MITRE Defense Agile Acquisition Guide - Mar 2014.................................................................................................. 10 6 Tailoring Program Structure and Processes for Agile Development ............................. ............................................................................................. 27 10 Contracting...................................................................................... development testing. Leadership actively supports Agile development practices and provides “top cover” to use non-traditional processes and methods. Leadership Support Leadership prefers0 码力 | 74 页 | 3.57 MB | 5 月前3
HW弹药库之红队作战⼿册其它的⼀些相对边缘性的服务均未提及 同样,已按 "实际攻击利⽤的难易程度" 及 "获取到的shell权限⾼低" 为标准进⾏了详细排序 如下,就每个端⼝的具体攻击利⽤⽅式,进⾏了简要说明 Top Port List Mssql [ 默认⼯作在tcp 1433端⼝, 弱⼝令, 敏感账号密码泄露, 提权, 远程执⾏, 后⻔植⼊ ] SMB [ 默认⼯作在tcp 445端⼝ [成功的前提是 保证事先已做好各种针对性免杀] Windows 系统漏洞 本地提权 [成功的前提是, 保证事先已做好各种针对性免杀] BypassUAC [ win7 / 8 / 8.1 / 10 ] MS14-058[KB3000061] [重点] MS14-068[KB3011780] [重点] ms15-051[KB3045171] 针对域管的各种权限维持技巧 ⾦票 Skeleton Key DSRM密码同步 OWA后⻔ ... 域内 Exchange 邮件数据脱取 利⽤Ews接⼝通过PTH的⽅式脱邮件 0x10 内⽹安全 [跨平台横向渗透 (远程执⾏),防御重点 ( "重中之重" ) ] 从 Windows 平台 横向⾄ Windows 平台 注: 以下某些远程执⾏⽅式, 即可直接⽤明⽂账号密码 亦可0 码力 | 19 页 | 1.20 MB | 1 年前3
The DevOps Handbookfailure modes and then testing to ensure they operate as expected iv. Great Amazon Reboot of 2014 – 10% of Amazon EC2 servers had to reboot for Xen emergency security patch. At Netflix, zero downtime, Investigation Report – studies over 85K cardholder breaches. 10 vulnerabilities accounted for 97% of the exploits used. 8 of the 10 exploits were over 10 years old. i. ENSURE SECURITY OF THE ENVIRONMENT i.0 码力 | 9 页 | 25.13 KB | 5 月前3
The DevOps Handbookas in production v. Dev & Ops gain shared mastery of application & environment interactions 3. Ch. 10 Enable Fast and Reliable Automated Testing a. Undesired outcomes result from finding and fixes errors of effort supporting new features, 20% on detailed planning, 25% on porting code amongst branches, 10% integrating, 15% manual testing. ii. Implemented Trunk-based development & CI iii. After CI: 40% based upon new constraints, goals, and functionality iii. What works at scale 1X rarely works at scale 10X or 100X d. USE THE STRANGLER APPLICATION PATTERN TO SAFELY EVOLVE OUR ENTERPRISE ARCHITECTURE i0 码力 | 8 页 | 23.08 KB | 5 月前3
The Goal - A Process of Ongoing Improvementincrease the capacity of the plant is to increase the capacity of only the bottleneck. Story - NCX-10 n/c machine idle on lunch break, pile of inventory in front of heat treat Jonah: “Whatever is available world’. What is the process? STEP 1 IDENTIFY the systems’ constraint (bottleneck at the NCX10 machine) STEP 2 Decide how to EXPLOIT the constraint (Machines should not take lunch breaks)0 码力 | 6 页 | 100.81 KB | 5 月前3
DoD CIO Enterprise DevSecOps Reference Design - SummaryDevSecOps MVP Image from https://github.com/jondavid-black/DevOpsForDefense/raw/master/Meetup/2019/2019-10%20DO4D%20- %20DevSecOps%20Reference%20Design.pdfContainerized Software Factory Reference DesignSoftware0 码力 | 8 页 | 3.38 MB | 5 月前3
The DevOps Handbookwith hard or soft limits) 7. Health & availability 8. Startups & shutdowns 9. Faults & errors 10. Circuit breaker trips 11. Delays 12. Backup success/failure d. USE TELEMETRY TO GUIDE PROBLEM-SOLVING0 码力 | 8 页 | 24.02 KB | 5 月前3
The DevOps Handbookcompartmentalized and well-defined interfaces k. KEEP TEAM SIZES SMALL (THE “2-PIZZA TEAM” RULE) 10. Ch. 8 How to Get Great Outcomes by Integrating Operations into the daily Work of Development a0 码力 | 8 页 | 22.57 KB | 5 月前3
Flashcat 让监控分析变简单,Flashcat产品技术交流缺少业务维度的监控 3. 缺乏统⼀的稳定性视图,缺乏故障定位的驾驶舱 效果: 1. 通过Flashcat平台,整合了Prometheus、ClickHouse、⽇志、云监控等多个 数据源,其中包括近10个 Prometheus 集群, ⼗余个⽇志主题,实现统⼀的报 警管理、数据可视化,降低了监控⼯具的维护成本,仅需投⼊⼀个⼈⼒。 2. 建⽴了⼀整套稳定性的量化体系,依靠北极星第⼀时间发现故障,依靠灭⽕图0 码力 | 43 页 | 6.54 MB | 1 年前3
共 9 条
- 1













