNCF人工智能区块链数据挖掘机器学习深度学习算法工程边缘计算
UI&美工&设计
BlenderKritaSketchUI设计
网络&系统&运维
AnsibleApacheAWKCeleryCephCI/CDCurveDevOpsGoCDHAProxyIstioJenkinsJumpServerLinuxMacNginxOpenRestyPrometheusServertraefikTrafficUnixWindowsZabbixZipkin安全防护系统内核网络运维监控
综合其它
文章资讯
 上传文档  发布文章  登录账户
IT文库
  • 综合
  • 文档
  • 文章

无数据

分类

全部系统运维(8)网络与安全(8)

语言

全部英语(7)中文(简体)(1)

格式

全部DOC文档 DOC(5)PDF文档 PDF(3)
 
本次搜索耗时 0.016 秒,为您找到相关结果约 8 个.
  • 全部
  • 系统运维
  • 网络与安全
  • 全部
  • 英语
  • 中文(简体)
  • 全部
  • DOC文档 DOC
  • PDF文档 PDF
  • 默认排序
  • 最新排序
  • 页数排序
  • 大小排序
  • 全部时间
  • 最近一天
  • 最近一周
  • 最近一个月
  • 最近三个月
  • 最近半年
  • 最近一年
  • pdf文档 HW弹药库之红队作战⼿册

    抓取登录凭证 => 跨平台横向 => ⼊⼝维持 => 数据回 传 => 定期权限维护 0x01 ⼊⼝权限获取 [前期侦察,搜集阶段本身就不存在太多可防御的点,⾮防 御重⼼] 绕CDN找出⽬标所有真实ip段 找⽬标的各种Web管理后台登录⼝ 批量抓取⽬标所有真实C段 Web banner 批量对⽬标所有真实C段 进⾏基础服务端⼝扫描探测识别 尝试⽬标DNS是否允许区域传送,如果不允许则继续尝试⼦域爆破 能正常进⾏的,此处不再赘述 查看当前shell权限 及 详细系统内核版本 获取当前系统的 详细ip配置,包括 所在域, ip, 掩码, ⽹关, 主备 dns ip 获取当前系统最近的⽤户登录记录 获取当前⽤户的所有命令历史记录 [ 主要针对linux,⾥⾯可能包含的有各类敏感账号密码,ip,敏感服务配置... ] 获取本机所有 服务/进程 [包括各个进程的详细权限,也包括⽬标系统中的可疑恶意进程(有可能是同⾏的⻢)]/端 计划任务所对应的执⾏脚本内容 [ 有些执⾏脚本中很可能存的有各种连 接账号密码 ] 获取当前⽤户 桌⾯ 及 回收站 ⾥的所有⽂件列表 获取当前系统的所有存在suid权限的⼆进制程序 获取当前系统代理 [ ip & 端⼝ ] 获取当前系统所有的⾃启动注册表项值 获取当前系统的所有 ipc 连接 及 已启⽤共享 获取当前系统的所有挂载[mount] 获取当前系统的防⽕墙状态 获取当前系统所有分区/盘符及其详细使⽤情况
    0 码力 | 19 页 | 1.20 MB | 1 年前
    3
  • word文档 DoD CIO Enterprise DevSecOps Reference Design - Summary

    verify. Key aspects of zero trust at the container level include mutual Transport Layer Security authentication (mTLS), an encrypted communication tunnel between containers, strong identities per Pod using service 5. DCAR for the hardened containers 6. Common Vulnerabilities and Exposures (CVE)Service / host-based security to provide CVEs for the security sidecar container CSIAC Webinars - DoD Enterprise
    0 码力 | 8 页 | 3.38 MB | 5 月前
    3
  • pdf文档 MITRE Defense Agile Acquisition Guide - Mar 2014

    the method does not consist of simply following a set of prescribed processes, but is designed to allow dynamic, tailored, and rapidly evolving approaches to support each organization’s IT environment. Assessment Areas Consider Traditional Practices and require frequent capability upgrades (<1 year). allow iterative development or lacks the ability to absorb frequent updates. User representatives and large DoD IT programs.1 The key is to dismiss misconceptions about what the acquisition process can allow and challenge the art of the possible. Within a sprint (e.g., one month), the development team designs
    0 码力 | 74 页 | 3.57 MB | 5 月前
    3
  • word文档 The DevOps Handbook

    Examples of potentially significant events (Gartner’s GTP Security & Risk Management group) 1. Authentication/authorization decisions 2. System and data access 3. System and application changes, especially
    0 码力 | 8 页 | 24.02 KB | 5 月前
    3
  • pdf文档 Cynefin - Agile for Defense

    • Open discussion - need interactive communication, try crowd-sourcing or positive deviance - allow people to discuss solutions that are already working within the organization itself, rather than They provide structure & coherence as they gain momentum. • Encourage dissent & format debate - allow rigorous review, critique, and drive the best approach • Monitor for emergence - foster creative
    0 码力 | 17 页 | 3.75 MB | 5 月前
    3
  • word文档 The DevOps Handbook

    metrics observed, investigative paths taken, results, and other resolutions considered 2. Don’t allow fear of punishment or retribution creep in due to words or behaviors – find a facilitator to start or replacement iii. Create “buoys, not boundaries”; navigate the channel, mark the channel, and allow people to explore past it. 1. The marked channel provides safe, supported passage 2. You can go
    0 码力 | 9 页 | 25.13 KB | 5 月前
    3
  • word文档 A Seat at the Table: IT Leadership in the Age of Agility - Part 2

    learning.  we would gauge progress by seeing operational results . Agile and Lean approaches allow teams to quickly put product in the hands of users. This not only delivers value immediately, but might begin the project with a hypothesis of what will best accomplish the objectives, but then allow requirements to change. Based on what we learned, we would re-validate these hypotheses. Oversight
    0 码力 | 7 页 | 387.61 KB | 5 月前
    3
  • word文档 A Seat at the Table - IT Leadership in the Age of Agility

    Better Way to Plan: Nevertheless, planning is important. In my role, I need to decide whether to allow an initiative to begin, which of course depends on whether I am satisfied with its plan. I might
    0 码力 | 4 页 | 379.23 KB | 5 月前
    3
共 8 条
  • 1
前往
页
相关搜索词
HW弹药药库弹药库红队作战DoDCIOEnterpriseDevSecOpsReferenceDesignSummaryMITREDefenseAgileAcquisitionGuideMar2014TheDevOpsHandbookCynefinforSeatattheTableITLeadershipinAgeofAgilityPart
IT文库
关于我们 文库协议 联系我们 意见反馈 免责声明
本站文档数据由用户上传或本站整理自互联网,不以营利为目的,供所有人免费下载和学习使用。如侵犯您的权益,请联系我们进行删除。
IT文库 ©1024 - 2025 | 站点地图
Powered By MOREDOC AI v3.3.0-beta.70
  • 关注我们的公众号【刻舟求荐】,给您不一样的精彩
    关注我们的公众号【刻舟求荐】,给您不一样的精彩