lol
This commit is contained in:
parent
e3763f07c1
commit
2671c3d6af
@ -5,7 +5,7 @@
|
|||||||
# Site
|
# Site
|
||||||
title: 混元霹雳手
|
title: 混元霹雳手
|
||||||
subtitle:
|
subtitle:
|
||||||
description: 没人比我更懂中医#MAGA
|
description: Sauce is forever
|
||||||
keywords:
|
keywords:
|
||||||
author: Cool-Y
|
author: Cool-Y
|
||||||
language: zh-Hans
|
language: zh-Hans
|
||||||
|
@ -5,11 +5,9 @@ tags:
|
|||||||
- AFL
|
- AFL
|
||||||
- 模糊测试
|
- 模糊测试
|
||||||
categories: 二进制
|
categories: 二进制
|
||||||
|
description: 接触这个词语已经有一年了,但还没有学习过更没有上手实践过,正好趁这个机会好好弄弄AFL。提起模糊测试,我们总会联想起这样或那样的专业术语——测试用例、代码覆盖率、执行路径等等,你可能和我一样一头雾水,这次我们就来看个明白
|
||||||
---
|
---
|
||||||
|
|
||||||
接触这个词语已经有一年了,但还没有学习过更没有上手实践过,正好趁这个机会好好弄弄AFL。提起模糊测试,我们总会联想起这样或那样的专业术语——测试用例、代码覆盖率、执行路径等等,你可能和我一样一头雾水,这次我们就来看个明白
|
|
||||||
|
|
||||||
------------------------------------------
|
|
||||||
|
|
||||||
# 0x01 模糊测试
|
# 0x01 模糊测试
|
||||||
|
|
||||||
|
@ -6,6 +6,7 @@ tags:
|
|||||||
- 复原文件
|
- 复原文件
|
||||||
- 取证
|
- 取证
|
||||||
categories: "顶会论文"
|
categories: "顶会论文"
|
||||||
|
description: 再也不敢删库跑路了!
|
||||||
---
|
---
|
||||||
|
|
||||||
# Carving Database Storage to Detect and Trace Security Breaches
|
# Carving Database Storage to Detect and Trace Security Breaches
|
||||||
|
@ -7,6 +7,7 @@ tags:
|
|||||||
- 固件模拟
|
- 固件模拟
|
||||||
categories:
|
categories:
|
||||||
- IOT
|
- IOT
|
||||||
|
description: 提交个漏洞
|
||||||
---
|
---
|
||||||
### D-LINK DIR-802 命令注入漏洞
|
### D-LINK DIR-802 命令注入漏洞
|
||||||
> by Cool
|
> by Cool
|
||||||
|
@ -7,6 +7,7 @@ tags:
|
|||||||
- 调试
|
- 调试
|
||||||
categories:
|
categories:
|
||||||
- IOT
|
- IOT
|
||||||
|
description: 如果能够调试一个IoT设备,那挖漏洞将会简单很多
|
||||||
---
|
---
|
||||||
|
|
||||||
# 0x00 背景与简介
|
# 0x00 背景与简介
|
||||||
|
@ -5,6 +5,9 @@ tags:
|
|||||||
- 硬件攻击
|
- 硬件攻击
|
||||||
- 传感器
|
- 传感器
|
||||||
- 语音助手
|
- 语音助手
|
||||||
|
categories:
|
||||||
|
- 顶会论文
|
||||||
|
description: 算是进入安全领域以来第一篇看懂的论文QAQ
|
||||||
---
|
---
|
||||||
|
|
||||||
# 海豚音攻击
|
# 海豚音攻击
|
||||||
|
@ -7,6 +7,7 @@ tags:
|
|||||||
- 固件模拟
|
- 固件模拟
|
||||||
categories:
|
categories:
|
||||||
- IOT
|
- IOT
|
||||||
|
description: 复现一个漏洞
|
||||||
---
|
---
|
||||||
**固件模拟与UPnP栈溢出利用**
|
**固件模拟与UPnP栈溢出利用**
|
||||||
https://kb.netgear.com/000062158/Security-Advisory-for-Pre-Authentication-Command-Injection-on-R8300-PSV-2020-0211
|
https://kb.netgear.com/000062158/Security-Advisory-for-Pre-Authentication-Command-Injection-on-R8300-PSV-2020-0211
|
||||||
|
@ -6,6 +6,7 @@ tags:
|
|||||||
- 文件格式
|
- 文件格式
|
||||||
categories:
|
categories:
|
||||||
- 二进制
|
- 二进制
|
||||||
|
description: 庖丁解牛.jpg
|
||||||
---
|
---
|
||||||
|
|
||||||
# PE文件格式
|
# PE文件格式
|
||||||
|
@ -6,6 +6,7 @@ tags:
|
|||||||
- Linux
|
- Linux
|
||||||
- CTF
|
- CTF
|
||||||
categories: Pwn
|
categories: Pwn
|
||||||
|
description: 我怎么还在start??
|
||||||
---
|
---
|
||||||
|
|
||||||
# [Pwnable.tw](http://pwnable.tw/) start
|
# [Pwnable.tw](http://pwnable.tw/) start
|
||||||
|
@ -7,6 +7,7 @@ tags:
|
|||||||
- CVE
|
- CVE
|
||||||
categories:
|
categories:
|
||||||
- IOT
|
- IOT
|
||||||
|
description: Samba漏洞臭名昭著
|
||||||
---
|
---
|
||||||
|
|
||||||
# 漏洞描述
|
# 漏洞描述
|
||||||
|
@ -6,8 +6,8 @@ tags:
|
|||||||
- 拒绝服务攻击
|
- 拒绝服务攻击
|
||||||
categories:
|
categories:
|
||||||
- 二进制
|
- 二进制
|
||||||
|
description: TCPDUMP 4.5.1 拒绝服务攻击漏洞分析
|
||||||
---
|
---
|
||||||
# TCPDUMP 4.5.1 拒绝服务攻击漏洞分析
|
|
||||||
|
|
||||||
## Tcpdump介绍
|
## Tcpdump介绍
|
||||||
1. tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。tcpdump 适用于大多数的类Unix系统 操作系统:包括Linux、Solaris、BSD、Mac OS X、HP-UX和AIX 等等。在这些系统中,tcpdump 需要使用libpcap这个捕捉数据的库。其在Windows下的版本称为WinDump;它需要WinPcap驱动,相当于在Linux平台下的libpcap.
|
1. tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。tcpdump 适用于大多数的类Unix系统 操作系统:包括Linux、Solaris、BSD、Mac OS X、HP-UX和AIX 等等。在这些系统中,tcpdump 需要使用libpcap这个捕捉数据的库。其在Windows下的版本称为WinDump;它需要WinPcap驱动,相当于在Linux平台下的libpcap.
|
||||||
|
@ -6,6 +6,7 @@ tags:
|
|||||||
- 路由器
|
- 路由器
|
||||||
- MiniUPnP
|
- MiniUPnP
|
||||||
categories: IOT
|
categories: IOT
|
||||||
|
description: 非常经典的UPnP,Classic~
|
||||||
---
|
---
|
||||||
|
|
||||||
# 概述
|
# 概述
|
||||||
|
@ -5,9 +5,10 @@ tags:
|
|||||||
- AFL
|
- AFL
|
||||||
- 模糊测试
|
- 模糊测试
|
||||||
categories: 二进制
|
categories: 二进制
|
||||||
|
description: 这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。
|
||||||
---
|
---
|
||||||
|
|
||||||
这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。
|
|
||||||
参考:https://paper.seebug.org/841/#_1
|
参考:https://paper.seebug.org/841/#_1
|
||||||
|
|
||||||
**部署afl**
|
**部署afl**
|
||||||
|
@ -6,6 +6,7 @@ tags:
|
|||||||
- 微信
|
- 微信
|
||||||
categories:
|
categories:
|
||||||
- 杂七杂八
|
- 杂七杂八
|
||||||
|
description: 看了这篇文章,女朋友还会问你为什么不给她发微信吗?
|
||||||
---
|
---
|
||||||
我们实验室有个光荣传统,每天早上起床叫醒我的不是闹钟,而是群里雷打不动的安全新闻(其实我免提醒了2333)
|
我们实验室有个光荣传统,每天早上起床叫醒我的不是闹钟,而是群里雷打不动的安全新闻(其实我免提醒了2333)
|
||||||
而这个发送新闻的人,一代一代的传承,我没想到竟然有一天会落在我头上,哭了o(╥﹏╥)o
|
而这个发送新闻的人,一代一代的传承,我没想到竟然有一天会落在我头上,哭了o(╥﹏╥)o
|
||||||
|
@ -7,9 +7,8 @@ tags:
|
|||||||
- phishing email
|
- phishing email
|
||||||
categories:
|
categories:
|
||||||
- 杂七杂八
|
- 杂七杂八
|
||||||
|
description: 研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。
|
||||||
---
|
---
|
||||||
研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。
|
|
||||||
我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。
|
|
||||||
|
|
||||||
## 赛题理解
|
## 赛题理解
|
||||||
|
|
||||||
|
@ -7,6 +7,7 @@ tags:
|
|||||||
- 语音助手
|
- 语音助手
|
||||||
categories:
|
categories:
|
||||||
- 顶会论文
|
- 顶会论文
|
||||||
|
description: 眼前一亮的工作!海豚音攻击,试着复现看看(贫穷版)
|
||||||
---
|
---
|
||||||
|
|
||||||
# 海豚音攻击-复现
|
# 海豚音攻击-复现
|
||||||
|
@ -7,8 +7,9 @@ tags:
|
|||||||
- 栈溢出
|
- 栈溢出
|
||||||
categories:
|
categories:
|
||||||
- Pwn
|
- Pwn
|
||||||
|
description: 之前介绍了Windows x86平台下栈溢出漏洞的开放与利用,鉴于CTF基本都是Linux,还有实际开发环境,很多智能设备的系统都是基于Linux,所以从很现实的需求出发,一定要学习学习Linux下漏洞的分析。
|
||||||
---
|
---
|
||||||
之前介绍了Windows x86平台下栈溢出漏洞的开放与利用,鉴于CTF基本都是Linux,还有实际开发环境,很多智能设备的系统都是基于Linux,所以从很现实的需求出发,一定要学习学习Linux下漏洞的分析。
|
|
||||||
|
|
||||||
**ref:**
|
**ref:**
|
||||||
> CTF-WIKI:https://ctf-wiki.github.io/ctf-wiki/pwn/readme-zh/
|
> CTF-WIKI:https://ctf-wiki.github.io/ctf-wiki/pwn/readme-zh/
|
||||||
|
@ -8,6 +8,7 @@ tags:
|
|||||||
- 重放攻击
|
- 重放攻击
|
||||||
categories:
|
categories:
|
||||||
- IOT
|
- IOT
|
||||||
|
description: 局域网内所有的动作都在黑客的掌握之中吗?
|
||||||
---
|
---
|
||||||
# 控制局域网内的IOT设备
|
# 控制局域网内的IOT设备
|
||||||
## 中间人攻击—流量分析
|
## 中间人攻击—流量分析
|
||||||
|
@ -8,6 +8,7 @@ tags:
|
|||||||
- 固件模拟
|
- 固件模拟
|
||||||
categories:
|
categories:
|
||||||
- IOT
|
- IOT
|
||||||
|
description: 还记得固件仿真吗?先试着快速解决nvram
|
||||||
---
|
---
|
||||||
|
|
||||||
ARMX作者说,nvram的内容必须从正在运行的设备中提取。
|
ARMX作者说,nvram的内容必须从正在运行的设备中提取。
|
||||||
|
@ -2,8 +2,12 @@
|
|||||||
title: 加壳与脱壳
|
title: 加壳与脱壳
|
||||||
date: 2019-05-14 11:20:59
|
date: 2019-05-14 11:20:59
|
||||||
tags:
|
tags:
|
||||||
|
- 逆向
|
||||||
|
- 破解
|
||||||
|
categories: 二进制
|
||||||
|
description: 壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。
|
||||||
---
|
---
|
||||||
壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。
|
|
||||||
壳附加在原始程序上,通过Windows加载器载入内存后,先于原始程序执行,以得到控制权,在执行的过程中对原始程序进行解密还原,然后把控制权还给原始程序,执行原来的代码。
|
壳附加在原始程序上,通过Windows加载器载入内存后,先于原始程序执行,以得到控制权,在执行的过程中对原始程序进行解密还原,然后把控制权还给原始程序,执行原来的代码。
|
||||||
加上外壳后,原始程序在磁盘文件中一般是以加密后的形式存在的,只在执行时在内存中还原。这样可以有效防止破解者对程序文件进行非法修改,也可以防止程序被静态反编译。
|
加上外壳后,原始程序在磁盘文件中一般是以加密后的形式存在的,只在执行时在内存中还原。这样可以有效防止破解者对程序文件进行非法修改,也可以防止程序被静态反编译。
|
||||||
|
|
||||||
|
@ -7,6 +7,7 @@ tags:
|
|||||||
- 密码
|
- 密码
|
||||||
- QQ
|
- QQ
|
||||||
- 数据库
|
- 数据库
|
||||||
|
description: 很久远的攻击,可能现在还有效
|
||||||
---
|
---
|
||||||
|
|
||||||
# qq数据库采用简单加密——异或加密
|
# qq数据库采用简单加密——异或加密
|
||||||
|
@ -7,6 +7,7 @@ tags:
|
|||||||
- 信息泄露
|
- 信息泄露
|
||||||
categories:
|
categories:
|
||||||
- Pwn
|
- Pwn
|
||||||
|
description: 进入QEMU虚拟机逃逸的世界
|
||||||
---
|
---
|
||||||
|
|
||||||
## 1 Intro
|
## 1 Intro
|
||||||
|
@ -6,6 +6,7 @@ tags:
|
|||||||
- ctf
|
- ctf
|
||||||
categories:
|
categories:
|
||||||
- web
|
- web
|
||||||
|
description: WEB安全的START
|
||||||
---
|
---
|
||||||
|
|
||||||
# 搭建环境
|
# 搭建环境
|
||||||
|
@ -6,6 +6,7 @@ tags:
|
|||||||
- ctf
|
- ctf
|
||||||
categories:
|
categories:
|
||||||
- web
|
- web
|
||||||
|
description: 信息收集+常规owasp top 10+逻辑漏洞
|
||||||
---
|
---
|
||||||
|
|
||||||
信息收集+常规owasp top 10+逻辑漏洞
|
信息收集+常规owasp top 10+逻辑漏洞
|
||||||
|
@ -6,6 +6,7 @@ tags:
|
|||||||
- wifi
|
- wifi
|
||||||
categories:
|
categories:
|
||||||
- 顶会论文
|
- 顶会论文
|
||||||
|
description: 什么是信息?什么是加密?什么是侧信道?
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
|
@ -6,10 +6,9 @@ tags:
|
|||||||
- Windows
|
- Windows
|
||||||
- 漏洞
|
- 漏洞
|
||||||
categories: Pwn
|
categories: Pwn
|
||||||
|
description: 这部分是对Window x86平台下的几个典型漏洞利用方式的介绍,从最基础的、没有开启任何保护的漏洞程序入手,然后开启GS,最后通过rop绕过DEP。
|
||||||
---
|
---
|
||||||
这部分是对Window x86平台下的几个典型漏洞利用方式的介绍,从最基础的、没有开启任何保护的漏洞程序入手,然后开启GS,最后通过rop绕过DEP。
|
|
||||||
|
|
||||||
---------------
|
|
||||||
|
|
||||||
# 0x00 漏洞利用开发简介
|
# 0x00 漏洞利用开发简介
|
||||||
(1)需要什么
|
(1)需要什么
|
||||||
|
@ -7,6 +7,7 @@ tags:
|
|||||||
- 自然语言处理
|
- 自然语言处理
|
||||||
categories:
|
categories:
|
||||||
- 顶会论文
|
- 顶会论文
|
||||||
|
description: 提前发现、登记和注释物联网设备
|
||||||
---
|
---
|
||||||
***论文来源:***USENIX SECURITY 2018:Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices
|
***论文来源:***USENIX SECURITY 2018:Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices
|
||||||
***下载:***
|
***下载:***
|
||||||
|
@ -7,6 +7,7 @@ tags:
|
|||||||
- SSH
|
- SSH
|
||||||
categories:
|
categories:
|
||||||
- IOT
|
- IOT
|
||||||
|
description: 小米基于 trx 改了个打包解包固件的工具
|
||||||
---
|
---
|
||||||
# 小米固件工具mkxqimage
|
# 小米固件工具mkxqimage
|
||||||
|
|
||||||
|
@ -6,7 +6,7 @@ tags:
|
|||||||
- 硬件层
|
- 硬件层
|
||||||
categories:
|
categories:
|
||||||
- IOT
|
- IOT
|
||||||
|
description: 固件有几种获取方法?
|
||||||
---
|
---
|
||||||
|
|
||||||
通过分析物联网设备遭受攻击的链条可以发现,黑客获取固件,把固件逆向成汇编或C程序语言后,能分析出设备的运行流程和网络行为,还能找到安全加密相关的密钥相关的信息。如果这些“有心人”没能获取到固件信息,他们也很难发现这些漏洞。从这一点看,物联网设备的安全性,在很大程度上决定于其固件的安全性。
|
通过分析物联网设备遭受攻击的链条可以发现,黑客获取固件,把固件逆向成汇编或C程序语言后,能分析出设备的运行流程和网络行为,还能找到安全加密相关的密钥相关的信息。如果这些“有心人”没能获取到固件信息,他们也很难发现这些漏洞。从这一点看,物联网设备的安全性,在很大程度上决定于其固件的安全性。
|
||||||
|
@ -5,6 +5,7 @@ tags:
|
|||||||
- 逆向
|
- 逆向
|
||||||
- 破解
|
- 破解
|
||||||
categories: 二进制
|
categories: 二进制
|
||||||
|
description: 一些逆向的小实验
|
||||||
---
|
---
|
||||||
|
|
||||||
# 软件保护方式
|
# 软件保护方式
|
||||||
|
@ -5,18 +5,35 @@ type: "about"
|
|||||||
comments: false
|
comments: false
|
||||||
---
|
---
|
||||||
|
|
||||||
---------------
|
------
|
||||||
|
## TL;DR
|
||||||
|
- 🔭 I’m currently focus on IoT security and Android security.
|
||||||
|
- 🌱 I’m currently learning VM escape.
|
||||||
|
- 📝 My blog: https://cool-y.github.io/
|
||||||
|
- 🏫 Bachelor: Sichuan university; Master: Wuhan university
|
||||||
|
- 📫 Hit me up: cool.yim@foxmail.com
|
||||||
|
- ⚡ Fun fact: ‘Fun Facts’ Are Never Fun
|
||||||
|
- 💬 Ask me about ...
|
||||||
|
|
||||||
<center>一只想成为hacker的菜鸡的随笔
|
------
|
||||||
|
## 论文
|
||||||
|
### **智能家居攻击与防御方法综述**
|
||||||
|
**信息安全学报** , Han Yan, Guojun Peng, Luo Yuan, Side Liu
|
||||||
|
|
||||||
自称混元霹雳手
|
### **Android Data-Clone Attack via Operating System Customization**
|
||||||
|
**IEEE Access**, Song, Wenna, Ming Jiang, Han Yan, Yi Xiang, Yuan Chen, Yuan Luo, Kun He, and Guojun Peng.
|
||||||
|
|
||||||
本科毕业于成都七中附属大学,EE专业
|
### **App’s Auto-Login Function Security Testing via Android OS-Level Virtualization**
|
||||||
|
**ICSE'21**, Song, Wenna, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, and Guojun Peng.
|
||||||
|
|
||||||
现于街道口樱花大学攻读IS硕士
|
-------
|
||||||
|
## 学术服务
|
||||||
|
**Journal Sub Reviewer:** 信息安全学报,Cyber Security
|
||||||
|
|
||||||
偶尔分享踩过的坑
|
-------
|
||||||
|
## Vulnerabilities Disclosure
|
||||||
以及一些乱七八糟的想法
|
- PSV-2018-0020(duplicate)
|
||||||
|
- PSV-2019-0164
|
||||||
***欢迎交流~***</center>
|
- CVE-2019-15843
|
||||||
|
- PSV-2020-0211(extended)
|
||||||
|
- CVE-2020-15893(extended)
|
||||||
|
@ -1,6 +1,119 @@
|
|||||||
---
|
---
|
||||||
title:
|
title: Life is a wonderful thing
|
||||||
date: 2019-08-08 20:35:31
|
date: 2019-08-08 20:35:31
|
||||||
type: "hack之外"
|
type: "hack之外"
|
||||||
comments: false
|
comments: true
|
||||||
---
|
---
|
||||||
|
|
||||||
|
## 👣Footprint
|
||||||
|
### Beijing
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
| ![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618075017/life/ed8fcbd8846a5503f00ad7dc89bb250.jpg) | ![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618075017/life/bae0a0b1356578e2ea0e3cbc8775789.jpg) |
|
||||||
|
| ![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618075017/life/3103ea1e6f402d8071956b933a4888a.jpg) ||
|
||||||
|
|
||||||
|
### Qingdao & Yantai
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618075784/life/4d315332aae693e6ddd7f46fb44e5eb.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618075783/life/0b39705d40d1b3afa5983fad0656659.jpg)|
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618075783/life/8d8a7ee74e6ee20f4b5e5d64b50bba1.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618075783/life/d68aef840e0b27734e55514324c3aad.jpg)|
|
||||||
|
|
||||||
|
### Hangzhou
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618076425/life/8c958cbb036b2b5700d419aadff8981.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618076433/life/bc53d4d59fe0567109b2fdcae73ad49.jpg)|
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618076438/life/e97c138ba1bb94cb7a2eafe0742d180.jpg)||
|
||||||
|
|
||||||
|
### Nanjing
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618076604/life/d4f61566a74c89128e8945c5fff6576.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618076607/life/482f05f94499ab26f0402386d02acb7.jpg)|
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618076607/life/482f05f94499ab26f0402386d02acb7.jpg)|![]()|
|
||||||
|
|
||||||
|
### Shanghai
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618076823/life/c253b4877671de16e6fcf33bc4c346a.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618076825/life/1c12f392632265d4928d1743af0a58c.jpg)|
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618076830/life/b447add6d2ebaf392f876e00e9420fe.jpg)|![]()|
|
||||||
|
|
||||||
|
### Quanzhou & Xiamen
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077136/life/3d6b16a8e1c0d5151081c3403e3ccd5.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077126/life/8c0a20d89fac9efba2a5d9178825f28.jpg)|
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077118/life/59f3440e97133fa3aa0e85de0a90e90.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077111/life/c9bdcb566db1455ff73fc43c3b739f6.jpg)|
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077105/life/87a585bbc588baa4167a1805e92d928.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077099/life/d025c15c0b5e787bf8b3cb3cf834f53.jpg)|
|
||||||
|
|
||||||
|
### Haikou
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077399/life/93b6111863fa916917fc8f13ad03512.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077392/life/2edd325305b8a9cfba0eae36eb99855.jpg)|
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077394/life/7065c06f743c629881d0b981d9ca1de.jpg)|![]()|
|
||||||
|
|
||||||
|
### Qinghai
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077771/life/d2f538547401446600ad278f659f278.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077774/life/21de36a564974001f43a126ac665a29.jpg)|
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077779/life/38c46862480582a77bb301c4aa374ab.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077784/life/6adf21f23d7eb1718e3e66ce59bbc90.jpg)|
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618077790/life/5ecab6c5ef8d00d0bf98c6ee7a493bf.jpg)|![]()|
|
||||||
|
|
||||||
|
### Xian
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618078006/life/e19d3bfd408c896f44514e3e98a303f.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618078009/life/800df229bda713832baab30f8d1576c.jpg)|
|
||||||
|
|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618078014/life/93382f02dcf4a8a5292f80718041ccd.jpg)|![](https://res.cloudinary.com/dozyfkbg3/image/upload/v1618078019/life/ff6fc86f46ee85263630d34ed95e6a3.jpg)|
|
||||||
|
|
||||||
|
### Chengdu
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![]()|![]()|
|
||||||
|
|
||||||
|
### Wuhan
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![]()|![]()|
|
||||||
|
|
||||||
|
### Kangding
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![]()|![]()|
|
||||||
|
|
||||||
|
### Zhengzhou
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![]()|![]()|
|
||||||
|
|
||||||
|
### Changsha
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![]()|![]()|
|
||||||
|
|
||||||
|
### Shenzhen
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![]()|![]()|
|
||||||
|
|
||||||
|
|
||||||
|
### Xinjiang
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![]()|![]()|
|
||||||
|
|
||||||
|
### Zhuhai
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![]()|![]()|
|
||||||
|
|
||||||
|
### Xizang
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![]()|![]()|
|
||||||
|
|
||||||
|
### Guangzhou
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![]()|![]()|
|
||||||
|
|
||||||
|
### Hulunbeier
|
||||||
|
| | |
|
||||||
|
| ------ | ----------- |
|
||||||
|
|![]()|![]()|
|
||||||
|
@ -202,7 +202,7 @@ sidebar:
|
|||||||
b2t: false
|
b2t: false
|
||||||
|
|
||||||
# Scroll percent label in b2t button.
|
# Scroll percent label in b2t button.
|
||||||
scrollpercent: false
|
scrollpercent: true
|
||||||
|
|
||||||
# Enable sidebar on narrow view (only for Muse | Mist).
|
# Enable sidebar on narrow view (only for Muse | Mist).
|
||||||
onmobile: false
|
onmobile: false
|
||||||
@ -216,7 +216,7 @@ sidebar:
|
|||||||
scroll_to_more: true
|
scroll_to_more: true
|
||||||
|
|
||||||
# Automatically saving scroll position on each post/page in cookies.
|
# Automatically saving scroll position on each post/page in cookies.
|
||||||
save_scroll: false
|
save_scroll: true
|
||||||
|
|
||||||
# Automatically excerpt description in homepage as preamble text.
|
# Automatically excerpt description in homepage as preamble text.
|
||||||
excerpt_description: true
|
excerpt_description: true
|
||||||
@ -460,16 +460,16 @@ gitalk:
|
|||||||
# Technorati,Posterous,Tumblr,GoogleBookmarks,Newsvine,
|
# Technorati,Posterous,Tumblr,GoogleBookmarks,Newsvine,
|
||||||
# Evernote,Friendfeed,Vkontakte,Odnoklassniki,Mailru
|
# Evernote,Friendfeed,Vkontakte,Odnoklassniki,Mailru
|
||||||
needmoreshare2:
|
needmoreshare2:
|
||||||
enable: false
|
enable: true
|
||||||
postbottom:
|
postbottom:
|
||||||
enable: false
|
enable: true
|
||||||
options:
|
options:
|
||||||
iconStyle: box
|
iconStyle: box
|
||||||
boxForm: horizontal
|
boxForm: horizontal
|
||||||
position: bottomCenter
|
position: bottomCenter
|
||||||
networks: Weibo,Wechat,Douban,QQZone,Twitter,Facebook
|
networks: Weibo,Wechat,Douban,QQZone,Twitter,Facebook
|
||||||
float:
|
float:
|
||||||
enable: false
|
enable: true
|
||||||
options:
|
options:
|
||||||
iconStyle: box
|
iconStyle: box
|
||||||
boxForm: horizontal
|
boxForm: horizontal
|
||||||
@ -697,24 +697,24 @@ motion:
|
|||||||
fancybox: true
|
fancybox: true
|
||||||
|
|
||||||
# Progress bar in the top during page loading.
|
# Progress bar in the top during page loading.
|
||||||
pace: false
|
pace: true
|
||||||
# Themes list:
|
# Themes list:
|
||||||
#pace-theme-big-counter
|
#pace-theme-big-counter
|
||||||
#pace-theme-bounce
|
#pace-theme-bounce
|
||||||
#pace-theme-barber-shop
|
#pace-theme-barber-shop
|
||||||
#pace-theme-center-atom
|
pace_theme: pace-theme-center-atom
|
||||||
#pace-theme-center-circle
|
#pace-theme-center-circle
|
||||||
#pace-theme-center-radar
|
#pace-theme-center-radar
|
||||||
#pace-theme-center-simple
|
#pace-theme-center-simple
|
||||||
#pace-theme-corner-indicator
|
#pace-theme-corner-indicator
|
||||||
#pace-theme-fill-left
|
#pace-theme-fill-left
|
||||||
#pace-theme-flash
|
# pace_theme: pace-theme-flash
|
||||||
#pace-theme-loading-bar
|
#pace-theme-loading-bar
|
||||||
#pace-theme-mac-osx
|
# pace_theme: pace-theme-mac-osx
|
||||||
#pace-theme-minimal
|
#pace-theme-minimal
|
||||||
# For example
|
# For example
|
||||||
# pace_theme: pace-theme-center-simple
|
# pace_theme: pace-theme-center-simple
|
||||||
pace_theme: pace-theme-minimal
|
# pace_theme: pace-theme-minimal
|
||||||
|
|
||||||
# Canvas-nest
|
# Canvas-nest
|
||||||
canvas_nest: false
|
canvas_nest: false
|
||||||
@ -734,7 +734,7 @@ canvas_sphere: false
|
|||||||
# alpha: The transparency of the ribbon.
|
# alpha: The transparency of the ribbon.
|
||||||
# zIndex: The display level of the ribbon.
|
# zIndex: The display level of the ribbon.
|
||||||
canvas_ribbon:
|
canvas_ribbon:
|
||||||
enable: false
|
enable: true
|
||||||
size: 300
|
size: 300
|
||||||
alpha: 0.6
|
alpha: 0.6
|
||||||
zIndex: -1
|
zIndex: -1
|
||||||
|
Loading…
Reference in New Issue
Block a user