Diferències
Ací es mostren les diferències entre la revisió seleccionada i la versió actual de la pàgina.
| Ambdós costats versió prèvia Revisió prèvia Següent revisió | Revisió prèvia | ||
| linux:seguridad:sadservers [15/05/2024 05:49] – ["Saskatoon": counting IPs.] mate | linux:seguridad:sadservers [28/05/2024 06:51] (actual) – ["Resumable Server": Linux Upskill Challenge] mate | ||
|---|---|---|---|
| Línia 24: | Línia 24: | ||
| * '' | * '' | ||
| * '' | * '' | ||
| - | * '' | + | * '' | 
| + | * -h: numérico humano | ||
| + | * -r: reverso | ||
| + | * -k[primer-campo], | ||
| + | * -t < | ||
| * '' | * '' | ||
| < | < | ||
| Línia 57: | Línia 61: | ||
| == "The Command Line Murders" | == "The Command Line Murders" | ||
| + | * '' | ||
| + | * '' | ||
| + | < | ||
| + | 1. You can use the knock utility, for example to knock on port 3000: knock localhost 3000. Netcat (nc) and nmap are also available. Note than nmap has some options where you'd need to be root (not possible here) | ||
| + | |||
| + | 2. You can also write a BASH script that knocks sequentially on all ports. | ||
| + | |||
| + | 3. Solution.Probably the fastest is using nmap against all ports, for example: nmap -p- localhost. | ||
| + | </ | ||
| + | |||
| + | == " | ||
| < | < | ||
| + | |||
| + | == " | ||
| + | * '' | ||
| + | < | ||
| + | 1. The issue might be related to the configuration of the PostgreSQL server. (See the error message when attempting the tedt). The configuration files are usually located in the / | ||
| + | |||
| + | 2. The pg_hba.conf file controls client authentication. This file is read on start-up and when the main server process receives a SIGHUP signal. If you’re having trouble connecting to the database, this file could be a good place to look. (Click again "Next Clue/ | ||
| + | |||
| + | Solution: In the / | ||
| + | </ | ||