运维上海 2017-采用Harbor开源企业级Registry实现高效安全的镜像运维 -张海宁
RBAC: admin, developer, guest – AD/LDAP integration • Policy based image replication • Vulnerability Scanning • Notary • Web UI • Audit and logs • Restful API for integration • Lightweight and easy Replication Job Services Notary client Remote Harbor Instance Notary Registry V2 Vulnerability Scanning Admin Service Harbor users and partners (selected) 12 Image replication (synchronization) Image is pulled using digest • Perform vulnerability scanning – Prevent images with vulnerabilities from being pulled – Regular scanning based on updated vulnerability database 21 Content trust for image0 码力 | 41 页 | 4.94 MB | 1 年前3联想-贺钢架构工作在国际化项目中的应用实例
安全设计 安全设计 服务器安全 -- Penetration Testing(渗透测试) • Step 1: Reconnaissance • Step 2: Scanning • Step 3: Exploitation • Step 4: Keeping Access • Step 5: Covering Tracks 服务器安全 -- Reconnaissance Attack Sites 服务器安全 -- Scanning • WiFi • Network Mapping • Port Scanning • OS Fingerprinting • Firewalking • Evading IDS/IPS with • Vulnerability Scanning • Web/CGI Scanning • SMB Sessions 端到端的安全设计0 码力 | 53 页 | 2.36 MB | 1 年前3采用开源Harbor Registry实现高效安全的容器镜像运维
Replication Job Services Notary client Remote Harbor Instance Notary Registry V2 Vulnerability Scanning Admin Service 基于角色的访问控制 18 项目 Project 成员 Members 镜像 Images Guest: Developer:0 码力 | 29 页 | 3.97 MB | 1 年前3大学霸 Kali Linux 安全渗透教程
ports * -b Read in the banner received from the scanned port * -t 0-9 Set the TTL in seconds when scanning a TCP port ( Default 2 ) *Requires the -p flagged to be passed 以上信息显示了dmitry命令的语法格式和所有可用参数。下面使用dmitry命令的-s选 5.13所示。 图5.13 启动的插件程序 (11)在该界面单击Save按钮,将显示如图5.14所示的界面。 图5.14 新建的策略 (12)从该界面可以看到新建的策略Local Vulnerability Assessment,表示该策略 已创建成功。 2. 新建扫描任务 策略创建成功后,必须要新建扫描任务才能实现漏洞扫描。下面将介绍新建扫描任 务的具体操作步骤。 大学霸 Kali Linux 描。在该界面单击New Scan按钮,将显示如图5.16所示。 图5.16 新建扫描任务 (3)在该界面设置扫描任务名称、使用策略、文件夹和扫描的目标。这里分别设 置为Sample Scan、Local Vulnerability Assessment(前面新建的策略)、My Scans和192.168.41.0/24。然后单击Launch按钮,将显示如图5.17所示的界面。 大学霸 Kali Linux 安全渗透教程0 码力 | 444 页 | 25.79 MB | 1 年前3openEuler 21.03 技术白皮书
openEuler 21.03 Technical White Paper Live Kernel Upgrade A live kernel upgrade, including CVE vulnerability fixes and security kernel replacement, does not interrupt ongoing services. Before a live kernel LRU-based pageout kswap mechanism of the OS, etMem is more flexible and accurate. 2. Memory scanning: The new kernel function is triggered by the user-mode etMem process. It scans for the memory0 码力 | 21 页 | 948.66 KB | 1 年前32021 中国开源年度报告
段夕华:不知道 21 年底所爆发的 log4j 漏洞,是否会让公司购买开源产品更加保守谨 慎?开源安全任重而道远。 Duan Xihua: I wonder if the log4j vulnerability in late 2021 will make companies more conservative and cautious in buying open source products of the top 10 seats. 2.8 开源安全与合规 Open Source Security and Compliance 2.8.1 CVE 漏洞风险 CVE Vulnerability Risks Gitee 采用棱镜七彩 FossEye 静态扫描了 1.5 万 个 Gitee 平台上具有代表性的优质推荐开 源项目仓库,结果显示有超过 93% 不存在 CVE 漏洞风险。 51%,存在超 过 10 个 CVE 漏洞的占比 2.58%。 Of the projects with CVE vulnerabilities, 18.51% have one CVE vulnerability, and 2.58% have more than 10 CVE vulnerabilities. 2.8.3 开源合规情况 Open Source Compliance0 码力 | 199 页 | 9.63 MB | 1 年前3httpd 2.2.29 中文文档
it is important to be aware that it is possible to make a series of requests, and to exploit a vulnerability on an origin webserver such that the attacker can entirely control the content retrieved by the attacks trying to exploit the Apache Tomcat Source.JSP Malformed Request Information Disclosure Vulnerability, the second example will list the ten last denied clients, for example: [Thu Jul 11 17:18:39 BSD style accept() API in certain circumstances. Some popular Windows products, typically virus scanning or virtual private network packages, have bugs that interfere with the proper operation of AcceptEx()0 码力 | 1854 页 | 1.48 MB | 1 年前3httpd 2.2.27 中文文档
it is important to be aware that it is possible to make a series of requests, and to exploit a vulnerability on an origin webserver such that the attacker can entirely control the content retrieved by the attacks trying to exploit the Apache Tomcat Source.JSP Malformed Request Information Disclosure Vulnerability, the second example will list the ten last denied clients, for example: [Thu Jul 11 17:18:39 BSD style accept() API in certain circumstances. Some popular Windows products, typically virus scanning or virtual private network packages, have bugs that interfere with the proper operation of AcceptEx()0 码力 | 1849 页 | 1.47 MB | 1 年前3httpd 2.2.31 中文文档
it is important to be aware that it is possible to make a series of requests, and to exploit a vulnerability on an origin webserver such that the attacker can entirely control the content retrieved by the attacks trying to exploit the Apache Tomcat Source.JSP Malformed Request Information Disclosure Vulnerability, the second example will list the ten last denied clients, for example: [Thu Jul 11 17:18:39 BSD style accept() API in certain circumstances. Some popular Windows products, typically virus scanning or virtual private network packages, have bugs that interfere with the proper operation of AcceptEx()0 码力 | 1860 页 | 1.48 MB | 1 年前3httpd 2.2.27.dev 中文文档
it is important to be aware that it is possible to make a series of requests, and to exploit a vulnerability on an origin webserver such that the attacker can entirely control the content retrieved by the attacks trying to exploit the Apache Tomcat Source.JSP Malformed Request Information Disclosure Vulnerability, the second example will list the ten last denied clients, for example: [Thu Jul 11 17:18:39 BSD style accept() API in certain circumstances. Some popular Windows products, typically virus scanning or virtual private network packages, have bugs that interfere with the proper operation of AcceptEx()0 码力 | 1849 页 | 1.47 MB | 1 年前3
共 103 条
- 1
- 2
- 3
- 4
- 5
- 6
- 11