记录网盾服务器被黑过程的排查和思考:续集
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">昨天说到了<strong style="color: blue;"><span style="color: black;">查询</span>木马文件</strong>,<span style="color: black;">那样</span>今天的任务<span style="color: black;">便是</span><strong style="color: blue;">删除木马文件</strong>,<strong style="color: blue;">修复系统</strong>。</p>
<h1 style="color: black; text-align: left; margin-bottom: 10px;">3、删除木马文件</h1>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;">1)修改authorized_keys</strong></p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">先删除<strong style="color: blue;">authorized_keys</strong>文件里的公钥。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">当我执行<strong style="color: blue;"> rm </strong>命令的时候,我<span style="color: black;">发掘</span>入侵者在我的<strong style="color: blue;">authorized_keys文</strong>件里加了<strong style="color: blue;">+i</strong>锁,不<span style="color: black;">准许</span>删除,还挺聪明的小家伙:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/426da819b21a4aefac0fa3dad56864f0~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=P2NvyG8CFGbqw5EjwXCGljbi3T8%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">chattr +i /etc/authorized_keys /*文件<span style="color: black;">不可</span>删除、更改、移动*/</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">玛德,这是人干的事?</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">我继续查看,服务器的<strong style="color: blue;">chattr</strong>命令<span style="color: black;">亦</span>被删除了, <span style="color: black;">重视</span>:<strong style="color: blue;">删除chattr<span style="color: black;">针对</span>服务器<span style="color: black;">来讲</span>,是被黑的<span style="color: black;">第1</span>步。</strong></p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">我<span style="color: black;">晓得</span>的,<strong style="color: blue;">查不到chattr命令</strong>:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/eda64cd3f9cb4712b431fc7f94483589~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=9eJ%2ByviPrY%2Fm5qk1rfDJoH%2Fxlvc%3D" style="width: 50%; margin-bottom: 20px;"></div>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/cb9f14a735f640c196d2d08f2edb2b7e~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=5hMxeleQB%2B681id%2B4XgrC9Lca%2FA%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">这儿</span><span style="color: black;">咱们</span>只能尝试<strong style="color: blue;">手动安装chattr</strong>,<strong style="color: blue;">centos安装</strong>过程如下:</p><span style="color: black;">yum</span> install e2fsprogs<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p6-sign.toutiaoimg.com/pgc-image/fb973f2ae1ca4f41a438dfd3476fd8fc~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=34sivNByUGUQIERC4QDMlhDohKA%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">而后</span>:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/31f70787a1d1412583715ac24321718f~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=PqirUPhApBfh2P6O3sd%2FhQ0rc%2F8%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">接着清空<strong style="color: blue;">authorized_keys</strong>文件:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/659e9c06a4a94f09a080046c4046b4b3~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=MEnMkFyjoLZWx5jNob5gwFrdIuk%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;">2)用rm命令删除木马文件</strong></p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">put to death并删除<span style="color: black;">已然</span><span style="color: black;">发掘</span>的木马文件:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/12c9b1d640164060a9826a395db92689~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=ZTJLGvWGRrqB9QxPedM%2FRZ5%2BcnU%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">这个时候会<span style="color: black;">发掘</span>CPU的<span style="color: black;">运用</span>频率没之前<span style="color: black;">那样</span>多了:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/606852d06e2c4c49945eaa8d41843aa6~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=YE7fS8HWcZApHiK568S28RUEuHU%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">垃圾文件清理完毕,禁用<span style="color: black;">秘码</span>登录,<strong style="color: blue;">改用生成的</strong><strong style="color: blue;">秘钥</strong><strong style="color: blue;">登录</strong>。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">这儿</span><span style="color: black;">能够</span>先喘口气,看会儿小电影。</p>
<h1 style="color: black; text-align: left; margin-bottom: 10px;">4、确定攻击源头——Redis</h1>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">打开Redis的时候,会<span style="color: black;">发掘</span><span style="color: black;">各样</span>奇怪的键值。(果然技术在进步,攻击<span style="color: black;">亦</span>在学习啊)</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">这个问题<span style="color: black;">亦</span>是最容易被忽略的:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/38025e1ae4c6467f8b1a420d3267c2ec~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=H%2Fb8f9X73FeUrRzBocqzXF3ikKw%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">哎,失策了。Redis的端口开放了且<span style="color: black;">无</span><span style="color: black;">秘码</span>……</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">虽然我<span style="color: black;">亦</span>不<span style="color: black;">晓得</span>他怎么<span style="color: black;">晓得</span>找到我的服务器的,<span style="color: black;">然则</span>这个<strong style="color: blue;">crackit</strong>看起来怪怪的。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">我查阅了<span style="color: black;">有些</span>资料:</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">2015年11月10日,有网络安全厂商指出国内互联网产生了<span style="color: black;">海量</span>针对Redis数据库服务器的扫描流量,其中有不少Redis服务器的数据库被清空,且</p>/root/.ssh/authorized_keys文件被创建或改写,入侵者<span style="color: black;">能够</span>获取受影响服务器的完全<span style="color: black;">掌控</span>权限。<span style="color: black;">由于</span>受影响的Redis服务器的数据库被清空,但留存有一条键名为crackit的记录,<span style="color: black;">因此呢</span>这次事件被命名为Redis Crackit入侵事件。
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">简单的描述<span style="color: black;">便是</span>redis在用户目录写入一个ssh私钥文件,从而<span style="color: black;">创立</span>一个信任关系,<span style="color: black;">这般</span>不需要输入ssh<span style="color: black;">秘码</span>就<span style="color: black;">能够</span>登入。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">总结<span style="color: black;">来讲</span>,我的服务器有可能不是<span style="color: black;">由于</span>暴力撞库登录,而是<span style="color: black;">经过</span><strong style="color: blue;">Redis</strong>。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">用<strong style="color: blue;">top命令</strong>来<span style="color: black;">检测</span>一下……忒么的,木马文件又来了……看来<strong style="color: blue;">Redis</strong>不清理干净,这个文件会<span style="color: black;">始终</span>徘徊在我身边……</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/eb634be8015348c8a0088bf8ef08625c~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=ARsulhD%2BNzA%2FuPu2smPlPvRA524%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">等一下,<strong style="color: blue;">kswapd0</strong>似曾相识?</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">kswapd0过高是<span style="color: black;">由于</span><span style="color: black;">理学</span>内存不足,<span style="color: black;">运用</span>swap分区与内存换页操作交换数据,致使CPU占用过高。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;">kswapd0</strong>是个小东西,<strong style="color: blue;"><span style="color: black;">背面</span>的真实<span style="color: black;">功效</span>是执行木马文件</strong>: <strong style="color: blue;"><span style="color: black;">/tmp/.x25-unix/.rsynckswapd0</span></strong></p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">因此</span>说不根除<strong style="color: blue;">Redis</strong>,入侵者下次还<span style="color: black;">能够</span>用Redis的漏洞搞我的网盾服务器……(说实话,心好累)</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">实质</span>上的<strong style="color: blue;">kswapd0进程</strong>是<span style="color: black;">这般</span>的:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/07b3380b9fd740059a55f73603aa24ef~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=0iwEgOpPqRT2jAP5Q71JjxH8Wsw%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">我特意执行Redis的时候截了图:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p26-sign.toutiaoimg.com/pgc-image/b7f654f581e84bfbad4733a953483d0c~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=OOWHl1nEslt1P82NR426vApYOjM%3D" style="width: 50%; margin-bottom: 20px;"></div>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/21617dcd0fa44a6089fa3637e26867cc~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=7iKmnfXJRjRYt17aKXEDF2iok7A%3D" style="width: 50%; margin-bottom: 20px;"></div>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/e920c394f9be4e479efb9d0fe4604f67~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=nIj64IZgtQ1cxVo9H2fQrS8YvYU%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">下载的是一个<strong style="color: blue;">pm.sh脚本</strong>,打开它:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/2c43bce57d514d61afcf4829325de82d~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=8NwFtvoYt65B9cH5eRjdCN38Wpc%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">看似是一个sh脚本,<span style="color: black;">实质</span>上是一个png文件,还有可执行的权限。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">能够</span>直接下载下来给权限,并执行。<strong style="color: blue;"> /.png</strong></p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/fcb19cce2c4943a28118bc7787d32dc6~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=fE0tW1paI9P1PR45ZHZ0QjtaffM%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">能够</span>看出有一个<strong style="color: blue;">bin脚本</strong>,删除,录入到<strong style="color: blue;">/usr/bin里</strong>。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">让他跑起来,不要停。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">这过程<strong style="color: blue;">chattr会被删除,authorized_keys文件被修改</strong></p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/af93a68dfa474c80a15dbf7db61c6a44~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=79%2BKUWQxrEwS34xnSmieQM2r62A%3D" style="width: 50%; margin-bottom: 20px;"></div>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/8ba1338d643749499c5a78fbdf72df61~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=7k9k6C6rdThBAbW3dSmVdXaMiEk%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">最后执行的是<strong style="color: blue;"> /usr/bin/kswaped</strong>这个脚本,<span style="color: black;">起始</span>找好东西。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">再用top查看一下CPU利用率,又回到100%的状态。真是见鬼……</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/a9b7b46c6dee46f29540328d352ac733~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=O8U34OJZ4%2FC5KlSddgPkRalzDbQ%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">抓鸭子啊抓鸭子:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/e13376e0d89f48dc9a5b7b7d37c9536a~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=tUJhWTQNiydqcAI4%2FxHwvBOg8HM%3D" style="width: 50%; margin-bottom: 20px;"></div>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/2f703e8b6b85449f93efa98330051e9d~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=SHf8ywuzDsJl5vNghOTK2fA%2FhyE%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">记住<strong style="color: blue;">104.27.129.57</strong> 这个美国的CDN节点,摸着西瓜找藤子(不对说反了?)导出抓到的<strong style="color: blue;">WirteShark</strong>包<span style="color: black;">瞧瞧</span>:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/a23060ef807046f99aa3346b2c886adb~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=%2BPakefxV%2FkRaKKEfcj8aZATCuew%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">源IP请看红色部分,还<span style="color: black;">能够</span>看到请求数据库的操作(端口3306)。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">难不成我服务器还有DDoS攻击?为了<span style="color: black;">守护</span>我的网络安全,网盾的客服<span style="color: black;">始终</span>让我赶紧处理……</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">分布式拒绝服务攻击<span style="color: black;">能够</span>使<span style="color: black;">非常多</span>的计算机在同一时间遭受到攻击,使攻击的<span style="color: black;">目的</span><span style="color: black;">没法</span>正常<span style="color: black;">运用</span>,分布式拒绝服务攻击<span style="color: black;">已然</span><span style="color: black;">显现</span>了<span style="color: black;">非常多</span>次,<span style="color: black;">引起</span><span style="color: black;">非常多</span>的大型网站都<span style="color: black;">显现</span>了<span style="color: black;">没法</span>进行操作的<span style="color: black;">状况</span>,<span style="color: black;">这般</span><span style="color: black;">不仅</span>会影响用户的正常<span style="color: black;">运用</span>,<span style="color: black;">同期</span><span style="color: black;">导致</span>的经济损失<span style="color: black;">亦</span>是非常巨大的。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">分布式拒绝服务攻击方式在进行攻击的时候,<span style="color: black;">能够</span>对源IP<span style="color: black;">位置</span>进行伪造,<span style="color: black;">这般</span>就使得这种攻击在<span style="color: black;">出现</span>的时候隐蔽性是非常好的,<span style="color: black;">同期</span>要对攻击进行检测<span style="color: black;">亦</span>是非常困难的,<span style="color: black;">因此呢</span>这种攻击方式<span style="color: black;">亦</span><span style="color: black;">作为</span>了非常难以防范的攻击。</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/cdff9f8ebe224bf99cbef7cac427f0a3~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=6ovtyjFEbgtSTWyK%2FxvHQ0Zcjp4%3D" style="width: 50%; margin-bottom: 20px;"></div>
<h1 style="color: black; text-align: left; margin-bottom: 10px;">5、预防针</h1>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">服务器之<span style="color: black;">因此</span>被攻击,还是<span style="color: black;">由于</span>暴露的公网端口太多了,<span style="color: black;">尤其</span>是Redis6789、MySQL3306这种,当然了,<span style="color: black;">秘码</span>过于简单<span style="color: black;">亦</span>占了很大的<span style="color: black;">原由</span>。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">按照</span>我的经验来给你打个预防针:</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;">1)服务器</strong></p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">修改<strong style="color: blue;"> /etc/ssh/sshd_config文件</strong></p>不<span style="color: black;">准许</span><span style="color: black;">秘码</span>登录,<span style="color: black;">仅有</span>秘钥<span style="color: black;">才可</span>登录更改ssh默认端口,防止<span style="color: black;">显现</span>暴力撞库root账户<span style="color: black;">没法</span>直接登陆,仅有特定IP才<span style="color: black;">能够</span><span style="color: black;">拜访</span>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">如:</p>
<div style="color: black; text-align: left; margin-bottom: 10px;"><img src="https://p3-sign.toutiaoimg.com/pgc-image/49667629435647ecbbe1b13b9b0e6070~noop.image?_iz=58558&from=article.pc_detail&lk3s=953192f4&x-expires=1724865421&x-signature=AWaaJw0TpDD65eOFpXUIERaevyE%3D" style="width: 50%; margin-bottom: 20px;"></div>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;">2)应用</strong></p>Redis只能本地<span style="color: black;">拜访</span>,修改默认端口,不是所有IP都可见;MySQL仅对特定IP开放<span style="color: black;">拜访</span>权限;设置端口的防火墙规则;<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">当然了,你还<span style="color: black;">能够</span><span style="color: black;">运用</span>跳板机、堡垒机<span style="color: black;">拜访</span>。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;">3)备份</strong></p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">这玩意儿就和救命稻草<span style="color: black;">同样</span>的,一旦不小心操作,你<span style="color: black;">能够</span>备份恢复数据。当然了,<span style="color: black;">必定</span>要设置<span style="color: black;">定时</span>。</p>
<p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">这期的分享就到<span style="color: black;">这儿</span>,<span style="color: black;">期盼</span><span style="color: black;">大众</span>在平时的<span style="color: black;">运用</span>中<span style="color: black;">重视</span>操作规则,<span style="color: black;">守护</span>好自己的网络安全。</p>
太棒了、厉害、为你打call、点赞、非常精彩等。 seo常来的论坛,希望我的网站快点收录。 期待更新、坐等、迫不及待等。 回顾历史,我们不难发现:无数先辈用鲜血和生命铺就了中华民族复兴的康庄大道。
页:
[1]