1. Prepare the environment: three clean virtual machines and turn off the firewall and selinux 192.168.46.129 redis-1 7001 7002 192.168.46.132 redis-2 7003 7004 192.168.46.135 redis-3 7005 7006 2. Install redis Use the script installation given above or other installation methods. Please change the script installation to the available yum source. 3. Configure different nodes and […]
Tag: hosts
The Linux host realizes password-free login between two hosts based on the ssh protocol.
Table of Contents 1. ssh protocol 1.SSH protocol 2. Working process of SSH protocol (1) The first stage: TCP three-way handshake version negotiation stage: (2) The second stage: Negotiation algorithm and determination of symmetric secret key stage (3) The third stage: certification stage: (4) The fourth stage: session request stage: (5) The fifth stage: interactive […]
Intranet security – information collection – intranet resource detection – scanning intranet surviving hosts
Introduction During the penetration test, you can upload tools to detect host survival based on the situation of the target host, or you can use intranet proxy or routing forwarding to initiate detection of the LAN where the target host is located. Testers can choose ICMP, NetBIOS, UDP, ARP, SNMP, SMB and other network protocols […]
Red Sun Actual Combat – Use CS to win down hosts in the domain
Network configuration Win7 is used as a web server, and the other two computers are in the intranet and can access each other. win7 Contains two network cards, one of which is VM13 for the internal network, and the other is NAT for connecting to the external network. win 2008 win 2K3 IP allocation win7 […]
[Comprehensive explanation of Linux commands] 140.fping: A powerful tool for detecting the survivability of multiple hosts at the same time
Article directory fping Additional information grammar Options parameter Example Learn `python` from scratch fping Check if the host exists Supplementary instructions The fping command is similar to ping, but more powerful than ping. Unlike ping which needs to wait for a certain host to connect to timeout or send back feedback information, fping immediately sends […]
Use the docker-compose command line to orchestrate containers to remote hosts
When using Goland, you can directly use its integrated functions to deploy containers to remote hosts, but what should you do if you directly use the command line? View help: $ docker-compose –help Usage: docker compose [OPTIONS] COMMAND Docker Compose Options: –ansi string Control when to print ANSI control characters (“never”|”always”|”auto”) (default “auto”) –compatibility Run […]
Linux ipip tunnel technology test 1 (dual hosts, dual network cards)
The experimental environment of this article is based on: CentOS Linux release 7.6.1810 (Core) Reference: Linux ipip tunnel and implementation – the road to cloud native 1. Introduction to IP tunnel technology There are three main types of IP tunneling technologies implemented by the Linux system kernel (protocols or software such as PPP, PPTP, and […]
Storage issues between containers and hosts
Introduction Function: Facilitate backup and recovery of data and realize data sharing 1. In a single machine Mount with data volume 2. In multiple machines ssh Establish a secret-free channel to scp the data, and then use the volume to mount it into the container. nfs network file system Build nfs server + client mounting […]
Nginx configures static pages, virtual hosts (IP, port, domain name) and log files based on source code installation
Directory 1. Static page 1. Change page content 2. Change the configuration file 3. Test 2. Virtual host configuration 1. Based on IP (1) Create a new directory under the html directory to store test files (2) Modify the nginx.conf file and configure two server modules corresponding to two IPs in the http module (3) […]
03_ansible inventory, Hosts and Groups, Host Variables, Group Variables, Default groups, Pattern
4. ansible inventory 4.1. Hosts and Groups 4.1.1. Case 4.2. Host Variables 4.3. Group Variables 4.4. Groups of Groups, and Group Variables 4.5. Default groups 4.6. Splitting Out Host and Group Specific Data 4.7. List of Behavioral Inventory Parameters 4.7.1. All connections in general 4.7.2. Non-SSH connection types 5. Pattern 4. ansible inventory Reposted from: […]