Cool-Y.github.io/content.json

1 line
449 KiB
JSON
Raw Normal View History

2021-01-08 08:35:03 +00:00
{"meta":{"title":"混元霹雳手","subtitle":null,"description":"没人比我更懂中医#MAGA","author":"Cool-Y","url":"https://cool-y.github.io","root":"/"},"pages":[{"title":"","date":"2019-04-15T07:35:38.084Z","updated":"2019-04-15T07:35:38.084Z","comments":true,"path":"baidu_verify_4WtqA1rZRc.html","permalink":"https://cool-y.github.io/baidu_verify_4WtqA1rZRc.html","excerpt":"","text":"4WtqA1rZRc"},{"title":"","date":"2019-04-15T07:35:38.085Z","updated":"2019-04-15T07:35:38.085Z","comments":true,"path":"googleacf4df440b4becc4.html","permalink":"https://cool-y.github.io/googleacf4df440b4becc4.html","excerpt":"","text":"google-site-verification: googleacf4df440b4becc4.html"},{"title":"关于我","date":"2019-03-17T10:55:11.000Z","updated":"2019-04-15T07:35:38.083Z","comments":false,"path":"about/index.html","permalink":"https://cool-y.github.io/about/index.html","excerpt":"","text":"一只想成为hacker的菜鸡的随笔自称混元霹雳手本科毕业于成都七中附属大学EE专业现于街道口樱花大学攻读IS硕士偶尔分享踩过的坑以及一些乱七八糟的想法欢迎交流~"},{"title":"","date":"2019-03-28T05:39:07.000Z","updated":"2019-07-01T12:29:27.676Z","comments":false,"path":"bookmarks/index.html","permalink":"https://cool-y.github.io/bookmarks/index.html","excerpt":"","text":"将常用的一些网站汇总在此,便于浏览和查询 安全博客 360核心安全技术博客 &nbsp;phrake &nbsp; Sec-WIKI &nbsp; 绿盟科技 论坛 看雪 &nbsp;Paper&nbsp; XDA&nbsp; FreeBuf&nbsp; 安全客&nbsp; 吾爱破解&nbsp; 吾爱漏洞&nbsp; 漏洞银行exploit-db CTF CTF领域指南&nbsp; pwnhub&nbsp; 乌云知识库&nbsp; ctf维基&nbsp; pwn台湾&nbsp; pwn韩国 技能学习 思否 iot 智能家居百科&nbsp; HomeAssistant&nbsp; HomeBridge 编程 codeforces&nbsp; leetcode 工具 mitmproxy&nbsp; msfvenom&nbsp; shellphish&nbsp; KALItools&nbsp;valgrind-内存泄露扫描利器 资源下载 Emoji表情&nbsp; Apk镜像 服务提供 云图片存储&nbsp; shodan"},{"title":"文章分类","date":"2019-03-16T09:42:42.000Z","updated":"2019-04-15T07:35:38.085Z","comments":false,"path":"categories/index.html","permalink":"https://cool-y.github.io/categories/index.html","excerpt":"","text":""},{"title":"文章标签","date":"2019-03-16T09:37:34.000Z","updated":"2019-04-15T07:35:38.085Z","comments":false,"path":"tags/index.html","permalink":"https://cool-y.github.io/tags/index.html","excerpt":"","text":""},{"title":"","date":"2019-08-08T12:35:31.000Z","updated":"2019-08-08T12:45:11.098Z","comments":false,"path":"hack之外/index.html","permalink":"https://cool-y.github.io/hack之外/index.html","excerpt":"","text":""}],"posts":[{"title":"自动化获取nvram配置","slug":"nvram-config","date":"2021-01-08T08:27:26.000Z","updated":"2021-01-08T08:31:40.139Z","comments":true,"path":"2021/01/08/nvram-config/","link":"","permalink":"https://cool-y.github.io/2021/01/08/nvram-config/","excerpt":"","text":"ARMXnvramnvrammtdblock /proc/mtdmtdblocknvramUART访访nvram nvram shownvramhttps://github.com/therealsaumil/armx/issues/4 知道创宇的研究人员说nvram配置可以查看对应的汇编代码逻辑配置的有问题的话很容易触发段错误。 我需要无需硬件自动化的处理大批设备的nvram配置上面两种方法都无法适用。但我发现Netgear的nvram配置有这两个ted upnp等二进制程序通过nvram_match来匹配nvram变量与预期值 libnvram在data段存储了设备的默认nvram配置数据段data segment通常是指用来存放程序中已初始化且不为0的全局变量的一块内存区域。数据段属于静态内存分配。 于是根据这两个事实做了两个实验: match函数该函数的逻辑如下a1为要查询的keya2<61>