2021-01-08 08:35:03 +00:00
|
|
|
|
{"meta":{"title":"混元霹雳手","subtitle":null,"description":"没人比我更懂中医#MAGA","author":"Cool-Y","url":"https://cool-y.github.io","root":"/"},"pages":[{"title":"","date":"2019-04-15T07:35:38.084Z","updated":"2019-04-15T07:35:38.084Z","comments":true,"path":"baidu_verify_4WtqA1rZRc.html","permalink":"https://cool-y.github.io/baidu_verify_4WtqA1rZRc.html","excerpt":"","text":"4WtqA1rZRc"},{"title":"","date":"2019-04-15T07:35:38.085Z","updated":"2019-04-15T07:35:38.085Z","comments":true,"path":"googleacf4df440b4becc4.html","permalink":"https://cool-y.github.io/googleacf4df440b4becc4.html","excerpt":"","text":"google-site-verification: googleacf4df440b4becc4.html"},{"title":"关于我","date":"2019-03-17T10:55:11.000Z","updated":"2019-04-15T07:35:38.083Z","comments":false,"path":"about/index.html","permalink":"https://cool-y.github.io/about/index.html","excerpt":"","text":"一只想成为hacker的菜鸡的随笔自称混元霹雳手本科毕业于成都七中附属大学,EE专业现于街道口樱花大学攻读IS硕士偶尔分享踩过的坑以及一些乱七八糟的想法欢迎交流~"},{"title":"","date":"2019-03-28T05:39:07.000Z","updated":"2019-07-01T12:29:27.676Z","comments":false,"path":"bookmarks/index.html","permalink":"https://cool-y.github.io/bookmarks/index.html","excerpt":"","text":"将常用的一些网站汇总在此,便于浏览和查询 安全博客 360核心安全技术博客 phrake Sec-WIKI 绿盟科技 论坛 看雪 Paper XDA FreeBuf 安全客 吾爱破解 吾爱漏洞 漏洞银行exploit-db CTF CTF领域指南 pwnhub 乌云知识库 ctf维基 pwn台湾 pwn韩国 技能学习 思否 iot 智能家居百科 HomeAssistant HomeBridge 编程 codeforces leetcode 工具 mitmproxy msfvenom shellphish KALItools valgrind-内存泄露扫描利器 资源下载 Emoji表情 Apk镜像 服务提供 云图片存储 shodan"},{"title":"文章分类","date":"2019-03-16T09:42:42.000Z","updated":"2019-04-15T07:35:38.085Z","comments":false,"path":"categories/index.html","permalink":"https://cool-y.github.io/categories/index.html","excerpt":"","text":""},{"title":"文章标签","date":"2019-03-16T09:37:34.000Z","updated":"2019-04-15T07:35:38.085Z","comments":false,"path":"tags/index.html","permalink":"https://cool-y.github.io/tags/index.html","excerpt":"","text":""},{"title":"","date":"2019-08-08T12:35:31.000Z","updated":"2019-08-08T12:45:11.098Z","comments":false,"path":"hack之外/index.html","permalink":"https://cool-y.github.io/hack之外/index.html","excerpt":"","text":""}],"posts":[{"title":"自动化获取nvram配置","slug":"nvram-config","date":"2021-01-08T08:27:26.000Z","updated":"2021-01-08T08:31:40.139Z","comments":true,"path":"2021/01/08/nvram-config/","link":"","permalink":"https://cool-y.github.io/2021/01/08/nvram-config/","excerpt":"","text":"ARMX作者说,nvram的内容必须从正在运行的设备中提取。一种方法是转储包含nvram数据的mtdblock, /proc/mtd可能有助于识别哪个mtdblock包含nvram。另一种方法是,如果您可以通过UART进行命令行访问(当然可以访问实际的硬件),某些固件会提供nvram命令,运行“ nvram show”也可以获取nvram内容。https://github.com/therealsaumil/armx/issues/4 知道创宇的研究人员说,nvram配置,可以查看对应的汇编代码逻辑(配置的有问题的话很容易触发段错误)。 我需要无需硬件自动化的处理大批设备的nvram配置,上面两种方法都无法适用。但我发现Netgear的nvram配置有这两个te’d upnp等二进制程序通过nvram_match来匹配nvram变量与预期值 libnvram在data段存储了设备的默认nvram配置,数据段(data segment)通常是指用来存放程序中已初始化且不为0的全局变量的一块内存区域。数据段属于静态内存分配。 于是根据这两个事实做了两个实验: match函数该函数的逻辑如下,a1为要查询的key,a2<61>
|