Following the takeover of LTT channel, it is time to revisit session cookies

Google article: Phishing campaign targets YouTube creators with cookie theft malware

With 2-factor authentication becoming more and more main-stream nowadays, attackers turn back to the ancient way – tricking people into downloading malware, thus getting the cookies information stored on their local computer, and being able to log in to their active accounts using those session cookies.

It seems that a qualified security software on a Windows system is still a must, and isn’t leaving any day soon.



一般來說,一個地域的一個可用區故障不可怕,然而阿里雲本次香港 C 區帶來的後果卻更像一個地域故障。中控基本不可用,自己在 C 區的 ECS 資源經過了 10+ 小時未恢復。多家報障的大型客戶理應有多可用區的設定,卻也未能恢復服務。實在是令人質疑阿里雲的多可用區設計。

更新:事後複盤報告 –

Just a very good video to learn about the foundations of Cloud Spanner:


久違的看了一眼服務器的監控圖表,發現連接數異常的多(對比網站流量來說),奇怪的打開了 netstat / tcpdump,一臉 SYN_RECV。

雖然不至於造成 SYN FLOOD,直接把來源 IP 段 BAN 了了事。(然後換成一堆 AWS 的 IP 段發過來了,好傢伙…)


iptables -A INPUT -p tcp --dport 80 -m state --state NEW -m recent --update --seconds {value} --hitcount {value} --name "syn-fw" -j DROP
iptables -A INPUT -p tcp --dport 80 -m state --state NEW -m recent --set --name "syn-fw"
iptables -A INPUT -p tcp --dport 80 -m state --state NEW -m recent --update --seconds {value} --hitcount {value} --name "syn-fw" -j LOG --log-prefix "[syn-fw] " --log-level 4


  • Bonus:Fail2ban filter

    before = common.conf

    _daemon = kernel
    failregex = ^%(__prefix_line)s\[syn-fw\].*SRC=<HOST> DST=.*$
    ignoreregex =

    The new era

    # nginx -V
    nginx version: nginx/1.21.3
    built by gcc 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC)
    built with OpenSSL 3.0.0 7 sep 2021
    TLS SNI support enabled
    configure arguments: --with-openssl=.../openssl-3.0.0 --with-openssl-opt='enable-ec_nistp_64_gcc_128 enable-tls1_3'

    Took such a long time to compile though… 😅

    Safer everyday, just a memo


    Should have encrypted the database backup already, finally changed it.

    [crontab time] /usr/bin/tar czf - -C /etc/nginx . | /usr/local/bin/openssl enc -aes-256-cbc -pbkdf2 -k [password] > /backup/nginx.tar.gz.enc

    [crontab time] /usr/bin/mysqldump -u root --all-databases | /usr/local/bin/openssl enc -aes-256-cbc -pbkdf2 -k [password] > /backup/all-databases.sql.enc