2025/06/10 14:04:39
抓tcp包
tcpdump -i ens192 -n -s 0 -v 'host 192.168.1.1 and port 55432' -w output.pcap
关键参数解析:
-i ens192
指定监听网卡为 ens192
-n
禁用反向域名解析,直接显示 IP 和端口(避免解析延迟)
-s 0
捕获完整数据包(默认截断为 68 字节)
-v
输出详细信息(如 TTL、协议类型等)
过滤条件 host 192.168.163.227 and port 55432
host
:仅捕获与该 IP 相关的流量(源或目标地址)
port 55432
:限定端口为 55432
(源或目标端口)
组合逻辑:使用 and
连接条件,确保同时满足 IP 和端口要求
引号包裹:避免 Shell 解析特殊字符(如 ()
)
-w output.pcap
原始数据写入 output.pcap
(pcap
格式,兼容 Wireshark)
扩展场景:
仅抓源/目标端口:
# 仅源端口 55432
sudo tcpdump -i ens192 -n -s 0 'src port 55432 and host 192.168.163.227' -w output.cap
# 仅目标端口 55432
sudo tcpdump -i ens32 -n -s 0 'dst port 55432 and host 192.168.163.227' -w output.cap
多端口组合(如同时监听 55432
和 80
):
sudo tcpdump -i ens192 -n -s 0 'host 192.168.163.227 and (port 55432 or port 80)' -w output.cap
2025/05/29 14:20:48
一些基于正则的数据校验规则
不超过12个字符
PYTHON matches = re.finditer(r"^[\U00000000-\U0010ffff]{0,12}$", test_str, re.MULTILINE | re.UNICODE)
JAVA pattern = Pattern.compile("^[\\p{L}]{0,12}$", Pattern.MULTILINE | Pattern.UNICODE_CASE);
JS const regex = /^[\p{L}]{0,12}$/gmu;
整数20位以内,小数4位以内
^[+-]?\d{1,20}(\.\d{1,4})?$
2025/05/22 10:53:29
## oceanbase企业单机版下载地址
arm的el8没找到
2025/05/20 13:34:20
linux统计各个进程打开的文件描述符数量,用lsof并不准确,因为lsof是按线程显示的,同一进程不同线程可以共享文件描述符,用lsof会造成重复统计。因此建议直接统计`/proc/{}/fd`目录
find /proc/[0-9]*/fd -type l 2>/dev/null | awk -F'/' '{print $3}' | sort | uniq -c |
while read count pid; do
ps -o user:20,pid=,cmd -p $pid | awk -v cnt="$count" 'NR==2{print $1, $2, $3, cnt}'
done | sort -k4 -nr | head -n 10
2025/05/13 13:23:15
linux查看进程时显示进程运行的环境变量,按照help里所说,e就可以显示环境变量了,但实际上使用时,还得加上a和x,才能显示出完整的。由此可见,敏感信息(比如密码)放OS环境变量里也是不安全的。
ps -axe
2025/04/12 18:50:17
一种查看openGauss中的behavior_compat_options选项支持哪些值的方式:
数据库服务器的数据库运行用户下执行
strings `which gaussdb` | awk '/ustore_unit_test/ {flag=1; next} /set_session_transaction/ {flag=0; exit} flag'
2025/04/11 10:05:43
截止到20250410的ip黑名单
31.7.62.234
36.134.21.102
36.137.195.72
36.140.10.64
36.140.10.145
36.140.160.210
36.140.161.139
36.212.233.36
39.150.130.100
42.177.94.52
43.249.193.47
46.19.142.242
47.92.197.190
49.0.196.81
58.48.96.131
58.53.128.39
58.212.22.130
58.212.22.131
58.221.18.178
60.250.70.187
60.250.70.189
60.250.81.66
79.124.40.94
79.124.56.98
79.124.56.186
79.124.58.158
79.124.58.218
82.156.52.66
83.222.190.78
91.238.181.92
93.123.109.98
103.56.154.146
103.85.168.18
103.148.58.155
103.186.108.229
110.40.47.161
111.10.223.2
111.53.63.134
111.85.83.175
112.2.55.181
112.27.125.137
112.28.149.33
112.51.96.142
112.192.16.55
112.237.143.195
113.140.37.86
114.219.214.47
115.230.124.37
115.239.160.246
116.114.161.15
117.82.91.243
117.90.230.46
117.156.237.76
118.190.103.72
120.41.185.163
120.48.22.39
120.220.44.48
121.12.149.101
123.7.18.116
123.164.144.10
123.182.152.114
124.28.197.138
124.65.97.230
124.79.120.60
124.131.50.55
124.165.238.153
124.232.147.3
124.232.147.204
128.14.98.144
141.255.167.50
150.138.72.54
154.89.10.220
175.6.40.66
175.42.33.95
175.153.161.124
175.153.169.51
180.143.174.169
182.200.3.68
182.200.4.161
182.200.5.77
182.200.6.185
182.200.7.4
182.200.7.20
183.230.200.5
183.239.210.213
183.240.197.189
183.241.138.37
183.249.161.117
183.250.134.17
185.7.214.89
185.42.12.98
185.147.124.102
185.147.124.202
185.147.124.203
192.72.189.195
202.61.86.79
202.101.188.54
210.51.45.106
211.141.173.254
218.17.143.117
218.76.62.187
218.78.122.230
218.85.116.202
218.89.66.58
218.90.122.42
220.78.179.70
220.197.200.154
222.75.100.74
222.79.56.194
222.173.131.58
222.249.238.114
223.13.122.170
223.75.187.13
223.83.10.222
223.108.111.194
223.108.111.238
2025/03/21 15:45:17
gaussdb用shell接收匿名块输出信息(出参)
#!/bin/bash
v=`gsql -r -d postgres -t -q << EOF 2>&1
begin
dbe_output.put_line('aa');
end;
/
\q
EOF`
echo v is $v
2025/03/21 10:49:32
dba_triggers 相关
https://docs.oracle.com/en/database/oracle/oracle-database/23/sqlrf/CREATE-TRIGGER.html
https://docs.oracle.com/en/database/oracle/oracle-database/23/lnpls/CREATE-TRIGGER-statement.html
https://docs.oracle.com/en/database/oracle/oracle-database/23/refrn/ALL_TRIGGERS.html
https://docs.oracle.com/en/database/oracle/oracle-database/18/strms/advanced-apply-process-concepts.html#GUID-BAB09B51-C566-4AD3-BB60-74D69C1D309F
1.ORACLE的触发器body其实除了支持匿名块,也同样支持指定一个procedure,类似于PG的触发器
2.FIRE_ONCE和APPLY_SERVER_ONLY对于存在逻辑备库时能扩展一些使用场景,比如数据脱敏
3.column_name是只有instead of嵌套表的情况下才会有值,常规的触发字段只能从DESCRIPTION这个字符串里解析
2025/02/21 09:36:47
截止到2025-02-20 02:58:19,攻击总算暂时消停了,期间又新增了几个ip在攻击
150.138.72.54
182.200.5.77
182.200.7.20