49%
15.02.2012
.81776285
8.426562
(0.25%)
file_18594.pickle
3376.81351113
9.711714
(0.29%)
file_18595.pickle
3376.81144404
9.132170
(0.27%)
file_18596.pickle
49%
26.01.2012
.81776285
8.426562
(0.25%)
file_18594.pickle
3376.81351113
9.711714
(0.29%)
file_18595.pickle
3376.81144404
9.132170
(0.27%)
file_18596.pickle
49%
09.04.2019
Unexplained rename() delay: https://twitter.com/jsaryer/status/1069831718389960704
GitHub, James Saryerwinnie: https://gist.github.com/jamesls/9d52c7b3a19491f4d14c2d487515115f
rename(2) man page: https
49%
09.06.2018
. Jennings, A. Narayanan, and B. Aboba, eds. Media Capture and Streams. W3C Candidate Recommendation, October 3, 2017, https://www.w3.org/TR/mediacapture-streams/
W3C. 2017. WebRTC 1.0: 3. Terminology
49%
09.04.2019
, so the other must be the injected sidecar.
A full description of one of these pods (Figure 7) shows that the Istio sidecar is indeed present:
$ kubectl describe pod wordpress-77f7f9c485-k7tt9
49%
17.02.2015
shown create the updated WinPE 5.1 medium according to the following line numbers:
Listing 3
Creating the WinPE Medium
01 Dism /Export-Image /SourceImageFile:C:\WinPE_amd64\media ... 25
49%
28.11.2021
58453/tcp open unknown
60132/tcp open unknown
MAC Address: 00:0C:29:FA:DD:2A (VMware)
Nmap done: 1 IP address (1 host up) scanned in 31.35 seconds
Listing 4
Hijacking the MySQL Database
49%
16.03.2021
Name : dev-machine:0 (local to host dev-machine)
UUID : e0e5d514:d2294825:45d9f09c:db485a0c
Events : 3
Number Major Minor RaidDevice State
0 252 0
49%
02.02.2021
is enabled on that Apache server), such as this entry:
[Directory Bruteforce] /s?p=8f0f9570a1e1fb28f829a361441ab&t=bfd6c7c4&h=645cd72507b5af9d66d3425
I also found a number of WordPress attacks, most commonly
49%
10.11.2021
a directory
-v
or -vv
creates verbose output
-b
uses bzip2
compression
-g
uses gzip
compression
-l
uses lzo
compression
-L
n
uses compression level n
(1
-9
, with 7
being the default