From 646f0a568bb04ef352c705359dba1d4c9ee7c110 Mon Sep 17 00:00:00 2001
From: ibuler <ibuler@qq.com>
Date: Mon, 18 Jan 2021 11:20:01 +0800
Subject: [PATCH] =?UTF-8?q?chore:=20=E4=BF=AE=E6=94=B9readme?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

---
 README.md | 20 ++++++++++++++++++++
 1 file changed, 20 insertions(+)

diff --git a/README.md b/README.md
index 47254edc4..e89e8e01c 100644
--- a/README.md
+++ b/README.md
@@ -13,6 +13,7 @@ JumpServer发现远程执行漏洞,请速度修复
 < v2.5.4
 < v2.4.5 
 = v1.5.9
+>= v1.5.3
 ```
 **安全版本:**
 ```
@@ -20,7 +21,9 @@ JumpServer发现远程执行漏洞,请速度修复
 >= v2.5.4
 >= v2.4.5 
 = v1.5.9 (版本号没变)
+< v1.5.3
 ```
+
 **修复方案:**
 
 将JumpServer升级至安全版本;
@@ -88,6 +91,23 @@ $ wget https://github.com/jumpserver/jumpserver/releases/download/v2.6.2/jms_bug
 $ bash jms_bug_check.sh demo.jumpserver.org
 漏洞已修复
 ```
+
+**入侵检测**
+
+下载脚本到 jumpserver 日志目录,这个目录中存在 gunicorn.log,然后执行
+
+```
+$ pwd
+/opt/jumpserver/core/logs
+
+$ ls gunicorn.log 
+gunicorn.log
+
+$ wget 'https://github.com/jumpserver/jumpserver/releases/download/v2.6.2/jms_check_attack.sh'
+$ bash jms_check_attack.sh
+系统未被入侵
+```
+
 --------------------------
 
 JumpServer 正在寻找开发者,一起为改变世界做些贡献吧,哪怕一点点,联系我 <ibuler@fit2cloud.com>