Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

[operation and maintenance Security]-Safety terminology 01

2025-04-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Security terminology:

Broilers:

Family machine / Internet bar machine

A controlled machine.

Catch a chicken:

Refers to the control of the machine by scanning weak passwords, explosions, and loopholes.

The process of capturing chickens: IP network segment scan-> port scan-> password burst-> planting * *

* Classification:

Computer *:

Web page *:

Malaysia

Pony: small size, you can upload large files or WebShell.

One sentence *: one line of code

Web page *:

Webshell is a command execution environment in the form of web files such as asp, php, jsp or cgi, which can also be called a web page backdoor. * after *, the asp or php backdoor files are usually mixed with the normal web page files in the WEB directory of the website server, and then you can use the browser to access the asp or php backdoor to get a command execution environment to achieve the purpose of controlling the website server.

Honeypot:

Honeypot technology is essentially a technology to deceive * parties. By arranging hosts, network services or information that are used as bait, honeypot technology can induce * parties to implement * *. Thus, we can capture and analyze the behavior, understand the tools and methods used by the parties, speculate the intentions and motives, and give the defenders a clear understanding of the security threats they face. And through technical and management means to enhance the security protection capability of the actual system.

A honeypot is like an intelligence gathering system. The honeypot seems to be a deliberate target to lure people to come. So after the * *, you can know how he succeeded and keep abreast of the latest * and vulnerabilities launched against the server. You can also collect tools and master their social networks by eavesdropping on the connections between them.

Dark net:

The Internet consists of three layers of network: surface network, deep network and dark network.

LAN-> Surface net-> Deep net-> Dark net

The dark net is a subset of the deep net

What is the difference between a deep net and a dark net?

Exempt from killing:

Make antivirus software a decoration.

APT***:

APT (Advanced Persistent Threat) is an advanced persistent threat. The use of advanced means for specific goals in the form of a long-term sustainable network.

China is the main victim of APT***

Exploit 、 POC:

Often look at an online version of EXP that someone asks for help.

Exploit means exploit in English, and it means vulnerability exploitation in the eyes of the government. If there is a loophole, there is not necessarily an Exploit. If there is an Exploit, there must be a loophole.

Proof of concept (English: Proof of concept, referred to as POC) is a short and incomplete implementation of some ideas to prove their feasibility and demonstrate their principles. Its purpose is to verify some concepts or theories. Proof of concept is generally considered to be a prototype of a landmark implementation.

Private network *:

Social Engineering:

In computer science, social engineering refers to the way in which people are psychologically affected, make certain actions or disclose some confidential information through legal communication with others. This is often thought of as an act of defrauding others to collect information, fraud, and computer systems. In the Anglo-American common law system, this act is generally regarded as an infringement of privacy.

Social work library:

A social work library is a place where leaked user data are analyzed and then archived centrally. Most of these user data come from data packets obtained by bumping into the database in the past. in addition to the account password, the data type also contains additional data brought by different industries to which the website belongs.

Google *:

* *:

The homonym of * * is the corresponding out-of-library. Taking off the library means: it refers to obtaining the database of the website, the information of members or the information you need by illegal means. To put it simply, download the database.

Promotion of rights:

As the name implies, after getting the WebShell, it will be promoted from an ordinary user to an administrator.

0day:

0 daylighting, a way of using computer software

In the computer world, zero-day vulnerabilities or 00:00 difference vulnerabilities (English: Zero-day exploit, zero-day, 0-day) usually refer to security vulnerabilities that have not yet been patched, while zero-day * or 00:00 difference * * (English: Zero-day attack) refers to the exploitation of this vulnerability. The person who provides details of the vulnerability or exploits the program is usually the discoverer of the vulnerability. The exploitation program of zero-day vulnerability is a great threat to network security, so zero-day vulnerability is not only the favorite of * *, but also an important parameter to evaluate the technical level of * *.

Side station, section C

Sidelines: other sites on the server where the target site is located, and then find a way to step into the real target site directory.

Segment C: any machine in the network segment may sniff the account password as long as the subnet wants to be the same.

APT (Advnced Persistent Th

Reat) refers to advanced persistent threats. The use of advanced means for specific goals in the form of a long-term sustainable network.

China is an APT attack.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report