The server was attacked and used for mining
a new customer recently consulted with sine security company, saying that his server often fails to open the website of the card, and the remote connection to the server is extremely slow. Sometimes the Ping value reaches 300-500, and he often switches. After listening to the customer's words,
will generally judge that he has been attacked by CC + DDoS mixed traffic, It's strange to say that there is no traffic attack on the computer room. It's not a traffic attack, but it also causes the server card and website to fail to open. What kind of attack is this? In order to solve the problem of
client server card, we immediately arranged a security engineer to carry out security detection and deployment on his Linux server
{rrrrrrr}
mining Trojan horse is also designed. If the mining process is forced to stop by customers, it will automatically start to continue mining to achieve uninterrupted mining.
careful inspection shows that it is through setting the hourly task plan, remotely downloading shell mining Trojan horse, and then executing, Check whether the current process exists or not. If not, start the Trojan horse to mine
a detailed security inspection was carried out on the client's Linux server. It was found that fortunately, there was no encrypted server data, and the worm was infected with the disease
virus. If the data was encrypted, the loss would be great. The client was a platform, and the client's data was very important. After finding out the mining Trojan horse,
do customers need to know how the server is attacked? Was the Trojan horse uploaded? It can prevent the attack
in the later stage
through the security detection and analysis of our security engineers, we found that the server uses Apache Tomcat environment, the open architecture of the platform is JSP + Oracle database, and Apache Tomcat uses the version of 2016, which leads to the serious remote command execution vulnerability of Apache, Through this vulnerability, the intruder can directly invade the server and get the administrator permission of the server,
sine security engineer immediately repairs the Apache vulnerability and clears the Trojan horse. So far, the problem has been solved, the client server
runs stably, and the network station opens normally strong>
your situation should be that there are no better security measures when you are attacked. When the attack reaches a certain level, the staff will shut it down to prevent greater losses.
3. If the server has recovered and no important data has been lost, it just means that the loss is small, but not without loss. Even if no data has been lost, there is also a loss, because the time that causes the server not to run is part of the loss
the following are the relevant penalties. Please compare them< Article 285 of the criminal law; Crime of illegally obtaining data of computer information system and illegally controlling computer information system; Whoever, in violation of state regulations, intrudes into a computer information system in the fields of state affairs, national defense construction or cutting-edge science and technology shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention
Whoever, in violation of state regulations, intrudes into a computer information system other than the provisions of the preceding paragraph, or uses other technical means to obtain data stored, processed or transmitted in the computer information system, or illegally controls the computer information system, if the circumstances are serious, shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention and shall also, or shall only, be fined; If the circumstances are especially serious, he shall be sentenced to fixed-term imprisonment of not less than three years but not more than seven years and shall also be fined
those who provide special programs or tools for intruding into or illegally controlling computer information systems, or who provide programs or tools for others knowing that they have committed an illegal or criminal act of intruding into or illegally controlling computer information systems, if the circumstances are serious, shall be punished in accordance with the provisions of the preceding paragraph< Article 286 Whoever, in violation of state regulations, deletes, modifies, increases or interferes with the functions of a computer information system, thus causing the computer information system to fail to operate normally, with serious consequences, shall be sentenced to fixed-term imprisonment of not more than five years or criminal detention; If the consequences are especially serious, they shall be sentenced to fixed-term imprisonment of not less than five years
Whoever, in violation of state regulations, deletes, modifies or adds data and applications stored, processed or transmitted in the computer information system, if the consequences are serious, shall be punished in accordance with the provisions of the preceding paragraph
those who deliberately make or spread destructive programs such as computer viruses, which affect the normal operation of the computer system, and have serious consequences, shall be punished in accordance with the provisions of the first paragraph< Article 29 of the law of the people's Republic of China on administrative penalties for public security, whoever commits one of the following acts shall be detained for not more than five days; If the circumstances are serious, they shall be detained for not less than five days but not more than 10 days:
(1) violating state regulations, invading the computer information system and causing harm< (2) deleting, modifying, adding or interfering with the functions of a computer information system in violation of state regulations, resulting in the abnormal operation of the computer information system< (3) deleting, modifying or adding data and applications stored, processed or transmitted in computer information systems in violation of state regulations< (4) deliberately making and spreading destructive programs such as computer viruses, which affect the normal operation of computer information systems.
ray, Thor wakes up, attack speed + 2. Originally, the speed is high...
the power replenishment attribute 100% changes its own attack and special attack level + 1
the electric light barrier attribute 100% changes its own defense and special defense level + 1
charging attribute 1 round of power damage multiplied by 2
power storm attribute the next 2 rounds must be a fatal hit
the spring of power attribute self attack + 2
this is Teri's enhanced move, Every one of them doesn't accelerate... But, they fight each other, they both kill each other. Ray, good speed! Skill:
ray: lightning flash level 70, power 150
Yuanqi electric light ball special, power 140
Aurora blade power 130, ordinary physical attack, make all enhancement effects disappear
white light blade level 55, power 95, easy to hit a fatal blow
this is Ray's trump card skill, Very strong
Terry:
thunderbolt 120 5% paralyzes pp10
thunderbolt 150 10% paralyzes PP5
thunderbolt tooth 100 10% paralyzes pp15
thunderbolt 75 10% paralyzes pp15 first hand skill
one strike with all strength 120 PP5
thunderbolt No characteristics...
I don't need to say that, do I? You can compare it yourself
3. Race value:
Terry race value:
physical strength: 125
attack: 120
special attack: 77
speed: 90
defense: 95
Special Defense: 77
total: 584
ray: physical strength: 71 attack: 108 defense: 70 special attack: 101 special defense: 77 speed: 105, extreme attack: 347, speed: 340, very strong
Terry's physical attack, Ray's fast attack and special attack< 4. Actual combat:
ray wakes up in round 1
Teri takes a big move
ray takes a fatal strike in round 2 with Aurora blade
Teri hangs the lottery... (3 seconds of silence)
5. Appearance:
we all know that ray is the most handsome in the cel, and AK is the second
Terry..... I don't think it's very good-looking..... A fat man
ray has the style of king, this round goes without saying
5:0, ray wins<
the main spirit: thunderbolt
the Deputy spirit: Luke
fusion material: casually
it's a painstaking effort to choose an amount
people who plagiarize downstairs go to s!!!!!!
the green word attack is your magic stone or something. It will also affect the damage, but the ability to increase the percentage of the attack will not be multiplied by the green word attack.
at present, the most reasonable thing is,
attack power * skill damage * skill attack power * YELLOW character * extra yellow character * explosive damage * extra explosive damage * final damage * white character. Attribute damage has never been calculated for so many years, and there is little deviation without considering it.
high-strength, and you can draw a sword in any second.
this is the effect of the skill attack power bonus
but if you are your number, it's useless to take it with you