Linux--man->pdf

本文介绍了2019年独角兽企业在招聘Python工程师时提出的标准和要求,为开发者提供了一份宝贵的参考指南。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

<REPORT> <SCANINFO TOOLNAME="XXXX" MAKERS="XXXX" POLICY="XXXX" SCANTASK="" SCANTIME="" FILE_ID=""/> <!-- TOOLNAME="扫描工具名称" MAKERS="工具厂商名称" POLICY="策略版本" SCANTASK="任务名称" SCANTIME="扫描时间" FILE_ID="文件ID(没啥大用处其实)" --> <SCANDATA TYPE="OS"> <HOST IP="192.168.0.100"> <!-- *IP地址: --> <OSTYPE>WINDOWS</OSTYPE> <!-- 操作系统类型:Windows、Linux、.... --> <OSVERSION>Windows Server 2008</OSVERSION> <!-- 操作系统版本:Windows 2008、RedHat 9、.... --> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号",没有编号可用NONE标识 --> <VULTYPE>缓存区溢出</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <!-- 端口: --> <RISK>中</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>设置不当</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <RISK>中</RISK> > <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> <HOST IP="102.168.20.20"> <OSTYPE>LINUX</OSTYPE> <OSVERSION>RED HAT 9</OSVERSION> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness ]]> </NAME> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>缓存区溢出</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>设置不当</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> </SCANDATA> <SCANDATA TYPE="DB"> <HOST IP="102.168.20.20"> <PORT>1433</PORT> <DBTYPE>Microsoft SQL Server</DBTYPE> <DBVERSION>Microsoft SQL Server 2008 R2</DBVERSION> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Easily-guessed password ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>弱口令</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="MS13-112" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>设置不当</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> <HOST IP="102.168.100.11"> <PORT>1433</PORT> <DBTYPE>Microsoft SQL Server</DBTYPE> <DBVERSION>Microsoft SQL Server 2008 R2</DBVERSION> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Easily-guessed password ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>弱口令</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <NO CVE="NONE" CNVD="NONE" MS="MS13-112" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>弱口令</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> </SCANDATA> <SCANDATA TYPE="WEB"> <HOST WEB="HTTP:\\WWW.TEST.COM"> <WEBSERVERBANNER>Apache tomcat</WEBSERVERBANNER> <!-- Web Server Banner信息, --> <SERVERVERSION>Microsoft Windows 2008 R2</SERVERVERSION> <!-- 服务器信息 --> <TECHNOLOGIES>JSP</TECHNOLOGIES> <!-- 使用语言 --> <DATA> <VULNERABLITY> <NAME> <![CDATA[ SQL注入漏洞 ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>注入类</VULTYPE> <!-- 漏洞类型:如注入类、跨站脚本类、信息泄露类、弱口令/默认口令类、系统/服务漏洞类、权限/配置设置不当类、产品漏洞类、其他类 --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> <DETAILS> <URL URL="HTTP:\\WWW.TEST.COM?DETAILS=100"> <!-- *存在漏洞的url --> <TYPE>STRING</TYPE> <!-- 类型(string类型、int类型、search类型、反射性、存储型等等) --> <PARAMETER> <![CDATA[ DETAILS=100' AND '1'='1 ]]> </PARAMETER> <!-- 存在漏洞的参数(可带测试脚本) --> <REQUEST> <![CDATA[ GET /preSysApp/global/js/validate/depends/prototype.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache ]]> </REQUEST> <!-- 测试发送的request --> <RESPONSE> <!-- 接收的request --> <![CDATA[ xxxxxxxxxxxxxxxxxx ]]> </RESPONSE> </URL> <URL URL="HTTP:\\WWW.TEST.COM?id=120"> <!-- *存在漏洞的url --> <TYPE>INT</TYPE> <!-- 类型(string类型、int类型、search类型、反射性、存储型等等) --> <PARAMETER> <![CDATA[ ID=100 AND 1=1 ]]> </PARAMETER> <!-- 存在漏洞的参数(可带测试脚本) --> <REQUEST> <![CDATA[ GET /preSysApp/global/js/validate/depends/prototype.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache ]]> </REQUEST> <!-- 测试发送的request --> <RESPONSE> <![CDATA[ xxxxxxxxxxxxxxxxxx ]]> </RESPONSE> <!-- 接收的request --> </URL> </DETAILS> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ 跨站脚本 ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>跨站脚本类</VULTYPE> <!-- 漏洞类型:如注入类、跨站脚本类、信息泄露类、弱口令/默认口令类、系统/服务漏洞类、权限/配置设置不当类、产品漏洞类、其他类 --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> <DETAILS> <URL URL="HTTP:\\WWW.TEST.COM?DETAILS=100"> <!-- *存在漏洞的url --> <TYPE>反射性</TYPE> <!-- 类型(string类型、int类型、search类型、反射性、存储型等等) --> <PARAMETER> <![CDATA[ DETAILS=100%20%3C%73%63%72%69%70%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E ]]> </PARAMETER> <!-- 存在漏洞的参数(可带测试脚本) --> <REQUEST> <![CDATA[ GET /preSysApp/global/js/validate/depends/prototype.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache ]]> </REQUEST> <!-- 测试发送的request --> <RESPONSE> <!-- 接收的request --> <![CDATA[ xxxxxxxxxxxxxxxxxx ]]> </RESPONSE> </URL> </DETAILS> </VULNERABLITY> </DATA> </HOST> </SCANDATA> </REPORT>生成的xml为次格式
最新发布
08-23
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值