Jump to content

All Activity

This stream auto-updates

  1. Past hour
  2. Serverul web ar trebui sa logheze URL-ul accesat, browser-ul, IP si alte cateva informatii. Aces log se poate modifica din config-ul serverului web pentru a loga mai multe detalii insa daca sunt multe request-uri se poate umple storage-ul. Se pot arhiva automat log-urile, se poate scripta ceva, exista solutii pentru orice.
  3. Da, ce site-uri acceseaza ce request-uri face ce date se trimit si se primesc. Totul.
  4. Today
  5. Ce anume vrei sa vezi? Cine ce request-uri face? Ce date se trimit/primesc?
  6. Certificatele se fac pe hostname, nu pe IP. Daca vrei pentru demo, foloseste ngrok care iti da un tunel pe https in afara.
  7. Salutare. Ce metode eficiente sunt de a monitoriza traficul web (tot ce se acceseaza din browser) dintr-o retea locala de calculatoare ?
  8. Salut am un site facut in nodejs care ruleaza pe http://IP:3000 Cum pot sa-i pun rapid un certificat FREE https ca sa pot accesa https://IP:3000 Multumesc
  9. Yesterday
  10. Hai, ma, ce problema ai :))))) Bucura-te ca nu-ti arata Romania, sa stie aia ca esti cigany :)))))) Nu erai conectat si de aia nu aveai reclamele la care sperai
  11. :))))))))))))))) Tu ai stricat google! Roman, windows in spaniola (ia uite, BUSCAR cica), ip de NL si te arata prin UK Pe unele servere nu sunt actualizate librariile GeoIP. Adresele IP se pot seta pe ce tara vor furnizorii. (ownerul lor)
  12. Da am inteles , treaba cea mai dubioasa e ca astazi am folosit youtube cu acelas ip si imi apare NL ieri imi aparea GB , chiar m-am uitat si pe what's my ip address si era un ip de Amsterdam
  13. Dacă folosești IP ( vpn) de Olanda, cum ai vrea sa.ti scrie YouTube Ro.
  14. Pai daca nu erai conectat, cum crezi tu ca iti poate oferi Youtube/Google recomandari targetate? Recomandarile targetate sunt pentru cei care au conturi, pentru ca sunt bazare pe history. Plus, tu ai un VPN. VPN care mai mult ca sigur nu ti l-ai facut tu cu OpenVPN, ci o mizerie cumparata de pe internet. Acel IP a fost la mai multe persoane, nu doar la tine. De curiozitate, de ce folosesti VPN?
  15. Nu , nu eram conectat cu contul de gmail are ceva de-a face ? Ieri mam conectat si in loc sa imi puna NL aveam youtube GB
  16. Aveti unii dintre voi un stil de a va exprima de mor. Erai conectat cu contul tau de gmail? Sau nu erai?
  17. Salut tuturor, am o nelamurire in legatura cu aplicatia Youtube, ieri ma uitam si eu la niste video-uri pe youtube si eram conectat cu VPN pe Olanda , La logo-ul de youtube in loc sa fie NL cum se vede in fotografie , plus de asta la recomandate imi apar video-uri care nu au nimic de aface cu search-urile mele stie cineva ce poate fi ? Folosesc Ubuntu Aici puteti vedea despre ce vorbesc : https://ibb.co/ZcKmJcN
  18. Fenomenul a apărut în urmă cu doi ani pe rețeaua Reddit, când un utilizator, cunoscut sub numele de ”deepfakes”, a făcut astfel de video-uri trucate, folosindu-se de chipurile unor actori celebri. Prima ”victimă” politică a acestei tehnologii a fost chiar fostul președinte Barack Obama. Recent, și președinta Republicii Moldova, Maia Sandu, a anunțat că a fost victima unui Deepfake.
  19. Last week
  20. Coreea de nord.are blur in G map PS: n-am auzit video
  21. Am crezut ca e reclama la bitdefender 🤣 deci concluzia e ca tot ce se intampla rau pe lumea asta se trage de la rusi. Ai naiba, de scarbele de americani nu zice nimeni nimic. Intreaga europa a devenit o colonie lingatoare de gaoaze americane
  22. Mai sunt cateva ore pana se scumpesc biletele: https://def.camp/tickets/
  23. Tracee is a Runtime Security and forensics tool for Linux. It uses Linux eBPF technology to trace your system and applications at runtime, and analyzes collected events in order to detect suspicious behavioral patterns. It is usually delivered as a docker container, but there are other ways you can use it (even create your own customized tracee container). Watch a quick video demo of Tracee: Check out the Tracee video hub for more videos. Documentation The full documentation of Tracee is available at https://aquasecurity.github.io/tracee/dev. You can use the version selector on top to view documentation for a specific version of Tracee. Quickstart Before you proceed, make sure you follow the minimum requirements for running Tracee. 1. Running tracee:latest docker run \ --name tracee --rm -it \ --pid=host --cgroupns=host --privileged \ -v /etc/os-release:/etc/os-release-host:ro \ -e LIBBPFGO_OSRELEASE_FILE=/etc/os-release-host \ aquasec/tracee:latest 2. Running tracee:full docker run --name tracee --rm -it \ --pid=host --cgroupns=host --privileged \ -v /etc/os-release:/etc/os-release-host:ro \ -e LIBBPFGO_OSRELEASE_FILE=/etc/os-release-host \ -v /usr/src:/usr/src:ro \ -v /lib/modules:/lib/modules:ro \ -v /tmp/tracee:/tmp/tracee:rw \ aquasec/tracee:full The default (latest) image is lightweight and portable. It is supposed to support different kernel versions without having to build source code. If the host kernel does not support BTF then you may use the full container image. The full container will compile an eBPF object during startup, if you do not have one already cached in /tmp/tracee. You may need to change the volume mounts for the kernel headers based on your setup. See Linux Headers section for more info. Tracee supports enriching events with additional data from running containers. In order to enable this capability please look here. These docker commands run Tracee with default settings and start reporting detections to standard output. In order to simulate a suspicious behavior, you can simply run: strace ls in another terminal. This will trigger the Anti-Debugging signature, which is loaded by default, and you will get a warning: INFO: probing tracee-ebpf capabilities... INFO: starting tracee-ebpf... INFO: starting tracee-rules... Loaded 14 signature(s): [TRC-1 TRC-13 TRC-2 TRC-14 TRC-3 TRC-11 TRC-9 TRC-4 TRC-5 TRC-12 TRC-8 TRC-6 TRC-10 TRC-7] Serving metrics endpoint at :3366 Serving metrics endpoint at :4466 *** Detection *** Time: 2022-03-25T08:04:22Z Signature ID: TRC-2 Signature: Anti-Debugging Data: map[] Command: strace Hostname: ubuntu-impish Trace In some cases, you might want to leverage Tracee's eBPF event collection capabilities directly, without involving the detection engine. This might be useful for debugging, troubleshooting, analysing, researching OR education. Execute docker container with the word trace as an initial argument, and tracee-ebpf will be executed, instead of the full tracee detection engine. docker run \ --name tracee --rm -it \ --pid=host --cgroupns=host --privileged \ -v /etc/os-release:/etc/os-release-host:ro \ -e LIBBPFGO_OSRELEASE_FILE=/etc/os-release-host \ aquasec/tracee:latest \ trace Components Tracee is composed of the following sub-projects, which are hosted in the aquasecurity/tracee repository: Tracee-eBPF - Linux Tracing and Forensics using eBPF Tracee-Rules - Runtime Security Detection Engine Tracee is an Aqua Security open source project. Learn about our open source work and portfolio Here. Join the community, and talk to us about any matter in GitHub Discussion or Slack. Download: tracee-main.zip or git clone https://github.com/aquasecurity/tracee.git Source
  24. Vulnerabilitatea din [*].live.com. Azi am primit mesaj. Nu ma asteptam asa repede la un raspuns. 🙂 L.E: Au si reparat-o... LOL. Am verificat acum 😅
  1. Load more activity
×
×
  • Create New...