顯示文章

這裡允許您檢視這個會員的所有文章。請注意, 您只能看見您有權限閱讀的文章。


文章 - Demon

頁: [1]
1
我查了docker plugin 好像有兩種方案

一、路由方式

二、隧道模式

但我還真沒看過有人做過大規模跨廣域網路 internet 做佈署
 
就是在公司放台docker leader ,各地分公司放worker ,然後去做遠端佈署,請問有人做過這種佈署嗎?

2
雜七雜八 / Re: 資訊業轉戰工程業
« 於: 2017-10-19 08:34 »
好幾年沒來這了逛了,台灣IT不好幹,錢少雜事多....再幾年想轉職歸隱田園了........ :'(

3
原帖:http://social.technet.microsoft.com/Forums/zh-TW/generalsecurityzhcht/thread/02813fc6-b2d8-4a68-b19f-84465da8f8f4

由於公司之前一台機器中一個NDIS.SYS檔的Rookit,導致機器開機時跑很慢

就是它:

http://bbs.polylite.tw/vir.jpg

 

我修復完後,卻發現網卡還是有問題,如圖:

http://bbs.polylite.tw/net.jpg

重點是我是管理員,但卻無法去勾選~~

這是更改到Registry哪裡阿??

4
http://milw0rm.com/exploits/8478

把8478 存成shell script
$ps aux |grep /sbin/udev
root 673 0.0 0.0 2424 276 ? S<s 15:27 0:00 /sbin/udevd -d
cho 6619 0.0 0.0 4476 740 pts/2 S+ 20:58 0:00 grep /sbin/udev
將udevd 的PID -1
$sh 8478 672

我勒~~Fedora 8、10 都沒測試成功!!聽說有人成功提昇權限於debian...不知有影無??

5
此問題已解~~ ;D ;D ;D ;D ;D

6
Buffer Overrun In RPCSS Service Could Allow Code Execution (824146)
http://www.microsoft.com/technet/se...in/MS03-039.asp

Buffer Overrun In RPCSS Service Could Allow Code Execution (824146)

Originally posted: September 10, 2003

Summary

Who should read this bulletin: Users running Microsoft ?Windows ?

Impact of vulnerability: Run code of attacker's choice

Maximum Severity Rating: Critical

Recommendation: System administrators should apply the security patch immediately

End User Bulletin:
An end user version of this bulletin is available at:

http://www.microsoft.com/security/s...s/ms03-039.asp.

Protect your PC:
Additional information on how you can help protect your PC is available at the following locations:
- End Users can visit http://www.microsoft.com/protect
- IT Professionals can visit http://www.microsoft.com/technet/se...ps/pcprotec.asp

Affected Software:
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows NT Server?4.0
- Microsoft Windows NT Server 4.0, Terminal Server Edition
- Microsoft Windows 2000
- Microsoft Windows XP
- Microsoft Windows Server 2003
Not Affected Software:
- Microsoft Windows Millennium Edition

Technical description:

The fix provided by this patch supersedes the one included in Microsoft Security Bulletin MS03-026.

Remote Procedure Call (RPC) is a protocol used by the Windows operating system. RPC provides an inter-process communication mechanism that allows a program running on one computer to seamlessly access services on another computer. The protocol itself is derived from the Open Software Foundation (OSF) RPC protocol, but with the addition of some Microsoft specific extensions.

There are three identified vulnerabilities in the part of RPCSS Service that deals with RPC messages for DCOM activation- two that could allow arbitrary code execution and one that could result in a denial of service. The flaws result from incorrect handling of malformed messages. These particular vulnerabilities affect the Distributed Component Object Model (DCOM) interface within the RPCSS Service. This interface handles DCOM object activation requests that are sent from one machine to another.

An attacker who successfully exploited these vulnerabilities could be able to run code with Local System privileges on an affected system, or could cause the RPCSS Service to fail. The attacker could then be able to take any action on the system, including installing programs, viewing, changing or deleting data, or creating new accounts with full privileges.

To exploit these vulnerabilities, an attacker could create a program to send a malformed RPC message to a vulnerable system targeting the RPCSS Service.

Microsoft has released a tool that can be used to scan a network for the presence of systems which have not had the MS03-039 patch installed. More details on this tool are available in Microsoft Knowledge Base article 827363. This tool supersedes the one provided in Microsoft Knowledge Base article 826369. If the tool provided in Microsoft Knowledge Base Article 826369 is used against a system which has installed the security patch provided with this bulletin, the superseded tool will incorrectly report that the system is missing the patch provided in MS03-026. Microsoft encourages customers to run the latest version of the tool available in Microsoft Knowledge Base article 827363 to determine if their systems are patched.

Mitigating factors:
- Firewall best practices and standard default firewall configurations can help protect networks from remote attacks originating outside of the enterprise perimeter. Best practices recommend blocking all ports that are not actually being used. For this reason, most systems attached to the Internet should have a minimal number of the affected ports exposed.

For more information about the ports used by RPC, visit the following Microsoft Web site:http://www.microsoft.com/technet/pr...rt4/tcpappc.asp

Vulnerability identifier:
Buffer Overrun: CAN-2003-0715

Buffer Overrun: CAN-2003-0528

Denial of Service: CAN-2003-0605



請到這下載修正程序:
http://www.microsoft.com/downloads/details.aspx?FamilyID=f4f66d56-e7ce-44c3-8b94-817ea8485dd1&displaylang=zh-tw

7
Computer 討論版 / [轉貼]INTEL 晶片的BUG
« 於: 2003-08-25 04:03 »
轉帖至: 綠盟科技
作者: 袁仁廣(袁哥)
一些INTEL的PIII、PII晶片的call esp指令有BUG,導致call esp會出現不可預料的結果,害得寫溢出程式利用call esp的通用跳轉位址在有缺陷的晶片上不可用。大家去找INEL賠償吧。:)

      INTEL自己的文檔有相關介紹,可以搜索call esp,下面文檔的第39頁有相關說明。其實INTEL的BUG也挺多的。
http://www.intel.com/design/PentiumIII/specupdt/24445348.pdf
不是所有的,只是部分PIII,PII有BUG。其實INTEL晶片386還是什麼的就是跳轉到ESP而不是ESP-4了。其實就是EIP賦值順序的問題。

     老的8086和有BUG的PIII晶片
     CALL ESP 執行的微代碼是:

     esp-=4;
       [esp]=返回地址;
     eip=esp;
     
      沒有問題晶片執行CALL ESP 的微代碼是:

     eip=esp;
       esp-=4;
       [esp]=返回地址;

    有問題的晶片執行CALL ESP後EIP指向的就是返回位址了,這不同地方的call不同,返回位址也不應該當指令來執行,顯然那種邏輯是錯誤的,所以INTEL就列為了BUG。

底下為測試程式:
/*
   intel call esp bug test.c

*/
#include <windows.h>
#include <stdio.h>
#include <string.h>

int main(int argc, char **argv)
{

    printf("\r\nINTEL CALL ESP BUG TEST!\r\n");
    printf("\r\nyuange@nsfocus.com\r\n");

    __try
    {    
          _asm
          {
             sub esp,0x10
             mov byte ptr[esp],0xc3  //ret
             call esp
             add esp,0x10
          }
          printf("\r\nNO BUG!\r\n");

    }__except(1)
    {
          printf("\r\nFIND BUG!\r\n");
    }

   

}

8
引述: "Tim"
看不懂這個英文單字,「gulu」是啥意思?

guru 解釋:
一個用可以理解的方法來幫助你解決問題或答案的技術專家!!

資料來原:M$電腦字典

另解:
guru=也就是專家啦!!
而專家=高手
高=high,手=hand
所以高手=netman=guru=high hand
哈哈!!
[另解]這部份是我胡說一通!!請見諒............................

頁: [1]