خدمة تلخيص النصوص العربية أونلاين،قم بتلخيص نصوصك بضغطة واحدة من خلال هذه الخدمة
The compromised host is running Linux so we have a number of persistence mechanisms available to us. The first option which, is arguably the most straightforward is to add a public key that we control to the authorized_keys file at /root/.ssh/.Using docker-compose also allows us to specify automatic restarts which increases the backdoor's resilience.
The compromised host is running Linux so we have a number of persistence mechanisms available to us. The first option which, is arguably the most straightforward is to add a public key that we control to the authorized_keys file at /root/.ssh/. This would allow us to connect to the host via SSH without needing to run the privilege escalation exploit every time and without relying on the password for the compromised account not changing. This methodology is very common among botnets as it's both reliable and very simple to implement as pretty much all Linux distributions indented for server use run an Open-SSH service by default.
Try this now, a valid key pair can be generated for the attack box by running ssh-keygen. Once this key is added to the authorized_keys file in /root/.ssh/ you should be able to gain remote access to root whenever it's needed, simple right? Well, unfortunately, this tactic has one big disadvantage as it is highly detectable.
HIDS often feature some form of file system integrity monitoring service which, will periodically scan a list of target directories for changes with, an alert being raised every time a file is changed or added. By adding an entry to the authorized_keys file you would have triggered an alert of a fairly high severity and as a result, this might not be the best option. An alert is also raised every time an ssh connection is made so the HIDS operator will be notified every time we log on.
It would be very helpful to check how the IDS is configured before we continue as it may help us with finding vectors that aren't monitored. Wazuh has two configuration modes, local and centralised in this case, the HIDS agents are setup locally and the config file can be found at /var/ossec/etc/ossec.conf . This file lists all of the data sources that are covered by HIDS in this case, the following are enabled:
File system monitoring - As already mentioned this affects our ability to simply install ssh keys but, this also affects other persistence vectors like, cron, systemd and any attacks that require the installation of additional tools.
System log collection - This functionality will generate alerts when some post-exploitation actions are taken against the system like making SSH connections and login attempts.
System inventory - This tracks system metrics like open ports, network interfaces, packages, and processes. This affects our ability to open new ports for reverse shells and install new packages. Note, that this function currently, does not generate alerts by itself and requires the HIDS operator to write their own rules. However, A report would be available on an upstream log analysis platform like Kibana
Note, that Docker monitoring is also available, however, it is not enabled in this case which gives us a few options:
We could hijack the existing container supply chain and use it to install a backdoor into one of the containers that are hosted by the system. This would be difficult to detect without additional container monitoring and scanning technology. Credentials for a docker registry could either be phished or extracted from /root/.docker/config.json as, this location stores the credentials used with the docker login command in plaintext. This won't work in this case though, as the host we compromised doesn't have internet access and there are no credentials in /root/.docker/config.json.
We could modify the existing docker-compose setup to include a privileged SSH enabled container and mount the host's file system to it with -v /:/hostOS. The docker-compose file used to define the current setup isn't monitored by the file system integrity monitor as it's in /var/lib. Again though, this won't work well in this case as we don't have access to the internet though, you could transport the container images from the attack box to the compromised VM via SSH. You would also need to open up a new port for the ssh connection which, would show up on the system inventory report.
We could modify an existing or new docker-compose setup by, abusing the entrypoint option to grant us a reverse shell. Using docker-compose also allows us to specify automatic restarts which increases the backdoor's resilience. This option also reverses the typical client-server connection model so, we won't need to open any new ports on the host.
To perform the last option append the following to a new docker-compose file:
تلخيص النصوص العربية والإنجليزية اليا باستخدام الخوارزميات الإحصائية وترتيب وأهمية الجمل في النص
يمكنك تحميل ناتج التلخيص بأكثر من صيغة متوفرة مثل PDF أو ملفات Word أو حتي نصوص عادية
يمكنك مشاركة رابط التلخيص بسهولة حيث يحتفظ الموقع بالتلخيص لإمكانية الإطلاع عليه في أي وقت ومن أي جهاز ماعدا الملخصات الخاصة
نعمل علي العديد من الإضافات والمميزات لتسهيل عملية التلخيص وتحسينها
عام. يمكن القول إن نظام المعلومات يعزز شفافية السوق من خلال توفير المعلومات اللازمة ويعزز تداولية ال...
In this presentation, I will focus on main points: First, I will provide a definition of the concep...
في خسائر فادحة للذرة، والمحاصيل السكرية، والأعلاف النجيلية، والكينوا. لمواجهة هذه التحديات بفعالية،...
أدى الإنترنت والتطور الرقمي إلى إحداث تحول جذري في أساليب التواصل وتبادل المعلومات بين الأفراد. فنحن...
تم في هذا المشروع تطبيق مكونات الواجهة الأمامية (Front-end) والواجهة الخلفية (Back-end) الشائعة لضما...
تُعد عدالة الأحداث من أهم القضايا التي تشغل الأنظمة القانونية والاجتماعية في مختلف دول العالم، نظرًا...
كان تحالف ديلوس في البداية قوة دفاعية ناجحة، لكنه تحول مع الوقت إلى أداة للسيطرة الأثينية، مما أدى إ...
--- ### **التعريف:** عوائق التعلم التنظيمي هي **عوائق إدراكية، أو ثقافية، أو هيكلية، أو شخصية** تم...
أولا شعر الحزب الزبيري بدا يتنصيب عبد الله بن الزبير نفسه خليفة على الحجاز، واستمر تسع سنوات، وانته...
ث- الصراع: يعتبر من المفاهيم الأقرب لمفهوم الأزمة، حيث أن العديد من الأزمات تنبع من صراع بين طرفين...
تعرض مواطن يدعى عادل مقلي لاعتداء عنيف من قبل عناصر مسلحة تابعة لمليشيا الحوثي أمام زوجته، في محافظة...
زيادة الحوافز والدعم المالي للأسر الحاضنة لتشجيع المشاركة. تحسين تدريب ومراقبة العاملين الاجتماعيين...