Site updated: 2021-04-10 21:53:40
This commit is contained in:
parent
1638474a10
commit
e039e833e2
@ -640,7 +640,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,13 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="控制局域网内的IOT设备中间人攻击—流量分析使用Nmap分析局域网内设备,得到智能设备的IP 小米智能插座:192.168.31.197 网关:192.168.31.147(控制它的手机ip) ettercap嗅探智能设备和网关之间的流量sudo ettercap -i ens33 -T -q -M ARP:remote /192.168.31.197// /192.168.31.147//">
|
||||
<meta name="description" content="局域网内所有的动作都在黑客的掌握之中吗?">
|
||||
<meta name="keywords" content="小米,miio,中间人,重放攻击">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="利用miio控制局域网内的小米智能设备">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2018/12/15/miio-control/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="控制局域网内的IOT设备中间人攻击—流量分析使用Nmap分析局域网内设备,得到智能设备的IP 小米智能插座:192.168.31.197 网关:192.168.31.147(控制它的手机ip) ettercap嗅探智能设备和网关之间的流量sudo ettercap -i ens33 -T -q -M ARP:remote /192.168.31.197// /192.168.31.147//">
|
||||
<meta property="og:description" content="局域网内所有的动作都在黑客的掌握之中吗?">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323434/miio/1.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323435/miio/2.png">
|
||||
@ -95,10 +95,10 @@
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323440/miio/6.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323440/miio/7.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323440/miio/8.png">
|
||||
<meta property="og:updated_time" content="2019-04-15T07:35:38.082Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:43:57.848Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="利用miio控制局域网内的小米智能设备">
|
||||
<meta name="twitter:description" content="控制局域网内的IOT设备中间人攻击—流量分析使用Nmap分析局域网内设备,得到智能设备的IP 小米智能插座:192.168.31.197 网关:192.168.31.147(控制它的手机ip) ettercap嗅探智能设备和网关之间的流量sudo ettercap -i ens33 -T -q -M ARP:remote /192.168.31.197// /192.168.31.147//">
|
||||
<meta name="twitter:description" content="局域网内所有的动作都在黑客的掌握之中吗?">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323434/miio/1.png">
|
||||
|
||||
|
||||
@ -405,6 +405,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
局域网内所有的动作都在黑客的掌握之中吗?
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -730,7 +734,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,23 +79,23 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="论文来源:USENIX SECURITY 2018:Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices下载:原文pdf中文slides 论文解读概要: 物联网(IoT)设备的快速增长的格局为其管理和安全性带来了重大的技术挑战,因为这些物联网设备来自不同的设备类型,供应商和产品模型。 物联网设备的发现是">
|
||||
<meta name="description" content="提前发现、登记和注释物联网设备">
|
||||
<meta name="keywords" content="USENIX,数据挖掘,自然语言处理">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="基于采集规则引擎的物联网设备发现方法">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2018/12/23/基于规则引擎发现IOT设备/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="论文来源:USENIX SECURITY 2018:Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices下载:原文pdf中文slides 论文解读概要: 物联网(IoT)设备的快速增长的格局为其管理和安全性带来了重大的技术挑战,因为这些物联网设备来自不同的设备类型,供应商和产品模型。 物联网设备的发现是">
|
||||
<meta property="og:description" content="提前发现、登记和注释物联网设备">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313806/ARE/1.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313904/ARE/2.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313904/ARE/4.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313946/ARE/6.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313805/ARE/5.png">
|
||||
<meta property="og:updated_time" content="2019-04-15T07:35:38.083Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:33:47.037Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="基于采集规则引擎的物联网设备发现方法">
|
||||
<meta name="twitter:description" content="论文来源:USENIX SECURITY 2018:Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices下载:原文pdf中文slides 论文解读概要: 物联网(IoT)设备的快速增长的格局为其管理和安全性带来了重大的技术挑战,因为这些物联网设备来自不同的设备类型,供应商和产品模型。 物联网设备的发现是">
|
||||
<meta name="twitter:description" content="提前发现、登记和注释物联网设备">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313806/ARE/1.png">
|
||||
|
||||
|
||||
@ -402,6 +402,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
提前发现、登记和注释物联网设备
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -730,7 +734,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,18 +79,18 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析Tcpdump介绍 tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。tcpdump 适用于大多数的类Unix系统 操作系统:包括Linux、Solaris、BSD、Mac OS X、HP-UX和AIX 等等。在这些系统中,tcpdump 需要使用libpcap这个捕捉数据的">
|
||||
<meta name="description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析">
|
||||
<meta name="keywords" content="TCPDUMP,拒绝服务攻击">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="TCPDUMP拒绝服务攻击漏洞">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2018/12/25/TCPDUMP拒绝服务攻击漏洞/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析Tcpdump介绍 tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。tcpdump 适用于大多数的类Unix系统 操作系统:包括Linux、Solaris、BSD、Mac OS X、HP-UX和AIX 等等。在这些系统中,tcpdump 需要使用libpcap这个捕捉数据的">
|
||||
<meta property="og:description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:updated_time" content="2019-07-01T09:28:40.813Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:48:18.517Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="TCPDUMP拒绝服务攻击漏洞">
|
||||
<meta name="twitter:description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析Tcpdump介绍 tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。tcpdump 适用于大多数的类Unix系统 操作系统:包括Linux、Solaris、BSD、Mac OS X、HP-UX和AIX 等等。在这些系统中,tcpdump 需要使用libpcap这个捕捉数据的">
|
||||
<meta name="twitter:description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析">
|
||||
|
||||
|
||||
|
||||
@ -396,6 +396,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
TCPDUMP 4.5.1 拒绝服务攻击漏洞分析
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -410,7 +414,7 @@
|
||||
|
||||
|
||||
|
||||
<h1 id="TCPDUMP-4-5-1-拒绝服务攻击漏洞分析"><a href="#TCPDUMP-4-5-1-拒绝服务攻击漏洞分析" class="headerlink" title="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析"></a>TCPDUMP 4.5.1 拒绝服务攻击漏洞分析</h1><h2 id="Tcpdump介绍"><a href="#Tcpdump介绍" class="headerlink" title="Tcpdump介绍"></a>Tcpdump介绍</h2><ol>
|
||||
<h2 id="Tcpdump介绍"><a href="#Tcpdump介绍" class="headerlink" title="Tcpdump介绍"></a>Tcpdump介绍</h2><ol>
|
||||
<li>tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。tcpdump 适用于大多数的类Unix系统 操作系统:包括Linux、Solaris、BSD、Mac OS X、HP-UX和AIX 等等。在这些系统中,tcpdump 需要使用libpcap这个捕捉数据的库。其在Windows下的版本称为WinDump;它需要WinPcap驱动,相当于在Linux平台下的libpcap.</li>
|
||||
<li>tcpdump能够分析网络行为,性能和应用产生或接收网络流量。它支持针对网络层、协议、主机、网络或端口的过滤,并提供and、or、not等逻辑语句来帮助你去掉无用的信息,从而使用户能够进一步找出问题的根源。</li>
|
||||
<li>也可以使用 tcpdump 的实现特定目的,例如在路由器和网关之间拦截并显示其他用户或计算机通信。通过 tcpdump 分析非加密的流量,如Telnet或HTTP的数据包,查看登录的用户名、密码、网址、正在浏览的网站内容,或任何其他信息。因此系统中存在网络分析工具主要不是对本机安全的威胁,而是对网络上的其他计算机的安全存在威胁。</li>
|
||||
@ -703,7 +707,7 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-toc-content"><ol class="nav"><li class="nav-item nav-level-1"><a class="nav-link" href="#TCPDUMP-4-5-1-拒绝服务攻击漏洞分析"><span class="nav-text">TCPDUMP 4.5.1 拒绝服务攻击漏洞分析</span></a><ol class="nav-child"><li class="nav-item nav-level-2"><a class="nav-link" href="#Tcpdump介绍"><span class="nav-text">Tcpdump介绍</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#分析环境"><span class="nav-text">分析环境</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#漏洞复现"><span class="nav-text">漏洞复现</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#编译安装tcpdump"><span class="nav-text">编译安装tcpdump</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#生成payload(来自exploit-db-payload)"><span class="nav-text">生成payload(来自exploit-db payload)</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#崩溃分析"><span class="nav-text">崩溃分析</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#pcap包格式"><span class="nav-text">pcap包格式</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#gdb调试"><span class="nav-text">gdb调试</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#内存分析"><span class="nav-text">内存分析</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#漏洞总结"><span class="nav-text">漏洞总结</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#漏洞修补"><span class="nav-text">漏洞修补</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#参考"><span class="nav-text">参考</span></a></li></ol></li></ol></div>
|
||||
<div class="post-toc-content"><ol class="nav"><li class="nav-item nav-level-2"><a class="nav-link" href="#Tcpdump介绍"><span class="nav-text">Tcpdump介绍</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#分析环境"><span class="nav-text">分析环境</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#漏洞复现"><span class="nav-text">漏洞复现</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#编译安装tcpdump"><span class="nav-text">编译安装tcpdump</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#生成payload(来自exploit-db-payload)"><span class="nav-text">生成payload(来自exploit-db payload)</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#崩溃分析"><span class="nav-text">崩溃分析</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#pcap包格式"><span class="nav-text">pcap包格式</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#gdb调试"><span class="nav-text">gdb调试</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#内存分析"><span class="nav-text">内存分析</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#漏洞总结"><span class="nav-text">漏洞总结</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#漏洞修补"><span class="nav-text">漏洞修补</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#参考"><span class="nav-text">参考</span></a></li></ol></div>
|
||||
|
||||
|
||||
</div>
|
||||
@ -735,7 +739,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,13 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="TCP侧信道分析及利用的学习报告论文来源:USENIX SECURITY 2018:Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets下载:原文pdf中文slides 背景知识测信道香农信息论 什么是信息? 用来减少随机不确定的东西 什么是加密? 类似于加噪声,增加随机不确定性 “从密码分析者来看,一个保">
|
||||
<meta name="description" content="什么是信息?什么是加密?什么是侧信道?">
|
||||
<meta name="keywords" content="侧信道攻击,wifi">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="wifi半双工侧信道攻击学习笔记">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/01/16/wifi半双工侧信道攻击学习笔记/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="TCP侧信道分析及利用的学习报告论文来源:USENIX SECURITY 2018:Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets下载:原文pdf中文slides 背景知识测信道香农信息论 什么是信息? 用来减少随机不确定的东西 什么是加密? 类似于加噪声,增加随机不确定性 “从密码分析者来看,一个保">
|
||||
<meta property="og:description" content="什么是信息?什么是加密?什么是侧信道?">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://raw.githubusercontent.com/Cool-Y/tcp_exploit/master/pic/1.PNG">
|
||||
<meta property="og:image" content="https://github.com/Cool-Y/tcp_exploit/blob/master/pic/2-Man_in_the_middle_attack.svg.png?raw=true">
|
||||
@ -99,10 +99,10 @@
|
||||
<meta property="og:image" content="https://github.com/Cool-Y/tcp_exploit/blob/master/pic/8-noTrigger.PNG?raw=true">
|
||||
<meta property="og:image" content="https://github.com/Cool-Y/tcp_exploit/blob/master/pic/9-%E5%BA%8F%E5%88%97%E5%8F%B7%E6%8E%A8%E6%96%AD.PNG?raw=true">
|
||||
<meta property="og:image" content="https://github.com/Cool-Y/tcp_exploit/blob/master/pic/9-http%E6%B3%A8%E5%85%A5.PNG?raw=true">
|
||||
<meta property="og:updated_time" content="2020-10-19T04:44:41.846Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:51:18.277Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="wifi半双工侧信道攻击学习笔记">
|
||||
<meta name="twitter:description" content="TCP侧信道分析及利用的学习报告论文来源:USENIX SECURITY 2018:Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets下载:原文pdf中文slides 背景知识测信道香农信息论 什么是信息? 用来减少随机不确定的东西 什么是加密? 类似于加噪声,增加随机不确定性 “从密码分析者来看,一个保">
|
||||
<meta name="twitter:description" content="什么是信息?什么是加密?什么是侧信道?">
|
||||
<meta name="twitter:image" content="https://raw.githubusercontent.com/Cool-Y/tcp_exploit/master/pic/1.PNG">
|
||||
|
||||
|
||||
@ -409,6 +409,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
什么是信息?什么是加密?什么是侧信道?
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -858,7 +862,7 @@ Server -------wire----------|
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,19 +79,19 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="qq数据库采用简单加密——异或加密数据获取:DENGTA_META.xml—IMEI:867179032952446databases/2685371834.db——数据库文件 解密方式:明文msg_t 密文msg_Data key:IMEImsg_t = msg_Data[i]^IMEI[i%15] 实验:123456789101112131415161718192021222324imp">
|
||||
<meta name="description" content="很久远的攻击,可能现在还有效">
|
||||
<meta name="keywords" content="密码,QQ,数据库">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="QQ数据库的加密与解密">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/02/22/qq数据库的加密解密/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="qq数据库采用简单加密——异或加密数据获取:DENGTA_META.xml—IMEI:867179032952446databases/2685371834.db——数据库文件 解密方式:明文msg_t 密文msg_Data key:IMEImsg_t = msg_Data[i]^IMEI[i%15] 实验:123456789101112131415161718192021222324imp">
|
||||
<meta property="og:description" content="很久远的攻击,可能现在还有效">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1552728077/qq.png">
|
||||
<meta property="og:updated_time" content="2019-04-15T07:35:38.082Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:47:12.326Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="QQ数据库的加密与解密">
|
||||
<meta name="twitter:description" content="qq数据库采用简单加密——异或加密数据获取:DENGTA_META.xml—IMEI:867179032952446databases/2685371834.db——数据库文件 解密方式:明文msg_t 密文msg_Data key:IMEImsg_t = msg_Data[i]^IMEI[i%15] 实验:123456789101112131415161718192021222324imp">
|
||||
<meta name="twitter:description" content="很久远的攻击,可能现在还有效">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1552728077/qq.png">
|
||||
|
||||
|
||||
@ -398,6 +398,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
很久远的攻击,可能现在还有效
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -707,7 +711,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,18 +79,18 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="小米固件工具mkxqimage小米自己改了个打包解包固件的工具,基于 trx 改的(本质上还是 trx 格式),加了 RSA 验证和解包功能,路由系统里自带:1234Usage:mkxqimg [-o outfile] [-p private_key] [-f file] [-f file [-f file [-f file ]]] [-x file] [-I] 固件打">
|
||||
<meta name="description" content="小米基于 trx 改了个打包解包固件的工具">
|
||||
<meta name="keywords" content="小米,文件格式,SSH">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="小米固件工具mkxqimage">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/03/16/小米固件工具mkxqimage/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="小米固件工具mkxqimage小米自己改了个打包解包固件的工具,基于 trx 改的(本质上还是 trx 格式),加了 RSA 验证和解包功能,路由系统里自带:1234Usage:mkxqimg [-o outfile] [-p private_key] [-f file] [-f file [-f file [-f file ]]] [-x file] [-I] 固件打">
|
||||
<meta property="og:description" content="小米基于 trx 改了个打包解包固件的工具">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:updated_time" content="2019-07-24T06:32:11.089Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:35:03.596Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="小米固件工具mkxqimage">
|
||||
<meta name="twitter:description" content="小米固件工具mkxqimage小米自己改了个打包解包固件的工具,基于 trx 改的(本质上还是 trx 格式),加了 RSA 验证和解包功能,路由系统里自带:1234Usage:mkxqimg [-o outfile] [-p private_key] [-f file] [-f file [-f file [-f file ]]] [-x file] [-I] 固件打">
|
||||
<meta name="twitter:description" content="小米基于 trx 改了个打包解包固件的工具">
|
||||
|
||||
|
||||
|
||||
@ -396,6 +396,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
小米基于 trx 改了个打包解包固件的工具
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -716,7 +720,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,18 +79,18 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="我们实验室有个光荣传统,每天早上起床叫醒我的不是闹钟,而是群里雷打不动的安全新闻(其实我免提醒了2333)而这个发送新闻的人,一代一代的传承,我没想到竟然有一天会落在我头上,哭了o(╥﹏╥)o为了不暴露我的起床时间,同时能保质保量的完成任务,我决定做个机器人帮我完成。这就是这片po文的由来啦! 大杀器itchatintroduction先来一段itchat的官方介绍吧 itchat是一个开源的微">
|
||||
<meta name="description" content="看了这篇文章,女朋友还会问你为什么不给她发微信吗?">
|
||||
<meta name="keywords" content="itchat,微信">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="利用itchat定时转发微信消息">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/03/23/auto-send-WX/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="我们实验室有个光荣传统,每天早上起床叫醒我的不是闹钟,而是群里雷打不动的安全新闻(其实我免提醒了2333)而这个发送新闻的人,一代一代的传承,我没想到竟然有一天会落在我头上,哭了o(╥﹏╥)o为了不暴露我的起床时间,同时能保质保量的完成任务,我决定做个机器人帮我完成。这就是这片po文的由来啦! 大杀器itchatintroduction先来一段itchat的官方介绍吧 itchat是一个开源的微">
|
||||
<meta property="og:description" content="看了这篇文章,女朋友还会问你为什么不给她发微信吗?">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:updated_time" content="2019-04-15T07:35:38.081Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:36:52.758Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="利用itchat定时转发微信消息">
|
||||
<meta name="twitter:description" content="我们实验室有个光荣传统,每天早上起床叫醒我的不是闹钟,而是群里雷打不动的安全新闻(其实我免提醒了2333)而这个发送新闻的人,一代一代的传承,我没想到竟然有一天会落在我头上,哭了o(╥﹏╥)o为了不暴露我的起床时间,同时能保质保量的完成任务,我决定做个机器人帮我完成。这就是这片po文的由来啦! 大杀器itchatintroduction先来一段itchat的官方介绍吧 itchat是一个开源的微">
|
||||
<meta name="twitter:description" content="看了这篇文章,女朋友还会问你为什么不给她发微信吗?">
|
||||
|
||||
|
||||
|
||||
@ -396,6 +396,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
看了这篇文章,女朋友还会问你为什么不给她发微信吗?
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -724,7 +728,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,13 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="漏洞描述Samba服务器软件存在远程执行代码漏洞。攻击者可以利用客户端将指定库文件上传到具有可写权限的共享目录,会导致服务器加载并执行指定的库文件。具体执行条件如下: 服务器打开了文件/打印机共享端口445,让其能够在公网上访问 共享文件拥有写入权限 恶意攻击者需猜解Samba服务端共享目录的物理路径 Samba介绍Samba是在Linux和Unix系统上实现SMB协议的一个免费软件,由">
|
||||
<meta name="description" content="Samba漏洞臭名昭著">
|
||||
<meta name="keywords" content="Samba,远程执行,CVE">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="某厂商路由器与Samba漏洞CVE-2017-7494">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/03/25/Samba-CVE/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="漏洞描述Samba服务器软件存在远程执行代码漏洞。攻击者可以利用客户端将指定库文件上传到具有可写权限的共享目录,会导致服务器加载并执行指定的库文件。具体执行条件如下: 服务器打开了文件/打印机共享端口445,让其能够在公网上访问 共享文件拥有写入权限 恶意攻击者需猜解Samba服务端共享目录的物理路径 Samba介绍Samba是在Linux和Unix系统上实现SMB协议的一个免费软件,由">
|
||||
<meta property="og:description" content="Samba漏洞臭名昭著">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://www.testzero-wz.com/2018/07/20/Samba%E8%BF%9C%E7%A8%8B%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90%20CVE-2017-7494/02-00-46.png">
|
||||
<meta property="og:image" content="https://www.testzero-wz.com/2018/07/20/Samba%E8%BF%9C%E7%A8%8B%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90%20CVE-2017-7494/01-59-58.jpg">
|
||||
@ -100,10 +100,10 @@
|
||||
<meta property="og:image" content="https://www.testzero-wz.com/2018/07/20/Samba%E8%BF%9C%E7%A8%8B%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90%20CVE-2017-7494/01-38-28.jpg">
|
||||
<meta property="og:image" content="https://www.testzero-wz.com/2018/07/20/Samba%E8%BF%9C%E7%A8%8B%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90%20CVE-2017-7494/01-43-02.jpg">
|
||||
<meta property="og:image" content="https://www.testzero-wz.com/2018/07/20/Samba%E8%BF%9C%E7%A8%8B%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90%20CVE-2017-7494/01-45-01.png">
|
||||
<meta property="og:updated_time" content="2020-10-19T04:26:54.240Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:47:36.387Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="某厂商路由器与Samba漏洞CVE-2017-7494">
|
||||
<meta name="twitter:description" content="漏洞描述Samba服务器软件存在远程执行代码漏洞。攻击者可以利用客户端将指定库文件上传到具有可写权限的共享目录,会导致服务器加载并执行指定的库文件。具体执行条件如下: 服务器打开了文件/打印机共享端口445,让其能够在公网上访问 共享文件拥有写入权限 恶意攻击者需猜解Samba服务端共享目录的物理路径 Samba介绍Samba是在Linux和Unix系统上实现SMB协议的一个免费软件,由">
|
||||
<meta name="twitter:description" content="Samba漏洞臭名昭著">
|
||||
<meta name="twitter:image" content="https://www.testzero-wz.com/2018/07/20/Samba%E8%BF%9C%E7%A8%8B%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90%20CVE-2017-7494/02-00-46.png">
|
||||
|
||||
|
||||
@ -410,6 +410,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
Samba漏洞臭名昭著
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -752,7 +756,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,13 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="软件保护方式 功能限制 时间限制 运行时长限制 使用日期限制 使用次数限制 警告窗口 分析工具 静态分析工具 IDA W32Dasm lordPE Resource Hacker 动态分析工具 OllyDbg WinDbg 对抗分析技术 反静态分析技术 花指令 自修改代码技术 多态技术 变形技术 虚拟机保护技术 反动态分析技术 检测调试状态 检测用户态调试器">
|
||||
<meta name="description" content="一些逆向的小实验">
|
||||
<meta name="keywords" content="逆向,破解">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="逆向工程与软件破解">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/03/28/逆向工程实验/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="软件保护方式 功能限制 时间限制 运行时长限制 使用日期限制 使用次数限制 警告窗口 分析工具 静态分析工具 IDA W32Dasm lordPE Resource Hacker 动态分析工具 OllyDbg WinDbg 对抗分析技术 反静态分析技术 花指令 自修改代码技术 多态技术 变形技术 虚拟机保护技术 反动态分析技术 检测调试状态 检测用户态调试器">
|
||||
<meta property="og:description" content="一些逆向的小实验">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553759246/%E8%BD%AF%E4%BB%B6%E7%A0%B4%E8%A7%A3/%E5%9B%BE%E7%89%871.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553772615/%E8%BD%AF%E4%BB%B6%E7%A0%B4%E8%A7%A3/%E6%8D%95%E8%8E%B71.png">
|
||||
@ -105,10 +105,10 @@
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1557133828/%E8%BD%AF%E4%BB%B6%E7%A0%B4%E8%A7%A3/7.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1557227067/%E8%BD%AF%E4%BB%B6%E7%A0%B4%E8%A7%A3/8.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1557227506/%E8%BD%AF%E4%BB%B6%E7%A0%B4%E8%A7%A3/9.png">
|
||||
<meta property="og:updated_time" content="2019-05-07T11:34:22.987Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:34:37.251Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="逆向工程与软件破解">
|
||||
<meta name="twitter:description" content="软件保护方式 功能限制 时间限制 运行时长限制 使用日期限制 使用次数限制 警告窗口 分析工具 静态分析工具 IDA W32Dasm lordPE Resource Hacker 动态分析工具 OllyDbg WinDbg 对抗分析技术 反静态分析技术 花指令 自修改代码技术 多态技术 变形技术 虚拟机保护技术 反动态分析技术 检测调试状态 检测用户态调试器">
|
||||
<meta name="twitter:description" content="一些逆向的小实验">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553759246/%E8%BD%AF%E4%BB%B6%E7%A0%B4%E8%A7%A3/%E5%9B%BE%E7%89%871.png">
|
||||
|
||||
|
||||
@ -415,6 +415,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
一些逆向的小实验
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -852,7 +856,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,13 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="Carving Database Storage to Detect and Trace Security Breaches 复原数据库存储以检测和跟踪安全漏洞原文下载 MotivationDBMS(数据库管理系统) 通常用于存储和处理敏感数据,因此,投入了大量精力使用访问控制策略来保护DBMS。 一旦用户在DBMS中获得提升权限(无论是合理的还是通过攻击的),实施的安全方案可以绕过,因此无法再">
|
||||
<meta name="description" content="再也不敢删库跑路了!">
|
||||
<meta name="keywords" content="数据库,复原文件,取证">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="复原数据库存储以检测和跟踪安全漏洞">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/04/15/Caving-db-storage/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="Carving Database Storage to Detect and Trace Security Breaches 复原数据库存储以检测和跟踪安全漏洞原文下载 MotivationDBMS(数据库管理系统) 通常用于存储和处理敏感数据,因此,投入了大量精力使用访问控制策略来保护DBMS。 一旦用户在DBMS中获得提升权限(无论是合理的还是通过攻击的),实施的安全方案可以绕过,因此无法再">
|
||||
<meta property="og:description" content="再也不敢删库跑路了!">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555310640/paper/%E5%9B%BE%E7%89%871.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555310736/paper/%E6%8D%95%E8%8E%B7.png">
|
||||
@ -99,10 +99,10 @@
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555312234/paper/%E5%9B%BE%E7%89%879.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555312316/paper/%E5%9B%BE%E7%89%8710.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555312359/paper/%E5%9B%BE%E7%89%8711.png">
|
||||
<meta property="og:updated_time" content="2019-04-15T08:01:31.751Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:37:48.593Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="复原数据库存储以检测和跟踪安全漏洞">
|
||||
<meta name="twitter:description" content="Carving Database Storage to Detect and Trace Security Breaches 复原数据库存储以检测和跟踪安全漏洞原文下载 MotivationDBMS(数据库管理系统) 通常用于存储和处理敏感数据,因此,投入了大量精力使用访问控制策略来保护DBMS。 一旦用户在DBMS中获得提升权限(无论是合理的还是通过攻击的),实施的安全方案可以绕过,因此无法再">
|
||||
<meta name="twitter:description" content="再也不敢删库跑路了!">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555310640/paper/%E5%9B%BE%E7%89%871.png">
|
||||
|
||||
|
||||
@ -409,6 +409,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
再也不敢删库跑路了!
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -773,7 +777,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,13 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="概述HomePageOpenWRT与miniUPnP MiniUPnP项目提供了支持UPnP IGD(互联网网关设备)规范的软件。在MiniUPnPd中添加了NAT-PMP和PCP支持。 对于客户端(MiniUPnPc)使用libnatpmp来支持NAT-PMP。MiniUPnP守护程序(MiniUPnPd)支持OpenBSD,FreeBSD,NetBSD,DragonFly BSD(Open)">
|
||||
<meta name="description" content="非常经典的UPnP,Classic~">
|
||||
<meta name="keywords" content="小米,路由器,MiniUPnP">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="小米路由器_MiniUPnP协议">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/04/21/XIAOMI-UPnP/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="概述HomePageOpenWRT与miniUPnP MiniUPnP项目提供了支持UPnP IGD(互联网网关设备)规范的软件。在MiniUPnPd中添加了NAT-PMP和PCP支持。 对于客户端(MiniUPnPc)使用libnatpmp来支持NAT-PMP。MiniUPnP守护程序(MiniUPnPd)支持OpenBSD,FreeBSD,NetBSD,DragonFly BSD(Open)">
|
||||
<meta property="og:description" content="非常经典的UPnP,Classic~">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555830377/paper/111.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555830425/paper/112.png">
|
||||
@ -106,10 +106,10 @@
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555581672/paper/10.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555581840/paper/11.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555918880/paper/2231.png">
|
||||
<meta property="og:updated_time" content="2019-07-11T01:51:28.743Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:52:11.589Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="小米路由器_MiniUPnP协议">
|
||||
<meta name="twitter:description" content="概述HomePageOpenWRT与miniUPnP MiniUPnP项目提供了支持UPnP IGD(互联网网关设备)规范的软件。在MiniUPnPd中添加了NAT-PMP和PCP支持。 对于客户端(MiniUPnPc)使用libnatpmp来支持NAT-PMP。MiniUPnP守护程序(MiniUPnPd)支持OpenBSD,FreeBSD,NetBSD,DragonFly BSD(Open)">
|
||||
<meta name="twitter:description" content="非常经典的UPnP,Classic~">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555830377/paper/111.png">
|
||||
|
||||
|
||||
@ -416,6 +416,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
非常经典的UPnP,Classic~
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -897,7 +901,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,19 +79,19 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="PE文件格式PE(Portable Executable)是Win32平台下可执行文件遵守的数据格式。常见的可执行文件(如exe和dll)都是典型的PE文件。PE文件格式其实是一种数据结构,包含Windows操作系统加载管理可执行代码时所必要的信息,如二进制机器代码、字符串、菜单、图标、位图、字体等。PE文件格式规定了所有这些信息在可执行文件中如何组织。在程序被执行时,操作系统会按照PE文件格式的">
|
||||
<meta name="description" content="庖丁解牛.jpg">
|
||||
<meta name="keywords" content="文件格式,PE">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="PE文件格式学习">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/05/13/PE-file/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="PE文件格式PE(Portable Executable)是Win32平台下可执行文件遵守的数据格式。常见的可执行文件(如exe和dll)都是典型的PE文件。PE文件格式其实是一种数据结构,包含Windows操作系统加载管理可执行代码时所必要的信息,如二进制机器代码、字符串、菜单、图标、位图、字体等。PE文件格式规定了所有这些信息在可执行文件中如何组织。在程序被执行时,操作系统会按照PE文件格式的">
|
||||
<meta property="og:description" content="庖丁解牛.jpg">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1556519313/pwn/1506049226526485.jpg">
|
||||
<meta property="og:updated_time" content="2020-10-19T04:14:48.537Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:46:18.806Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="PE文件格式学习">
|
||||
<meta name="twitter:description" content="PE文件格式PE(Portable Executable)是Win32平台下可执行文件遵守的数据格式。常见的可执行文件(如exe和dll)都是典型的PE文件。PE文件格式其实是一种数据结构,包含Windows操作系统加载管理可执行代码时所必要的信息,如二进制机器代码、字符串、菜单、图标、位图、字体等。PE文件格式规定了所有这些信息在可执行文件中如何组织。在程序被执行时,操作系统会按照PE文件格式的">
|
||||
<meta name="twitter:description" content="庖丁解牛.jpg">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1556519313/pwn/1506049226526485.jpg">
|
||||
|
||||
|
||||
@ -398,6 +398,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
庖丁解牛.jpg
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -816,7 +820,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -68,7 +68,7 @@
|
||||
|
||||
|
||||
|
||||
<meta name="keywords" content="Hexo, NexT">
|
||||
<meta name="keywords" content="逆向,破解,">
|
||||
|
||||
|
||||
|
||||
@ -79,12 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。壳附加在原始程序上,通过Windows加载器载入内存后,先于原始程序执行,以得到控制权,在执行的过程中对原始程序进行解密还原,然后把控制权还给原始程序,执行原来的代码。加上外壳后,原始程序在磁盘文件中一般是以加密后的形式存在的,只在执行时在内存中还原。这样可以有效防止破解者对程序文件进行非法修改,也可以防止程序被静态反编译。 壳的加">
|
||||
<meta name="description" content="壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。">
|
||||
<meta name="keywords" content="逆向,破解">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="加壳与脱壳">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/05/14/pack-and-unpack/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。壳附加在原始程序上,通过Windows加载器载入内存后,先于原始程序执行,以得到控制权,在执行的过程中对原始程序进行解密还原,然后把控制权还给原始程序,执行原来的代码。加上外壳后,原始程序在磁盘文件中一般是以加密后的形式存在的,只在执行时在内存中还原。这样可以有效防止破解者对程序文件进行非法修改,也可以防止程序被静态反编译。 壳的加">
|
||||
<meta property="og:description" content="壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1557817831/%E5%8A%A0%E5%A3%B3/1.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1557817867/%E5%8A%A0%E5%A3%B3/2.png">
|
||||
@ -97,10 +98,10 @@
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1557837250/%E5%8A%A0%E5%A3%B3/9.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1557837519/%E5%8A%A0%E5%A3%B3/10.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1557837859/%E5%8A%A0%E5%A3%B3/11.png">
|
||||
<meta property="og:updated_time" content="2019-07-01T12:04:55.244Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:45:39.726Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="加壳与脱壳">
|
||||
<meta name="twitter:description" content="壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。壳附加在原始程序上,通过Windows加载器载入内存后,先于原始程序执行,以得到控制权,在执行的过程中对原始程序进行解密还原,然后把控制权还给原始程序,执行原来的代码。加上外壳后,原始程序在磁盘文件中一般是以加密后的形式存在的,只在执行时在内存中还原。这样可以有效防止破解者对程序文件进行非法修改,也可以防止程序被静态反编译。 壳的加">
|
||||
<meta name="twitter:description" content="壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1557817831/%E5%8A%A0%E5%A3%B3/1.png">
|
||||
|
||||
|
||||
@ -334,6 +335,28 @@
|
||||
</span>
|
||||
|
||||
|
||||
<span class="post-category">
|
||||
|
||||
<span class="post-meta-divider">|</span>
|
||||
|
||||
<span class="post-meta-item-icon">
|
||||
<i class="fa fa-folder-o"></i>
|
||||
</span>
|
||||
|
||||
<span class="post-meta-item-text">分类于</span>
|
||||
|
||||
|
||||
<span itemprop="about" itemscope itemtype="http://schema.org/Thing">
|
||||
<a href="/categories/二进制/" itemprop="url" rel="index">
|
||||
<span itemprop="name">二进制</span>
|
||||
</a>
|
||||
</span>
|
||||
|
||||
|
||||
|
||||
|
||||
</span>
|
||||
|
||||
|
||||
|
||||
|
||||
@ -385,6 +408,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -399,7 +426,7 @@
|
||||
|
||||
|
||||
|
||||
<p>壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。<br>壳附加在原始程序上,通过Windows加载器载入内存后,先于原始程序执行,以得到控制权,在执行的过程中对原始程序进行解密还原,然后把控制权还给原始程序,执行原来的代码。<br>加上外壳后,原始程序在磁盘文件中一般是以加密后的形式存在的,只在执行时在内存中还原。这样可以有效防止破解者对程序文件进行非法修改,也可以防止程序被静态反编译。</p>
|
||||
<p>壳附加在原始程序上,通过Windows加载器载入内存后,先于原始程序执行,以得到控制权,在执行的过程中对原始程序进行解密还原,然后把控制权还给原始程序,执行原来的代码。<br>加上外壳后,原始程序在磁盘文件中一般是以加密后的形式存在的,只在执行时在内存中还原。这样可以有效防止破解者对程序文件进行非法修改,也可以防止程序被静态反编译。</p>
|
||||
<h1 id="壳的加载过程"><a href="#壳的加载过程" class="headerlink" title="壳的加载过程"></a>壳的加载过程</h1><p>壳和病毒在某些地方类似,都需要获得比原程序更早的控制权。壳修改了原程序执行文件的组织结构,从而获得控制权,但不会影响原程序正常运行。</p>
|
||||
<ol>
|
||||
<li>保存入口参数<br>加壳程序在初始化时会保存各寄存器的值,待外壳执行完毕,再恢复各寄存器的内容,最后跳回原程序执行。通常用pushad/popad等指令保存和恢复现场环境。</li>
|
||||
@ -519,6 +546,14 @@
|
||||
|
||||
<footer class="post-footer">
|
||||
|
||||
<div class="post-tags">
|
||||
|
||||
<a href="/tags/逆向/" rel="tag"># 逆向</a>
|
||||
|
||||
<a href="/tags/破解/" rel="tag"># 破解</a>
|
||||
|
||||
</div>
|
||||
|
||||
|
||||
|
||||
|
||||
@ -738,7 +773,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,20 +79,20 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="接触这个词语已经有一年了,但还没有学习过更没有上手实践过,正好趁这个机会好好弄弄AFL。提起模糊测试,我们总会联想起这样或那样的专业术语——测试用例、代码覆盖率、执行路径等等,你可能和我一样一头雾水,这次我们就来看个明白 0x01 模糊测试首先,模糊测试(Fuzzing)是一种测试手段,它把系统看成一个摸不清内部结构的黑盒,只是向其输入接口随机地发送合法测试用例,这些用例并不是开发者所预期的输入">
|
||||
<meta name="description" content="接触这个词语已经有一年了,但还没有学习过更没有上手实践过,正好趁这个机会好好弄弄AFL。提起模糊测试,我们总会联想起这样或那样的专业术语——测试用例、代码覆盖率、执行路径等等,你可能和我一样一头雾水,这次我们就来看个明白">
|
||||
<meta name="keywords" content="AFL,模糊测试">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="模糊测试与AFL">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/07/01/AFL-first-learn/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="接触这个词语已经有一年了,但还没有学习过更没有上手实践过,正好趁这个机会好好弄弄AFL。提起模糊测试,我们总会联想起这样或那样的专业术语——测试用例、代码覆盖率、执行路径等等,你可能和我一样一头雾水,这次我们就来看个明白 0x01 模糊测试首先,模糊测试(Fuzzing)是一种测试手段,它把系统看成一个摸不清内部结构的黑盒,只是向其输入接口随机地发送合法测试用例,这些用例并不是开发者所预期的输入">
|
||||
<meta property="og:description" content="接触这个词语已经有一年了,但还没有学习过更没有上手实践过,正好趁这个机会好好弄弄AFL。提起模糊测试,我们总会联想起这样或那样的专业术语——测试用例、代码覆盖率、执行路径等等,你可能和我一样一头雾水,这次我们就来看个明白">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://image.3001.net/images/20181207/1544168163_5c0a22e3eedce.jpg">
|
||||
<meta property="og:image" content="http://lcamtuf.coredump.cx/afl/afl_gzip.png">
|
||||
<meta property="og:updated_time" content="2019-07-09T09:27:22.887Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:35:23.942Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="模糊测试与AFL">
|
||||
<meta name="twitter:description" content="接触这个词语已经有一年了,但还没有学习过更没有上手实践过,正好趁这个机会好好弄弄AFL。提起模糊测试,我们总会联想起这样或那样的专业术语——测试用例、代码覆盖率、执行路径等等,你可能和我一样一头雾水,这次我们就来看个明白 0x01 模糊测试首先,模糊测试(Fuzzing)是一种测试手段,它把系统看成一个摸不清内部结构的黑盒,只是向其输入接口随机地发送合法测试用例,这些用例并不是开发者所预期的输入">
|
||||
<meta name="twitter:description" content="接触这个词语已经有一年了,但还没有学习过更没有上手实践过,正好趁这个机会好好弄弄AFL。提起模糊测试,我们总会联想起这样或那样的专业术语——测试用例、代码覆盖率、执行路径等等,你可能和我一样一头雾水,这次我们就来看个明白">
|
||||
<meta name="twitter:image" content="https://image.3001.net/images/20181207/1544168163_5c0a22e3eedce.jpg">
|
||||
|
||||
|
||||
@ -378,7 +378,7 @@
|
||||
</span>
|
||||
|
||||
<span title="字数统计">
|
||||
11.4k 字
|
||||
11.3k 字
|
||||
</span>
|
||||
|
||||
|
||||
@ -399,6 +399,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
接触这个词语已经有一年了,但还没有学习过更没有上手实践过,正好趁这个机会好好弄弄AFL。提起模糊测试,我们总会联想起这样或那样的专业术语——测试用例、代码覆盖率、执行路径等等,你可能和我一样一头雾水,这次我们就来看个明白
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -413,9 +417,7 @@
|
||||
|
||||
|
||||
|
||||
<p>接触这个词语已经有一年了,但还没有学习过更没有上手实践过,正好趁这个机会好好弄弄AFL。提起模糊测试,我们总会联想起这样或那样的专业术语——测试用例、代码覆盖率、执行路径等等,你可能和我一样一头雾水,这次我们就来看个明白</p>
|
||||
<hr>
|
||||
<h1 id="0x01-模糊测试"><a href="#0x01-模糊测试" class="headerlink" title="0x01 模糊测试"></a>0x01 模糊测试</h1><p>首先,模糊测试(Fuzzing)是一种测试手段,它把系统看成一个摸不清内部结构的黑盒,只是向其输入接口随机地发送合法测试用例,这些用例并不是开发者所预期的输入,所以极有可能会造成系统的崩溃,通过分析崩溃信息,测试人员(黑客)就可以评估系统是否存在可利用的漏洞。<br>模糊测试的过程,就好像是一个不断探测系统可以承受的输入极限的过程,让我想起学电子的时候对一个滤波器进行带宽的评估,如果我们知道内部电路原理,那么这个器件对于我们就是白盒了,可以直接通过公式计算理论带宽,现在系统对于我们而言是一个黑盒,我们通过在足够大频率范围内对其不断输入信号,就能测试出其实际带宽。</p>
|
||||
<h1 id="0x01-模糊测试"><a href="#0x01-模糊测试" class="headerlink" title="0x01 模糊测试"></a>0x01 模糊测试</h1><p>首先,模糊测试(Fuzzing)是一种测试手段,它把系统看成一个摸不清内部结构的黑盒,只是向其输入接口随机地发送合法测试用例,这些用例并不是开发者所预期的输入,所以极有可能会造成系统的崩溃,通过分析崩溃信息,测试人员(黑客)就可以评估系统是否存在可利用的漏洞。<br>模糊测试的过程,就好像是一个不断探测系统可以承受的输入极限的过程,让我想起学电子的时候对一个滤波器进行带宽的评估,如果我们知道内部电路原理,那么这个器件对于我们就是白盒了,可以直接通过公式计算理论带宽,现在系统对于我们而言是一个黑盒,我们通过在足够大频率范围内对其不断输入信号,就能测试出其实际带宽。</p>
|
||||
<p><strong>模糊测试方法一览</strong></p>
|
||||
|
||||
<table>
|
||||
@ -447,7 +449,7 @@
|
||||
|
||||
<hr>
|
||||
<h1 id="0x02-AFL快速入门"><a href="#0x02-AFL快速入门" class="headerlink" title="0x02 AFL快速入门"></a>0x02 <a href="http://lcamtuf.coredump.cx/afl/QuickStartGuide.txt" target="_blank" rel="noopener">AFL快速入门</a></h1><p>1)用<code>make</code>编译AFL。如果构建失败,请参阅docs / INSTALL以获取提示。<br>2)查找或编写一个相当快速和简单的程序,该程序从<strong><em>文件或标准输入</em></strong>中获取数据,以一种有价值的方式处理它,然后干净地退出。如果测试网络服务,请将其修改为在前台运行并从stdin读取。在对使用校验和的格式进行模糊测试时,也要注释掉校验和验证码。<br>遇到故障时,程序必须正常崩溃。注意自定义SIGSEGV或SIGABRT处理程序和后台进程。有关检测非崩溃缺陷的提示,请参阅<code>docs/README</code>中的第11节。<br>3)使用afl-gcc编译要模糊的程序/库。一种常见的方法是:<br><figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br></pre></td><td class="code"><pre><span class="line">$ CC = /path/to/afl-gcc CXX =/path/to/afl-g++ ./configure --disable-shared</span><br><span class="line">$ make clean all</span><br></pre></td></tr></table></figure></p>
|
||||
<p>如果程序构建失败,请联系 <a href="mailto:afl-users@googlegroups.com" target="_blank" rel="noopener">afl-users@googlegroups.com</a>。<br>4)获取一个对程序有意义的小而有效的输入文件。在模糊详细语法(SQL,HTTP等)时,也要创建字典,如<code>dictionaries/README.dictionaries</code>中所述。<br>5)如果程序从stdin读取,则运行<code>afl-fuzz</code>,如下所示:<br><code>./afl-fuzz -i testcase_dir -o findings_dir -- /path/to/tested/program [... program's cmdline ...]</code><br> 如果程序从文件中获取输入,则可以在程序的命令行中输入@@; AFL会为您放置一个自动生成的文件名。</p>
|
||||
<p>如果程序构建失败,请联系 <a href="mailto:afl-users@googlegroups.com" target="_blank" rel="noopener">afl-users@googlegroups.com</a>。<br>4)获取一个对程序有意义的小而有效的输入文件。在模糊详细语法(SQL,HTTP等)时,也要创建字典,如<code>dictionaries/README.dictionaries</code>中所述。<br>5)如果程序从stdin读取,则运行<code>afl-fuzz</code>,如下所示:<br><code>./afl-fuzz -i testcase_dir -o findings_dir -- /path/to/tested/program [... program's cmdline ...]</code><br> 如果程序从文件中获取输入,则可以在程序的命令行中输入@@; AFL会为您放置一个自动生成的文件名。</p>
|
||||
<p><strong>一些参考文档</strong></p>
|
||||
<blockquote>
|
||||
<p><a href="http://lcamtuf.coredump.cx/afl/README.txt" target="_blank" rel="noopener">docs/README</a> - AFL的一般介绍,<br><a href="https://github.com/mirrorer/afl/blob/master/docs/perf_tips.txt" target="_blank" rel="noopener">docs/perf_tips.txt</a> - 关于如何快速模糊的简单提示,<br><a href="http://lcamtuf.coredump.cx/afl/status_screen.txt" target="_blank" rel="noopener">docs/status_screen.txt</a> - UI中显示的花絮的解释,<br><a href="https://github.com/mirrorer/afl/blob/master/docs/parallel_fuzzing.txt" target="_blank" rel="noopener">docs/parallel_fuzzing.txt</a> - 关于在多个核上运行AFL的建议<br><a href="http://lcamtuf.coredump.cx/afl/demo/" target="_blank" rel="noopener">Generated test cases for common image formats</a> - 生成图像文件测试用例的demo<br><a href="http://lcamtuf.coredump.cx/afl/technical_details.txt" target="_blank" rel="noopener">Technical “whitepaper” for afl-fuzz</a> - 技术白皮书</p>
|
||||
@ -464,10 +466,10 @@
|
||||
</ol>
|
||||
<hr>
|
||||
<h1 id="0x04-AFL-README"><a href="#0x04-AFL-README" class="headerlink" title="0x04 AFL README"></a>0x04 <a href="http://lcamtuf.coredump.cx/afl/README.txt" target="_blank" rel="noopener">AFL README</a></h1><blockquote>
|
||||
<p>Written and maintained by Michal Zalewski <a href="mailto:lcamtuf@google.com" target="_blank" rel="noopener">lcamtuf@google.com</a></p>
|
||||
<p>Written and maintained by Michal Zalewski <a href="mailto:lcamtuf@google.com" target="_blank" rel="noopener">lcamtuf@google.com</a></p>
|
||||
<p> Copyright 2013, 2014, 2015, 2016 Google Inc. All rights reserved.<br> Released under terms and conditions of Apache License, Version 2.0.</p>
|
||||
<p> For new versions and additional information, check out:<br> <a href="http://lcamtuf.coredump.cx/afl/" target="_blank" rel="noopener">http://lcamtuf.coredump.cx/afl/</a></p>
|
||||
<p> To compare notes with other users or get notified about major new features,<br> send a mail to <a href="mailto:afl-users+subscribe@googlegroups.com" target="_blank" rel="noopener">afl-users+subscribe@googlegroups.com</a>.</p>
|
||||
<p> To compare notes with other users or get notified about major new features,<br> send a mail to <a href="mailto:afl-users+subscribe@googlegroups.com" target="_blank" rel="noopener">afl-users+subscribe@googlegroups.com</a>.</p>
|
||||
<p> <strong>See QuickStartGuide.txt if you don’t have time to read this file.</strong></p>
|
||||
</blockquote>
|
||||
<h2 id="1)具有导向性的模糊测试的挑战"><a href="#1)具有导向性的模糊测试的挑战" class="headerlink" title="1)具有导向性的模糊测试的挑战"></a>1)具有导向性的模糊测试的挑战</h2><p>Fuzzing是用于识别真实软件中的安全问题的最强大且经过验证的策略之一;它负责安全关键软件中迄今为止发现的绝大多数远程代码执行和权限提升漏洞。<br>不幸的是,模糊测试也不够有力。盲目的、随机的变异使得它不太可能在测试代码中达到某些代码路径,从而使一些漏洞超出了这种技术的范围。<br>已经有许多尝试来解决这个问题。早期方法之一 - 由Tavis Ormandy开创 - 是一种 <strong>语义库蒸馏(corpus distillation)</strong> 。网上找到的一些大型语料库中往往包含大量的文件,这时就需要对其精简,该方法依赖于覆盖信号从大量高质量的候选文件语料库中选择有趣种子的子集,然后通过传统方式对其进行模糊处理。该方法非常有效,但需要这样的语料库随时可用。正因为如此,<strong>代码覆盖率</strong> 也只是衡量程序执行状态的一个简单化的度量,这种方式并不适合后续引导fuzzing测试的。<br>其他更复杂的研究集中在诸如 <strong>程序流分析(“concoic execution”),符号执行或静态分析</strong> 等技术上。所有这些方法在实验环境中都非常有前景,但在实际应用中往往会遇到可靠性和性能问题 - 部分高价值的程序都有非常复杂的内部状态和执行路径,在这一方面符号执行和concolic技术往往会显得不够健壮(如路径爆炸问题),所以仍然稍逊于传统的fuzzing技术。</p>
|
||||
@ -1011,7 +1013,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,19 +79,19 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。参考:https://paper.seebug.org/841/#_1 部署afl 123456&gt; wget http://lcamtuf.coredump.cx/afl/releases/">
|
||||
<meta name="description" content="这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。">
|
||||
<meta name="keywords" content="AFL,模糊测试">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="AFL-爱之初体验">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/07/09/afl-first-try/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。参考:https://paper.seebug.org/841/#_1 部署afl 123456&gt; wget http://lcamtuf.coredump.cx/afl/releases/">
|
||||
<meta property="og:description" content="这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1562570048/afl/1.png">
|
||||
<meta property="og:updated_time" content="2019-07-09T09:03:52.647Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:35:35.911Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="AFL-爱之初体验">
|
||||
<meta name="twitter:description" content="这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。参考:https://paper.seebug.org/841/#_1 部署afl 123456&gt; wget http://lcamtuf.coredump.cx/afl/releases/">
|
||||
<meta name="twitter:description" content="这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1562570048/afl/1.png">
|
||||
|
||||
|
||||
@ -391,13 +391,17 @@
|
||||
</span>
|
||||
|
||||
<span title="阅读时长">
|
||||
15 分钟
|
||||
14 分钟
|
||||
</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -412,7 +416,7 @@
|
||||
|
||||
|
||||
|
||||
<p>这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。<br>参考:<a href="https://paper.seebug.org/841/#_1" target="_blank" rel="noopener">https://paper.seebug.org/841/#_1</a></p>
|
||||
<p>参考:<a href="https://paper.seebug.org/841/#_1" target="_blank" rel="noopener">https://paper.seebug.org/841/#_1</a></p>
|
||||
<p><strong>部署afl</strong></p>
|
||||
<blockquote>
|
||||
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br></pre></td><td class="code"><pre><span class="line">> wget http://lcamtuf.coredump.cx/afl/releases/afl-latest.tgz</span><br><span class="line">> tar -zxvf afl-latest.tgz</span><br><span class="line">> cd afl-2.52b/</span><br><span class="line">> make</span><br><span class="line">> sudo make install</span><br><span class="line">></span><br></pre></td></tr></table></figure>
|
||||
@ -801,7 +805,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,13 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="这部分是对Window x86平台下的几个典型漏洞利用方式的介绍,从最基础的、没有开启任何保护的漏洞程序入手,然后开启GS,最后通过rop绕过DEP。 0x00 漏洞利用开发简介(1)需要什么 Immunity Debugger -Download Mona.py -Download Metasploit框架-下载 靶机–Windows XP sp3 函数调用与栈:调用、返回 寄存器与函">
|
||||
<meta name="description" content="这部分是对Window x86平台下的几个典型漏洞利用方式的介绍,从最基础的、没有开启任何保护的漏洞程序入手,然后开启GS,最后通过rop绕过DEP。">
|
||||
<meta name="keywords" content="二进制,Windows,漏洞">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="x86-basic 漏洞利用">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/07/10/x86basic/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="这部分是对Window x86平台下的几个典型漏洞利用方式的介绍,从最基础的、没有开启任何保护的漏洞程序入手,然后开启GS,最后通过rop绕过DEP。 0x00 漏洞利用开发简介(1)需要什么 Immunity Debugger -Download Mona.py -Download Metasploit框架-下载 靶机–Windows XP sp3 函数调用与栈:调用、返回 寄存器与函">
|
||||
<meta property="og:description" content="这部分是对Window x86平台下的几个典型漏洞利用方式的介绍,从最基础的、没有开启任何保护的漏洞程序入手,然后开启GS,最后通过rop绕过DEP。">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1562741903/pwn/%E6%8D%95%E8%8E%B7.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1562742079/pwn/%E6%8D%95%E8%8E%B71.png">
|
||||
@ -104,10 +104,10 @@
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1562744240/pwn/231.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1562744461/%E5%9B%BE%E7%89%8712.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1562744518/pwn/%E6%8D%9511%E8%8E%B7.png">
|
||||
<meta property="og:updated_time" content="2019-10-25T13:07:23.257Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:51:32.349Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="x86-basic 漏洞利用">
|
||||
<meta name="twitter:description" content="这部分是对Window x86平台下的几个典型漏洞利用方式的介绍,从最基础的、没有开启任何保护的漏洞程序入手,然后开启GS,最后通过rop绕过DEP。 0x00 漏洞利用开发简介(1)需要什么 Immunity Debugger -Download Mona.py -Download Metasploit框架-下载 靶机–Windows XP sp3 函数调用与栈:调用、返回 寄存器与函">
|
||||
<meta name="twitter:description" content="这部分是对Window x86平台下的几个典型漏洞利用方式的介绍,从最基础的、没有开启任何保护的漏洞程序入手,然后开启GS,最后通过rop绕过DEP。">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1562741903/pwn/%E6%8D%95%E8%8E%B7.png">
|
||||
|
||||
|
||||
@ -407,13 +407,17 @@
|
||||
</span>
|
||||
|
||||
<span title="阅读时长">
|
||||
12 分钟
|
||||
11 分钟
|
||||
</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
这部分是对Window x86平台下的几个典型漏洞利用方式的介绍,从最基础的、没有开启任何保护的漏洞程序入手,然后开启GS,最后通过rop绕过DEP。
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -428,9 +432,7 @@
|
||||
|
||||
|
||||
|
||||
<p>这部分是对Window x86平台下的几个典型漏洞利用方式的介绍,从最基础的、没有开启任何保护的漏洞程序入手,然后开启GS,最后通过rop绕过DEP。</p>
|
||||
<hr>
|
||||
<h1 id="0x00-漏洞利用开发简介"><a href="#0x00-漏洞利用开发简介" class="headerlink" title="0x00 漏洞利用开发简介"></a>0x00 漏洞利用开发简介</h1><p>(1)需要什么</p>
|
||||
<h1 id="0x00-漏洞利用开发简介"><a href="#0x00-漏洞利用开发简介" class="headerlink" title="0x00 漏洞利用开发简介"></a>0x00 漏洞利用开发简介</h1><p>(1)需要什么</p>
|
||||
<ul>
|
||||
<li>Immunity Debugger -<a href="http://debugger.immunityinc.com/ID_register.py" target="_blank" rel="noopener">Download</a></li>
|
||||
<li>Mona.py -<a href="https://github.com/corelan/mona" target="_blank" rel="noopener">Download</a></li>
|
||||
@ -833,7 +835,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,19 +79,19 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="之前介绍了Windows x86平台下栈溢出漏洞的开放与利用,鉴于CTF基本都是Linux,还有实际开发环境,很多智能设备的系统都是基于Linux,所以从很现实的需求出发,一定要学习学习Linux下漏洞的分析。 ref: CTF-WIKI:https://ctf-wiki.github.io/ctf-wiki/pwn/readme-zh/蒸米大佬的一步一步学rop http://www.anqu">
|
||||
<meta name="description" content="之前介绍了Windows x86平台下栈溢出漏洞的开放与利用,鉴于CTF基本都是Linux,还有实际开发环境,很多智能设备的系统都是基于Linux,所以从很现实的需求出发,一定要学习学习Linux下漏洞的分析。">
|
||||
<meta name="keywords" content="linux,pwn,栈溢出">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="Linux Pwn-缓冲区溢出利用">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/07/16/linux-pwn-32/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="之前介绍了Windows x86平台下栈溢出漏洞的开放与利用,鉴于CTF基本都是Linux,还有实际开发环境,很多智能设备的系统都是基于Linux,所以从很现实的需求出发,一定要学习学习Linux下漏洞的分析。 ref: CTF-WIKI:https://ctf-wiki.github.io/ctf-wiki/pwn/readme-zh/蒸米大佬的一步一步学rop http://www.anqu">
|
||||
<meta property="og:description" content="之前介绍了Windows x86平台下栈溢出漏洞的开放与利用,鉴于CTF基本都是Linux,还有实际开发环境,很多智能设备的系统都是基于Linux,所以从很现实的需求出发,一定要学习学习Linux下漏洞的分析。">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1563267241/pwn/4a7227aa9f00bd2fd45d363da4cf25c6fd425638.jpg">
|
||||
<meta property="og:updated_time" content="2019-10-25T13:06:26.899Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:43:18.149Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="Linux Pwn-缓冲区溢出利用">
|
||||
<meta name="twitter:description" content="之前介绍了Windows x86平台下栈溢出漏洞的开放与利用,鉴于CTF基本都是Linux,还有实际开发环境,很多智能设备的系统都是基于Linux,所以从很现实的需求出发,一定要学习学习Linux下漏洞的分析。 ref: CTF-WIKI:https://ctf-wiki.github.io/ctf-wiki/pwn/readme-zh/蒸米大佬的一步一步学rop http://www.anqu">
|
||||
<meta name="twitter:description" content="之前介绍了Windows x86平台下栈溢出漏洞的开放与利用,鉴于CTF基本都是Linux,还有实际开发环境,很多智能设备的系统都是基于Linux,所以从很现实的需求出发,一定要学习学习Linux下漏洞的分析。">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1563267241/pwn/4a7227aa9f00bd2fd45d363da4cf25c6fd425638.jpg">
|
||||
|
||||
|
||||
@ -398,6 +398,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
之前介绍了Windows x86平台下栈溢出漏洞的开放与利用,鉴于CTF基本都是Linux,还有实际开发环境,很多智能设备的系统都是基于Linux,所以从很现实的需求出发,一定要学习学习Linux下漏洞的分析。
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -412,8 +416,7 @@
|
||||
|
||||
|
||||
|
||||
<p>之前介绍了Windows x86平台下栈溢出漏洞的开放与利用,鉴于CTF基本都是Linux,还有实际开发环境,很多智能设备的系统都是基于Linux,所以从很现实的需求出发,一定要学习学习Linux下漏洞的分析。</p>
|
||||
<p><strong>ref:</strong></p>
|
||||
<p><strong>ref:</strong></p>
|
||||
<blockquote>
|
||||
<p>CTF-WIKI:<a href="https://ctf-wiki.github.io/ctf-wiki/pwn/readme-zh/" target="_blank" rel="noopener">https://ctf-wiki.github.io/ctf-wiki/pwn/readme-zh/</a><br>蒸米大佬的一步一步学rop <a href="http://www.anquan.us/static/drops/tips-6597.html" target="_blank" rel="noopener">http://www.anquan.us/static/drops/tips-6597.html</a><br><a href="https://bbs.pediy.com/thread-221734.htm" target="_blank" rel="noopener">https://bbs.pediy.com/thread-221734.htm</a></p>
|
||||
</blockquote>
|
||||
@ -816,7 +819,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,18 +79,18 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="搭建环境最好使用docker来搭建,方便迁移 https://hub.docker.com/r/vulnerables/web-dvwa/ 暴力破解easy模式 密码破解是从存储在计算机系统中或由计算机系统传输的数据中恢复密码的过程。一种常见的方法是反复尝试密码的猜测。用户经常选择弱密码。不安全选择的例子包括在词典中找到的单个单词,姓氏,任何太短的密码(通常被认为少于6或7个字符),或可预测的模式">
|
||||
<meta name="description" content="WEB安全的START">
|
||||
<meta name="keywords" content="web,ctf">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="DVWA黑客攻防平台">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/07/24/web-dvwa/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="搭建环境最好使用docker来搭建,方便迁移 https://hub.docker.com/r/vulnerables/web-dvwa/ 暴力破解easy模式 密码破解是从存储在计算机系统中或由计算机系统传输的数据中恢复密码的过程。一种常见的方法是反复尝试密码的猜测。用户经常选择弱密码。不安全选择的例子包括在词典中找到的单个单词,姓氏,任何太短的密码(通常被认为少于6或7个字符),或可预测的模式">
|
||||
<meta property="og:description" content="WEB安全的START">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:updated_time" content="2019-07-24T06:00:56.862Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:48:51.989Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="DVWA黑客攻防平台">
|
||||
<meta name="twitter:description" content="搭建环境最好使用docker来搭建,方便迁移 https://hub.docker.com/r/vulnerables/web-dvwa/ 暴力破解easy模式 密码破解是从存储在计算机系统中或由计算机系统传输的数据中恢复密码的过程。一种常见的方法是反复尝试密码的猜测。用户经常选择弱密码。不安全选择的例子包括在词典中找到的单个单词,姓氏,任何太短的密码(通常被认为少于6或7个字符),或可预测的模式">
|
||||
<meta name="twitter:description" content="WEB安全的START">
|
||||
|
||||
|
||||
|
||||
@ -396,6 +396,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
WEB安全的START
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -829,7 +833,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,19 +79,19 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="通过分析物联网设备遭受攻击的链条可以发现,黑客获取固件,把固件逆向成汇编或C程序语言后,能分析出设备的运行流程和网络行为,还能找到安全加密相关的密钥相关的信息。如果这些“有心人”没能获取到固件信息,他们也很难发现这些漏洞。从这一点看,物联网设备的安全性,在很大程度上决定于其固件的安全性。 http://blog.nsfocus.net/security-analysis-of-the-firmwa">
|
||||
<meta name="description" content="固件有几种获取方法?">
|
||||
<meta name="keywords" content="IoT,硬件层">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="获取固件的几种方法">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/07/24/获取固件/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="通过分析物联网设备遭受攻击的链条可以发现,黑客获取固件,把固件逆向成汇编或C程序语言后,能分析出设备的运行流程和网络行为,还能找到安全加密相关的密钥相关的信息。如果这些“有心人”没能获取到固件信息,他们也很难发现这些漏洞。从这一点看,物联网设备的安全性,在很大程度上决定于其固件的安全性。 http://blog.nsfocus.net/security-analysis-of-the-firmwa">
|
||||
<meta property="og:description" content="固件有几种获取方法?">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1563606353/samples/1.png">
|
||||
<meta property="og:updated_time" content="2019-07-24T06:01:00.825Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:33:17.285Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="获取固件的几种方法">
|
||||
<meta name="twitter:description" content="通过分析物联网设备遭受攻击的链条可以发现,黑客获取固件,把固件逆向成汇编或C程序语言后,能分析出设备的运行流程和网络行为,还能找到安全加密相关的密钥相关的信息。如果这些“有心人”没能获取到固件信息,他们也很难发现这些漏洞。从这一点看,物联网设备的安全性,在很大程度上决定于其固件的安全性。 http://blog.nsfocus.net/security-analysis-of-the-firmwa">
|
||||
<meta name="twitter:description" content="固件有几种获取方法?">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1563606353/samples/1.png">
|
||||
|
||||
|
||||
@ -398,6 +398,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
固件有几种获取方法?
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -712,7 +716,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,18 +79,18 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="0x00 背景与简介在分析嵌入式设备的固件时,只采用静态分析方式通常是不够的,你需要实际执行你的分析目标来观察它的行为。在嵌入式Linux设备的世界里,很容易把一个调试器放在目标硬件上进行调试。如果你能在自己的系统上运行二进制文件,而不是拖着硬件做分析, 将会方便很多,这就需要用QEMU进行仿真。虽然QEMU在模拟核心芯片组包括CPU上都做的很不错,但是QEMU往往不能提供你想运行的二进制程序需要">
|
||||
<meta name="description" content="如果能够调试一个IoT设备,那挖漏洞将会简单很多">
|
||||
<meta name="keywords" content="小米,路由器,调试">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="远程调试小米路由器固件">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/07/25/Debug-a-router-firmware/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="0x00 背景与简介在分析嵌入式设备的固件时,只采用静态分析方式通常是不够的,你需要实际执行你的分析目标来观察它的行为。在嵌入式Linux设备的世界里,很容易把一个调试器放在目标硬件上进行调试。如果你能在自己的系统上运行二进制文件,而不是拖着硬件做分析, 将会方便很多,这就需要用QEMU进行仿真。虽然QEMU在模拟核心芯片组包括CPU上都做的很不错,但是QEMU往往不能提供你想运行的二进制程序需要">
|
||||
<meta property="og:description" content="如果能够调试一个IoT设备,那挖漏洞将会简单很多">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:updated_time" content="2019-07-25T14:36:28.915Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:39:05.082Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="远程调试小米路由器固件">
|
||||
<meta name="twitter:description" content="0x00 背景与简介在分析嵌入式设备的固件时,只采用静态分析方式通常是不够的,你需要实际执行你的分析目标来观察它的行为。在嵌入式Linux设备的世界里,很容易把一个调试器放在目标硬件上进行调试。如果你能在自己的系统上运行二进制文件,而不是拖着硬件做分析, 将会方便很多,这就需要用QEMU进行仿真。虽然QEMU在模拟核心芯片组包括CPU上都做的很不错,但是QEMU往往不能提供你想运行的二进制程序需要">
|
||||
<meta name="twitter:description" content="如果能够调试一个IoT设备,那挖漏洞将会简单很多">
|
||||
|
||||
|
||||
|
||||
@ -396,6 +396,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
如果能够调试一个IoT设备,那挖漏洞将会简单很多
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -760,7 +764,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,18 +79,18 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="Pwnable.tw start程序链接:https://pwnable.tw/static/chall/start 0x01 检查保护情况不得不说,checksec这个工作看似简单,用用现成工具就行,但这决定了我们之后漏洞利用的方式,是否栈代码执行,还是ROP。最好多用几个工具进行检查,兼听则明。比如这个程序用peda检查就开启了NX,但实际上并没有。所以理想的话,把shellcode布置到栈上">
|
||||
<meta name="description" content="我怎么还在start??">
|
||||
<meta name="keywords" content="二进制,Linux,CTF">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="【Pwnable.tw】start">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/10/25/PWNtw-start/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="Pwnable.tw start程序链接:https://pwnable.tw/static/chall/start 0x01 检查保护情况不得不说,checksec这个工作看似简单,用用现成工具就行,但这决定了我们之后漏洞利用的方式,是否栈代码执行,还是ROP。最好多用几个工具进行检查,兼听则明。比如这个程序用peda检查就开启了NX,但实际上并没有。所以理想的话,把shellcode布置到栈上">
|
||||
<meta property="og:description" content="我怎么还在start??">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:updated_time" content="2019-10-26T02:44:23.409Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:46:47.397Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="【Pwnable.tw】start">
|
||||
<meta name="twitter:description" content="Pwnable.tw start程序链接:https://pwnable.tw/static/chall/start 0x01 检查保护情况不得不说,checksec这个工作看似简单,用用现成工具就行,但这决定了我们之后漏洞利用的方式,是否栈代码执行,还是ROP。最好多用几个工具进行检查,兼听则明。比如这个程序用peda检查就开启了NX,但实际上并没有。所以理想的话,把shellcode布置到栈上">
|
||||
<meta name="twitter:description" content="我怎么还在start??">
|
||||
|
||||
|
||||
|
||||
@ -396,6 +396,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
我怎么还在start??
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -837,7 +841,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,19 +79,19 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="信息收集+常规owasp top 10+逻辑漏洞https://www.freebuf.com/sectool/94777.html 测试范围:.i.mi.com .cloud.mi.com 0x01 信息收集https://wh0ale.github.io/2019/02/22/SRC%E4%B9%8B%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86/http">
|
||||
<meta name="description" content="信息收集+常规owasp top 10+逻辑漏洞">
|
||||
<meta name="keywords" content="web,ctf">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="【web】信息收集">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2019/11/12/web-information-collect/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="信息收集+常规owasp top 10+逻辑漏洞https://www.freebuf.com/sectool/94777.html 测试范围:.i.mi.com .cloud.mi.com 0x01 信息收集https://wh0ale.github.io/2019/02/22/SRC%E4%B9%8B%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86/http">
|
||||
<meta property="og:description" content="信息收集+常规owasp top 10+逻辑漏洞">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://image.3001.net/images/20150202/14228625211610.jpg">
|
||||
<meta property="og:updated_time" content="2019-11-12T13:05:50.020Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:49:16.555Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="【web】信息收集">
|
||||
<meta name="twitter:description" content="信息收集+常规owasp top 10+逻辑漏洞https://www.freebuf.com/sectool/94777.html 测试范围:.i.mi.com .cloud.mi.com 0x01 信息收集https://wh0ale.github.io/2019/02/22/SRC%E4%B9%8B%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86/http">
|
||||
<meta name="twitter:description" content="信息收集+常规owasp top 10+逻辑漏洞">
|
||||
<meta name="twitter:image" content="https://image.3001.net/images/20150202/14228625211610.jpg">
|
||||
|
||||
|
||||
@ -398,6 +398,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
信息收集+常规owasp top 10+逻辑漏洞
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -1098,7 +1102,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,18 +79,18 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。 赛题理解目标">
|
||||
<meta name="description" content="研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。">
|
||||
<meta name="keywords" content="钓鱼邮件,phishing email">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="DataCon Coremail邮件安全第三题 Writeup">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2020/10/16/coremail/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。 赛题理解目标">
|
||||
<meta property="og:description" content="研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:updated_time" content="2020-10-20T13:59:55.666Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:38:12.227Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="DataCon Coremail邮件安全第三题 Writeup">
|
||||
<meta name="twitter:description" content="研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。 赛题理解目标">
|
||||
<meta name="twitter:description" content="研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。">
|
||||
|
||||
|
||||
|
||||
@ -375,7 +375,7 @@
|
||||
</span>
|
||||
|
||||
<span title="字数统计">
|
||||
2.4k 字
|
||||
2.3k 字
|
||||
</span>
|
||||
|
||||
|
||||
@ -396,6 +396,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -410,8 +414,7 @@
|
||||
|
||||
|
||||
|
||||
<p>研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。<br>我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。</p>
|
||||
<h2 id="赛题理解"><a href="#赛题理解" class="headerlink" title="赛题理解"></a>赛题理解</h2><h3 id="目标"><a href="#目标" class="headerlink" title="目标"></a>目标</h3><blockquote>
|
||||
<h2 id="赛题理解"><a href="#赛题理解" class="headerlink" title="赛题理解"></a>赛题理解</h2><h3 id="目标"><a href="#目标" class="headerlink" title="目标"></a>目标</h3><blockquote>
|
||||
<p>在真实的企业网络环境中,一些攻击者总能想方设法绕过邮件检测引擎,使攻击邮件抵达员工的收件箱,最终达到窃取用户登录凭证等目的。与此同时,企业网络安全管理团队的精力十分有限,不可能实现对企业的全部邮件进行逐一审查。</p>
|
||||
</blockquote>
|
||||
<blockquote>
|
||||
@ -741,7 +744,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,13 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="海豚音攻击https://acmccs.github.io/papers/p103-zhangAemb.pdfhttps://github.com/USSLab/DolphinAttackhttps://zhuanlan.zhihu.com/p/29306026 Abstract诸如Siri或Google Now之类的语音识别(SR)系统已经成为一种越来越流行的人机交互方法,并将各种系统转变为语音">
|
||||
<meta name="description" content="算是进入安全领域以来第一篇看懂的论文QAQ">
|
||||
<meta name="keywords" content="硬件攻击,传感器,语音助手">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="Dolphin Attack 论文翻译">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2021/01/08/Dolphin-Attack/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="海豚音攻击https://acmccs.github.io/papers/p103-zhangAemb.pdfhttps://github.com/USSLab/DolphinAttackhttps://zhuanlan.zhihu.com/p/29306026 Abstract诸如Siri或Google Now之类的语音识别(SR)系统已经成为一种越来越流行的人机交互方法,并将各种系统转变为语音">
|
||||
<meta property="og:description" content="算是进入安全领域以来第一篇看懂的论文QAQ">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_23.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_24.png">
|
||||
@ -109,10 +109,10 @@
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_40.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_41.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_42.png">
|
||||
<meta property="og:updated_time" content="2021-01-08T04:50:09.488Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:42:46.870Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="Dolphin Attack 论文翻译">
|
||||
<meta name="twitter:description" content="海豚音攻击https://acmccs.github.io/papers/p103-zhangAemb.pdfhttps://github.com/USSLab/DolphinAttackhttps://zhuanlan.zhihu.com/p/29306026 Abstract诸如Siri或Google Now之类的语音识别(SR)系统已经成为一种越来越流行的人机交互方法,并将各种系统转变为语音">
|
||||
<meta name="twitter:description" content="算是进入安全领域以来第一篇看懂的论文QAQ">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_23.png">
|
||||
|
||||
|
||||
@ -346,6 +346,28 @@
|
||||
</span>
|
||||
|
||||
|
||||
<span class="post-category">
|
||||
|
||||
<span class="post-meta-divider">|</span>
|
||||
|
||||
<span class="post-meta-item-icon">
|
||||
<i class="fa fa-folder-o"></i>
|
||||
</span>
|
||||
|
||||
<span class="post-meta-item-text">分类于</span>
|
||||
|
||||
|
||||
<span itemprop="about" itemscope itemtype="http://schema.org/Thing">
|
||||
<a href="/categories/顶会论文/" itemprop="url" rel="index">
|
||||
<span itemprop="name">顶会论文</span>
|
||||
</a>
|
||||
</span>
|
||||
|
||||
|
||||
|
||||
|
||||
</span>
|
||||
|
||||
|
||||
|
||||
|
||||
@ -397,6 +419,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
算是进入安全领域以来第一篇看懂的论文QAQ
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -782,7 +808,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,13 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="固件模拟与UPnP栈溢出利用https://kb.netgear.com/000062158/Security-Advisory-for-Pre-Authentication-Command-Injection-on-R8300-PSV-2020-0211 https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r8300-upnpd-p">
|
||||
<meta name="description" content="复现一个漏洞">
|
||||
<meta name="keywords" content="UPnP,固件模拟,Netgear">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="Netgear_栈溢出漏洞_PSV-2020-0211">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2021/01/08/Netgear-psv-2020-0211/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="固件模拟与UPnP栈溢出利用https://kb.netgear.com/000062158/Security-Advisory-for-Pre-Authentication-Command-Injection-on-R8300-PSV-2020-0211 https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r8300-upnpd-p">
|
||||
<meta property="og:description" content="复现一个漏洞">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083781/netgear/1_3.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083836/netgear/image_28.png">
|
||||
@ -96,10 +96,10 @@
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083780/netgear/image_25.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083780/netgear/image_26.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083779/netgear/image_27.png">
|
||||
<meta property="og:updated_time" content="2021-01-08T05:45:50.553Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:44:13.142Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="Netgear_栈溢出漏洞_PSV-2020-0211">
|
||||
<meta name="twitter:description" content="固件模拟与UPnP栈溢出利用https://kb.netgear.com/000062158/Security-Advisory-for-Pre-Authentication-Command-Injection-on-R8300-PSV-2020-0211 https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r8300-upnpd-p">
|
||||
<meta name="twitter:description" content="复现一个漏洞">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083781/netgear/1_3.png">
|
||||
|
||||
|
||||
@ -406,6 +406,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
复现一个漏洞
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -931,7 +935,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,13 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="海豚音攻击-复现文章中提到两种方案,一是具有信号发生器的强大变送器,二是带有智能手机的便携式变送器;前一种方案成本过于高,本文不做分析,后一种方案的实现成本在我们可接收的范围。但原文中对后一方案的实现没有太多介绍,于是我通过邮件咨询了作者-闫琛博士,闫博士非常友好,我是在晚上十点发送的第一封邮件,差不多在十分钟内通过几封邮件的交流,解决了我的问题,很快确定了我的具体实现路径,非常感谢大佬! Q:">
|
||||
<meta name="description" content="眼前一亮的工作!海豚音攻击,试着复现看看(贫穷版)">
|
||||
<meta name="keywords" content="硬件攻击,传感器,语音助手">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="Dolphin Attack 论文复现">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2021/01/08/dolphin-attack-practice/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="海豚音攻击-复现文章中提到两种方案,一是具有信号发生器的强大变送器,二是带有智能手机的便携式变送器;前一种方案成本过于高,本文不做分析,后一种方案的实现成本在我们可接收的范围。但原文中对后一方案的实现没有太多介绍,于是我通过邮件咨询了作者-闫琛博士,闫博士非常友好,我是在晚上十点发送的第一封邮件,差不多在十分钟内通过几封邮件的交流,解决了我的问题,很快确定了我的具体实现路径,非常感谢大佬! Q:">
|
||||
<meta property="og:description" content="眼前一亮的工作!海豚音攻击,试着复现看看(贫穷版)">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082052/Dolphin%20Attack/08_YW7UW_PS_TOE_LZZY.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082052/Dolphin%20Attack/WGD_U453KYP3M3_2639_5I.png">
|
||||
@ -93,10 +93,10 @@
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082052/Dolphin%20Attack/OPSXK_21_7R24_I_NIWM0_8.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082051/Dolphin%20Attack/G8_K4_ZG__PE2CQ_5_UYY.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082508/Dolphin%20Attack/Snipaste_2021-01-08_13-06-55.png">
|
||||
<meta property="og:updated_time" content="2021-01-08T05:21:51.940Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:41:53.589Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="Dolphin Attack 论文复现">
|
||||
<meta name="twitter:description" content="海豚音攻击-复现文章中提到两种方案,一是具有信号发生器的强大变送器,二是带有智能手机的便携式变送器;前一种方案成本过于高,本文不做分析,后一种方案的实现成本在我们可接收的范围。但原文中对后一方案的实现没有太多介绍,于是我通过邮件咨询了作者-闫琛博士,闫博士非常友好,我是在晚上十点发送的第一封邮件,差不多在十分钟内通过几封邮件的交流,解决了我的问题,很快确定了我的具体实现路径,非常感谢大佬! Q:">
|
||||
<meta name="twitter:description" content="眼前一亮的工作!海豚音攻击,试着复现看看(贫穷版)">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082052/Dolphin%20Attack/08_YW7UW_PS_TOE_LZZY.png">
|
||||
|
||||
|
||||
@ -403,6 +403,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
眼前一亮的工作!海豚音攻击,试着复现看看(贫穷版)
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -726,7 +730,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,20 +79,20 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="ARMX作者说,nvram的内容必须从正在运行的设备中提取。一种方法是转储包含nvram数据的mtdblock, /proc/mtd可能有助于识别哪个mtdblock包含nvram。另一种方法是,如果您可以通过UART进行命令行访问(当然可以访问实际的硬件),某些固件会提供nvram命令,运行“ nvram show”也可以获取nvram内容。https://github.com/thereals">
|
||||
<meta name="description" content="还记得固件仿真吗?先试着快速解决nvram">
|
||||
<meta name="keywords" content="UPnP,固件模拟,Netgear,NVRAM">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="自动化获取nvram配置">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2021/01/08/nvram-config/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="ARMX作者说,nvram的内容必须从正在运行的设备中提取。一种方法是转储包含nvram数据的mtdblock, /proc/mtd可能有助于识别哪个mtdblock包含nvram。另一种方法是,如果您可以通过UART进行命令行访问(当然可以访问实际的硬件),某些固件会提供nvram命令,运行“ nvram show”也可以获取nvram内容。https://github.com/thereals">
|
||||
<meta property="og:description" content="还记得固件仿真吗?先试着快速解决nvram">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610094619/nvram/image_24.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610094620/nvram/image_23.png">
|
||||
<meta property="og:updated_time" content="2021-01-08T08:31:40.139Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:45:01.826Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="自动化获取nvram配置">
|
||||
<meta name="twitter:description" content="ARMX作者说,nvram的内容必须从正在运行的设备中提取。一种方法是转储包含nvram数据的mtdblock, /proc/mtd可能有助于识别哪个mtdblock包含nvram。另一种方法是,如果您可以通过UART进行命令行访问(当然可以访问实际的硬件),某些固件会提供nvram命令,运行“ nvram show”也可以获取nvram内容。https://github.com/thereals">
|
||||
<meta name="twitter:description" content="还记得固件仿真吗?先试着快速解决nvram">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610094619/nvram/image_24.png">
|
||||
|
||||
|
||||
@ -399,6 +399,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
还记得固件仿真吗?先试着快速解决nvram
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -735,7 +739,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,20 +79,20 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="D-LINK DIR-802 命令注入漏洞 by Cool 漏洞已提交厂商https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10206 漏洞类型CWE-78: Improper Neutralization of Special Elements used in an OS Command">
|
||||
<meta name="description" content="提交个漏洞">
|
||||
<meta name="keywords" content="D-LINK,UPnP,固件模拟">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="DIR-802 OS Command Injection">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-Injection/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="D-LINK DIR-802 命令注入漏洞 by Cool 漏洞已提交厂商https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10206 漏洞类型CWE-78: Improper Neutralization of Special Elements used in an OS Command">
|
||||
<meta property="og:description" content="提交个漏洞">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1614665628/cve/carbon.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1614665899/cve/carbon_1.png">
|
||||
<meta property="og:updated_time" content="2021-04-10T10:51:34.640Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:39:29.524Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="DIR-802 OS Command Injection">
|
||||
<meta name="twitter:description" content="D-LINK DIR-802 命令注入漏洞 by Cool 漏洞已提交厂商https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10206 漏洞类型CWE-78: Improper Neutralization of Special Elements used in an OS Command">
|
||||
<meta name="twitter:description" content="提交个漏洞">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1614665628/cve/carbon.png">
|
||||
|
||||
|
||||
@ -399,6 +399,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
提交个漏洞
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -715,7 +719,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,22 +79,22 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="QEMU虚拟机逃逸">
|
||||
<meta name="description" content="进入QEMU虚拟机逃逸的世界">
|
||||
<meta name="keywords" content="CVE,QEMU,信息泄露">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="VM escape-QEMU Case Study">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2021/04/10/vm-escape1/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="QEMU虚拟机逃逸">
|
||||
<meta property="og:description" content="进入QEMU虚拟机逃逸的世界">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1618050992/VMescape/image_29.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1618050992/VMescape/image_30.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1618050992/VMescape/image_31.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1618050992/VMescape/image_32.png">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:25:44.694Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:33:14.007Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="VM escape-QEMU Case Study">
|
||||
<meta name="twitter:description" content="QEMU虚拟机逃逸">
|
||||
<meta name="twitter:description" content="进入QEMU虚拟机逃逸的世界">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1618050992/VMescape/image_29.png">
|
||||
|
||||
|
||||
@ -402,7 +402,7 @@
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
QEMU虚拟机逃逸
|
||||
进入QEMU虚拟机逃逸的世界
|
||||
</div>
|
||||
|
||||
|
||||
@ -826,7 +826,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -443,7 +443,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -476,7 +476,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -476,7 +476,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -546,7 +546,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -546,7 +546,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -476,7 +476,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -476,7 +476,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -581,7 +581,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -511,7 +511,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -511,7 +511,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -686,7 +686,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -476,7 +476,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -476,7 +476,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -795,7 +795,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -760,7 +760,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -476,7 +476,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -476,7 +476,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -581,7 +581,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -476,7 +476,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -476,7 +476,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -651,7 +651,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -805,7 +805,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -795,7 +795,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -805,7 +805,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
150
baidusitemap.xml
150
baidusitemap.xml
@ -1,92 +1,92 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/04/10/vm-escape1/</loc>
|
||||
<loc>https://cool-y.github.io/2019/04/21/XIAOMI-UPnP/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/10/x86basic/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/01/16/wifi%E5%8D%8A%E5%8F%8C%E5%B7%A5%E4%BE%A7%E4%BF%A1%E9%81%93%E6%94%BB%E5%87%BB%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/11/12/web-information-collect/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/24/web-dvwa/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2018/12/25/TCPDUMP%E6%8B%92%E7%BB%9D%E6%9C%8D%E5%8A%A1%E6%94%BB%E5%87%BB%E6%BC%8F%E6%B4%9E/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/03/25/Samba-CVE/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/02/22/qq%E6%95%B0%E6%8D%AE%E5%BA%93%E7%9A%84%E5%8A%A0%E5%AF%86%E8%A7%A3%E5%AF%86/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/10/25/PWNtw-start/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/05/13/PE-file/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/05/14/pack-and-unpack/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/nvram-config/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/Netgear-psv-2020-0211/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2018/12/15/miio-control/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/16/linux-pwn-32/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/Dolphin-Attack/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/dolphin-attack-practice/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-Injection/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/nvram-config/</loc>
|
||||
<lastmod>2021-01-08</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/Netgear-psv-2020-0211/</loc>
|
||||
<lastmod>2021-01-08</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/dolphin-attack-practice/</loc>
|
||||
<lastmod>2021-01-08</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/Dolphin-Attack/</loc>
|
||||
<lastmod>2021-01-08</lastmod>
|
||||
<loc>https://cool-y.github.io/2019/07/25/Debug-a-router-firmware/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2020/10/16/coremail/</loc>
|
||||
<lastmod>2020-10-20</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/01/16/wifi%E5%8D%8A%E5%8F%8C%E5%B7%A5%E4%BE%A7%E4%BF%A1%E9%81%93%E6%94%BB%E5%87%BB%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0/</loc>
|
||||
<lastmod>2020-10-19</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/03/25/Samba-CVE/</loc>
|
||||
<lastmod>2020-10-19</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/05/13/PE-file/</loc>
|
||||
<lastmod>2020-10-19</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/11/12/web-information-collect/</loc>
|
||||
<lastmod>2019-11-12</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/10/25/PWNtw-start/</loc>
|
||||
<lastmod>2019-10-26</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/10/x86basic/</loc>
|
||||
<lastmod>2019-10-25</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/16/linux-pwn-32/</loc>
|
||||
<lastmod>2019-10-25</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/25/Debug-a-router-firmware/</loc>
|
||||
<lastmod>2019-07-25</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/03/16/%E5%B0%8F%E7%B1%B3%E5%9B%BA%E4%BB%B6%E5%B7%A5%E5%85%B7mkxqimage/</loc>
|
||||
<lastmod>2019-07-24</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/24/%E8%8E%B7%E5%8F%96%E5%9B%BA%E4%BB%B6/</loc>
|
||||
<lastmod>2019-07-24</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/24/web-dvwa/</loc>
|
||||
<lastmod>2019-07-24</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/04/21/XIAOMI-UPnP/</loc>
|
||||
<lastmod>2019-07-11</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/01/AFL-first-learn/</loc>
|
||||
<lastmod>2019-07-09</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/09/afl-first-try/</loc>
|
||||
<lastmod>2019-07-09</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/05/14/pack-and-unpack/</loc>
|
||||
<lastmod>2019-07-01</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2018/12/25/TCPDUMP%E6%8B%92%E7%BB%9D%E6%9C%8D%E5%8A%A1%E6%94%BB%E5%87%BB%E6%BC%8F%E6%B4%9E/</loc>
|
||||
<lastmod>2019-07-01</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/03/28/%E9%80%86%E5%90%91%E5%B7%A5%E7%A8%8B%E5%AE%9E%E9%AA%8C/</loc>
|
||||
<lastmod>2019-05-07</lastmod>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/04/15/Caving-db-storage/</loc>
|
||||
<lastmod>2019-04-15</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2018/12/23/%E5%9F%BA%E4%BA%8E%E8%A7%84%E5%88%99%E5%BC%95%E6%93%8E%E5%8F%91%E7%8E%B0IOT%E8%AE%BE%E5%A4%87/</loc>
|
||||
<lastmod>2019-04-15</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2018/12/15/miio-control/</loc>
|
||||
<lastmod>2019-04-15</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/02/22/qq%E6%95%B0%E6%8D%AE%E5%BA%93%E7%9A%84%E5%8A%A0%E5%AF%86%E8%A7%A3%E5%AF%86/</loc>
|
||||
<lastmod>2019-04-15</lastmod>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/03/23/auto-send-WX/</loc>
|
||||
<lastmod>2019-04-15</lastmod>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/09/afl-first-try/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/01/AFL-first-learn/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/03/16/%E5%B0%8F%E7%B1%B3%E5%9B%BA%E4%BB%B6%E5%B7%A5%E5%85%B7mkxqimage/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/03/28/%E9%80%86%E5%90%91%E5%B7%A5%E7%A8%8B%E5%AE%9E%E9%AA%8C/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2018/12/23/%E5%9F%BA%E4%BA%8E%E8%A7%84%E5%88%99%E5%BC%95%E6%93%8E%E5%8F%91%E7%8E%B0IOT%E8%AE%BE%E5%A4%87/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2019/07/24/%E8%8E%B7%E5%8F%96%E5%9B%BA%E4%BB%B6/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2021/04/10/vm-escape1/</loc>
|
||||
<lastmod>2021-04-10</lastmod>
|
||||
</url> <url>
|
||||
<loc>https://cool-y.github.io/2000/01/01/hello-world/</loc>
|
||||
<lastmod>2019-04-15</lastmod>
|
||||
|
@ -495,7 +495,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -665,7 +665,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -535,7 +535,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -292,7 +292,7 @@
|
||||
目前共计 7 个分类
|
||||
</div>
|
||||
<div class="category-all">
|
||||
<ul class="category-list"><li class="category-list-item"><a class="category-list-link" href="/categories/IOT/">IOT</a><span class="category-list-count">9</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/Pwn/">Pwn</a><span class="category-list-count">4</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/web/">web</a><span class="category-list-count">2</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/二进制/">二进制</a><span class="category-list-count">5</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/加密解密/">加密解密</a><span class="category-list-count">1</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/杂七杂八/">杂七杂八</a><span class="category-list-count">2</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/顶会论文/">顶会论文</a><span class="category-list-count">4</span></li></ul>
|
||||
<ul class="category-list"><li class="category-list-item"><a class="category-list-link" href="/categories/IOT/">IOT</a><span class="category-list-count">9</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/Pwn/">Pwn</a><span class="category-list-count">4</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/web/">web</a><span class="category-list-count">2</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/二进制/">二进制</a><span class="category-list-count">6</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/加密解密/">加密解密</a><span class="category-list-count">1</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/杂七杂八/">杂七杂八</a><span class="category-list-count">2</span></li><li class="category-list-item"><a class="category-list-link" href="/categories/顶会论文/">顶会论文</a><span class="category-list-count">5</span></li></ul>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@ -448,7 +448,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -483,7 +483,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -333,6 +333,32 @@
|
||||
|
||||
|
||||
|
||||
<article class="post post-type-normal" itemscope itemtype="http://schema.org/Article">
|
||||
<header class="post-header">
|
||||
|
||||
<h2 class="post-title">
|
||||
|
||||
<a class="post-title-link" href="/2019/05/14/pack-and-unpack/" itemprop="url">
|
||||
|
||||
<span itemprop="name">加壳与脱壳</span>
|
||||
|
||||
</a>
|
||||
|
||||
</h2>
|
||||
|
||||
<div class="post-meta">
|
||||
<time class="post-time" itemprop="dateCreated" datetime="2019-05-14T11:20:59+08:00" content="2019-05-14">
|
||||
05-14
|
||||
</time>
|
||||
</div>
|
||||
|
||||
</header>
|
||||
</article>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<article class="post post-type-normal" itemscope itemtype="http://schema.org/Article">
|
||||
<header class="post-header">
|
||||
|
||||
@ -561,7 +587,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -457,7 +457,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -483,7 +483,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -307,6 +307,32 @@
|
||||
|
||||
|
||||
|
||||
<article class="post post-type-normal" itemscope itemtype="http://schema.org/Article">
|
||||
<header class="post-header">
|
||||
|
||||
<h2 class="post-title">
|
||||
|
||||
<a class="post-title-link" href="/2021/01/08/Dolphin-Attack/" itemprop="url">
|
||||
|
||||
<span itemprop="name">Dolphin Attack 论文翻译</span>
|
||||
|
||||
</a>
|
||||
|
||||
</h2>
|
||||
|
||||
<div class="post-meta">
|
||||
<time class="post-time" itemprop="dateCreated" datetime="2021-01-08T11:58:55+08:00" content="2021-01-08">
|
||||
01-08
|
||||
</time>
|
||||
</div>
|
||||
|
||||
</header>
|
||||
</article>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<article class="post post-type-normal" itemscope itemtype="http://schema.org/Article">
|
||||
<header class="post-header">
|
||||
|
||||
@ -535,7 +561,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
File diff suppressed because one or more lines are too long
@ -441,7 +441,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
92
index.html
92
index.html
@ -412,7 +412,7 @@
|
||||
|
||||
|
||||
|
||||
QEMU虚拟机逃逸
|
||||
进入QEMU虚拟机逃逸的世界
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/04/10/vm-escape1/">
|
||||
@ -596,16 +596,10 @@
|
||||
|
||||
|
||||
|
||||
|
||||
D-LINK DIR-802 命令注入漏洞
|
||||
by Cool
|
||||
|
||||
漏洞已提交厂商https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10206
|
||||
漏洞类型CWE-78: Improper Neutra
|
||||
...
|
||||
提交个漏洞
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/03/02/DIR-802-OS-Command-Injection/#more" rel="contents">
|
||||
<a class="btn" href="/2021/03/02/DIR-802-OS-Command-Injection/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -786,12 +780,10 @@ by Cool
|
||||
|
||||
|
||||
|
||||
|
||||
ARMX作者说,nvram的内容必须从正在运行的设备中提取。一种方法是转储包含nvram数据的mtdblock, /proc/mtd可能有助于识别哪个mtdblock包含nvram。另一种方法是,如果您可以通过UART进行命令行访问(当然可以访问实际的硬件),某些固件会提供nvram命令,运行“ n
|
||||
...
|
||||
还记得固件仿真吗?先试着快速解决nvram
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/01/08/nvram-config/#more" rel="contents">
|
||||
<a class="btn" href="/2021/01/08/nvram-config/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -972,12 +964,10 @@ by Cool
|
||||
|
||||
|
||||
|
||||
|
||||
固件模拟与UPnP栈溢出利用https://kb.netgear.com/000062158/Security-Advisory-for-Pre-Authentication-Command-Injection-on-R8300-PSV-2020-0211 https://ssd-disclosur
|
||||
...
|
||||
复现一个漏洞
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/01/08/Netgear-psv-2020-0211/#more" rel="contents">
|
||||
<a class="btn" href="/2021/01/08/Netgear-psv-2020-0211/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1158,12 +1148,10 @@ by Cool
|
||||
|
||||
|
||||
|
||||
|
||||
海豚音攻击-复现文章中提到两种方案,一是具有信号发生器的强大变送器,二是带有智能手机的便携式变送器;前一种方案成本过于高,本文不做分析,后一种方案的实现成本在我们可接收的范围。但原文中对后一方案的实现没有太多介绍,于是我通过邮件咨询了作者-闫琛博士,闫博士非常友好,我是在晚上十点发送的第一封邮件,差
|
||||
...
|
||||
眼前一亮的工作!海豚音攻击,试着复现看看(贫穷版)
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/01/08/dolphin-attack-practice/#more" rel="contents">
|
||||
<a class="btn" href="/2021/01/08/dolphin-attack-practice/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1256,6 +1244,28 @@ by Cool
|
||||
</span>
|
||||
|
||||
|
||||
<span class="post-category">
|
||||
|
||||
<span class="post-meta-divider">|</span>
|
||||
|
||||
<span class="post-meta-item-icon">
|
||||
<i class="fa fa-folder-o"></i>
|
||||
</span>
|
||||
|
||||
<span class="post-meta-item-text">分类于</span>
|
||||
|
||||
|
||||
<span itemprop="about" itemscope itemtype="http://schema.org/Thing">
|
||||
<a href="/categories/顶会论文/" itemprop="url" rel="index">
|
||||
<span itemprop="name">顶会论文</span>
|
||||
</a>
|
||||
</span>
|
||||
|
||||
|
||||
|
||||
|
||||
</span>
|
||||
|
||||
|
||||
|
||||
|
||||
@ -1322,13 +1332,10 @@ by Cool
|
||||
|
||||
|
||||
|
||||
|
||||
海豚音攻击https://acmccs.github.io/papers/p103-zhangAemb.pdfhttps://github.com/USSLab/DolphinAttackhttps://zhuanlan.zhihu.com/p/29306026
|
||||
Abstract诸如Siri或Goo
|
||||
...
|
||||
算是进入安全领域以来第一篇看懂的论文QAQ
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/01/08/Dolphin-Attack/#more" rel="contents">
|
||||
<a class="btn" href="/2021/01/08/Dolphin-Attack/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1473,7 +1480,7 @@ Abstract诸如Siri或Goo
|
||||
</span>
|
||||
|
||||
<span title="字数统计">
|
||||
2.4k 字
|
||||
2.3k 字
|
||||
</span>
|
||||
|
||||
|
||||
@ -1509,12 +1516,10 @@ Abstract诸如Siri或Goo
|
||||
|
||||
|
||||
|
||||
|
||||
研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发
|
||||
...
|
||||
研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2020/10/16/coremail/#more" rel="contents">
|
||||
<a class="btn" href="/2020/10/16/coremail/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1695,16 +1700,10 @@ Abstract诸如Siri或Goo
|
||||
|
||||
|
||||
|
||||
|
||||
信息收集+常规owasp top 10+逻辑漏洞https://www.freebuf.com/sectool/94777.html
|
||||
|
||||
测试范围:.i.mi.com .cloud.mi.com
|
||||
|
||||
0x01 信息收集https://wh0ale.github.io/2019/02/22/SRC
|
||||
...
|
||||
信息收集+常规owasp top 10+逻辑漏洞
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/11/12/web-information-collect/#more" rel="contents">
|
||||
<a class="btn" href="/2019/11/12/web-information-collect/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1885,13 +1884,10 @@ Abstract诸如Siri或Goo
|
||||
|
||||
|
||||
|
||||
|
||||
Pwnable.tw start程序链接:https://pwnable.tw/static/chall/start
|
||||
0x01 检查保护情况不得不说,checksec这个工作看似简单,用用现成工具就行,但这决定了我们之后漏洞利用的方式,是否栈代码执行,还是ROP。最好多用几个工具进行检查,兼听则明。
|
||||
...
|
||||
我怎么还在start??
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/10/25/PWNtw-start/#more" rel="contents">
|
||||
<a class="btn" href="/2019/10/25/PWNtw-start/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -2072,12 +2068,10 @@ Abstract诸如Siri或Goo
|
||||
|
||||
|
||||
|
||||
|
||||
0x00 背景与简介在分析嵌入式设备的固件时,只采用静态分析方式通常是不够的,你需要实际执行你的分析目标来观察它的行为。在嵌入式Linux设备的世界里,很容易把一个调试器放在目标硬件上进行调试。如果你能在自己的系统上运行二进制文件,而不是拖着硬件做分析, 将会方便很多,这就需要用QEMU进行仿真。虽
|
||||
...
|
||||
如果能够调试一个IoT设备,那挖漏洞将会简单很多
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/07/25/Debug-a-router-firmware/#more" rel="contents">
|
||||
<a class="btn" href="/2019/07/25/Debug-a-router-firmware/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -2265,7 +2259,7 @@ Abstract诸如Siri或Goo
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -412,13 +412,10 @@
|
||||
|
||||
|
||||
|
||||
|
||||
通过分析物联网设备遭受攻击的链条可以发现,黑客获取固件,把固件逆向成汇编或C程序语言后,能分析出设备的运行流程和网络行为,还能找到安全加密相关的密钥相关的信息。如果这些“有心人”没能获取到固件信息,他们也很难发现这些漏洞。从这一点看,物联网设备的安全性,在很大程度上决定于其固件的安全性。
|
||||
http:
|
||||
...
|
||||
固件有几种获取方法?
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/07/24/获取固件/#more" rel="contents">
|
||||
<a class="btn" href="/2019/07/24/获取固件/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -599,14 +596,10 @@ http:
|
||||
|
||||
|
||||
|
||||
|
||||
搭建环境最好使用docker来搭建,方便迁移 https://hub.docker.com/r/vulnerables/web-dvwa/
|
||||
暴力破解easy模式
|
||||
密码破解是从存储在计算机系统中或由计算机系统传输的数据中恢复密码的过程。一种常见的方法是反复尝试密码的猜测。用户经常选择弱密码。不安全选择
|
||||
...
|
||||
WEB安全的START
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/07/24/web-dvwa/#more" rel="contents">
|
||||
<a class="btn" href="/2019/07/24/web-dvwa/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -787,15 +780,10 @@ http:
|
||||
|
||||
|
||||
|
||||
|
||||
之前介绍了Windows x86平台下栈溢出漏洞的开放与利用,鉴于CTF基本都是Linux,还有实际开发环境,很多智能设备的系统都是基于Linux,所以从很现实的需求出发,一定要学习学习Linux下漏洞的分析。
|
||||
ref:
|
||||
|
||||
CTF-WIKI:https://ctf-wiki.github.io/ct
|
||||
...
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/07/16/linux-pwn-32/#more" rel="contents">
|
||||
<a class="btn" href="/2019/07/16/linux-pwn-32/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -954,7 +942,7 @@ CTF-WIKI:https://ctf-wiki.github.io/ct
|
||||
</span>
|
||||
|
||||
<span title="阅读时长">
|
||||
12 分钟
|
||||
11 分钟
|
||||
</span>
|
||||
|
||||
</div>
|
||||
@ -976,18 +964,10 @@ CTF-WIKI:https://ctf-wiki.github.io/ct
|
||||
|
||||
|
||||
|
||||
|
||||
这部分是对Window x86平台下的几个典型漏洞利用方式的介绍,从最基础的、没有开启任何保护的漏洞程序入手,然后开启GS,最后通过rop绕过DEP。
|
||||
|
||||
0x00 漏洞利用开发简介(1)需要什么
|
||||
|
||||
Immunity Debugger -Download
|
||||
Mona.py -Download
|
||||
Metas
|
||||
...
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/07/10/x86basic/#more" rel="contents">
|
||||
<a class="btn" href="/2019/07/10/x86basic/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1146,7 +1126,7 @@ Metas
|
||||
</span>
|
||||
|
||||
<span title="阅读时长">
|
||||
15 分钟
|
||||
14 分钟
|
||||
</span>
|
||||
|
||||
</div>
|
||||
@ -1168,15 +1148,10 @@ Metas
|
||||
|
||||
|
||||
|
||||
|
||||
这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。参考:https://paper.seebug.org/841/#_1
|
||||
部署afl
|
||||
|
||||
123456
|
||||
...
|
||||
这篇文章是对afl的简单使用,可大致分为黑盒测试和白盒测试两个部分。白盒测试从对目标程序的插桩编译开始,然后使用fuzzer对其模糊测试发现崩溃,最后对测试的代码覆盖率进行评估。黑盒测试则演示得较简略。
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/07/09/afl-first-try/#more" rel="contents">
|
||||
<a class="btn" href="/2019/07/09/afl-first-try/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1321,7 +1296,7 @@ Metas
|
||||
</span>
|
||||
|
||||
<span title="字数统计">
|
||||
11.4k 字
|
||||
11.3k 字
|
||||
</span>
|
||||
|
||||
|
||||
@ -1357,14 +1332,10 @@ Metas
|
||||
|
||||
|
||||
|
||||
|
||||
接触这个词语已经有一年了,但还没有学习过更没有上手实践过,正好趁这个机会好好弄弄AFL。提起模糊测试,我们总会联想起这样或那样的专业术语——测试用例、代码覆盖率、执行路径等等,你可能和我一样一头雾水,这次我们就来看个明白
|
||||
|
||||
0x01 模糊测试首先,模糊测试(Fuzzing)是一种测试手段,它把系统看
|
||||
...
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/07/01/AFL-first-learn/#more" rel="contents">
|
||||
<a class="btn" href="/2019/07/01/AFL-first-learn/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1457,6 +1428,28 @@ Metas
|
||||
</span>
|
||||
|
||||
|
||||
<span class="post-category">
|
||||
|
||||
<span class="post-meta-divider">|</span>
|
||||
|
||||
<span class="post-meta-item-icon">
|
||||
<i class="fa fa-folder-o"></i>
|
||||
</span>
|
||||
|
||||
<span class="post-meta-item-text">分类于</span>
|
||||
|
||||
|
||||
<span itemprop="about" itemscope itemtype="http://schema.org/Thing">
|
||||
<a href="/categories/二进制/" itemprop="url" rel="index">
|
||||
<span itemprop="name">二进制</span>
|
||||
</a>
|
||||
</span>
|
||||
|
||||
|
||||
|
||||
|
||||
</span>
|
||||
|
||||
|
||||
|
||||
|
||||
@ -1523,12 +1516,10 @@ Metas
|
||||
|
||||
|
||||
|
||||
|
||||
壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。壳附加在原始程序上,通过Windows加载器载入内存后,先于原始程序执行,以得到控制权,在执行的过程中对原始程序进行解密还原,然后把控制权还给原始程序,执行原来的代码。加上外壳后,原始程序在磁盘文件中一般是以加密后的形式存在的,只在执
|
||||
...
|
||||
壳是最早出现的一种专用加密软件技术。一些软件会采取加壳保护的方式。
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/05/14/pack-and-unpack/#more" rel="contents">
|
||||
<a class="btn" href="/2019/05/14/pack-and-unpack/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1709,12 +1700,10 @@ Metas
|
||||
|
||||
|
||||
|
||||
|
||||
PE文件格式PE(Portable Executable)是Win32平台下可执行文件遵守的数据格式。常见的可执行文件(如exe和dll)都是典型的PE文件。PE文件格式其实是一种数据结构,包含Windows操作系统加载管理可执行代码时所必要的信息,如二进制机器代码、字符串、菜单、图标、位图、字体等
|
||||
...
|
||||
庖丁解牛.jpg
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/05/13/PE-file/#more" rel="contents">
|
||||
<a class="btn" href="/2019/05/13/PE-file/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1895,14 +1884,10 @@ Metas
|
||||
|
||||
|
||||
|
||||
|
||||
概述HomePageOpenWRT与miniUPnP
|
||||
|
||||
MiniUPnP项目提供了支持UPnP IGD(互联网网关设备)规范的软件。在MiniUPnPd中添加了NAT-PMP和PCP支持。 对于客户端(MiniUPnPc)使用libnatpmp来支持NAT-PMP。MiniUPnP守护程序(Mini
|
||||
...
|
||||
非常经典的UPnP,Classic~
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/04/21/XIAOMI-UPnP/#more" rel="contents">
|
||||
<a class="btn" href="/2019/04/21/XIAOMI-UPnP/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -2083,16 +2068,10 @@ MiniUPnP项目提供了支持UPnP IGD(互联网网关设备)规范的软件。
|
||||
|
||||
|
||||
|
||||
|
||||
Carving Database Storage to Detect and Trace Security Breaches
|
||||
复原数据库存储以检测和跟踪安全漏洞原文下载
|
||||
|
||||
MotivationDBMS(数据库管理系统)
|
||||
通常用于存储和处理敏感数据,因此,投入了大量精力使用访问控制策略来保护DBMS。
|
||||
...
|
||||
再也不敢删库跑路了!
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/04/15/Caving-db-storage/#more" rel="contents">
|
||||
<a class="btn" href="/2019/04/15/Caving-db-storage/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -2280,7 +2259,7 @@ MotivationDBMS(数据库管理系统)
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -412,46 +412,10 @@
|
||||
|
||||
|
||||
|
||||
|
||||
软件保护方式
|
||||
功能限制
|
||||
时间限制
|
||||
|
||||
|
||||
运行时长限制
|
||||
使用日期限制
|
||||
使用次数限制
|
||||
|
||||
|
||||
警告窗口
|
||||
|
||||
分析工具
|
||||
静态分析工具
|
||||
|
||||
|
||||
IDA
|
||||
W32Dasm
|
||||
lordPE
|
||||
Resource Hacker
|
||||
|
||||
|
||||
动态分析工具
|
||||
|
||||
|
||||
OllyDbg
|
||||
WinDbg
|
||||
|
||||
|
||||
对抗分析技术
|
||||
反静态分析技术
|
||||
|
||||
|
||||
花指令
|
||||
自修改代
|
||||
...
|
||||
一些逆向的小实验
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/03/28/逆向工程实验/#more" rel="contents">
|
||||
<a class="btn" href="/2019/03/28/逆向工程实验/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -632,18 +596,10 @@ WinDbg
|
||||
|
||||
|
||||
|
||||
|
||||
漏洞描述Samba服务器软件存在远程执行代码漏洞。攻击者可以利用客户端将指定库文件上传到具有可写权限的共享目录,会导致服务器加载并执行指定的库文件。具体执行条件如下:
|
||||
|
||||
服务器打开了文件/打印机共享端口445,让其能够在公网上访问
|
||||
|
||||
共享文件拥有写入权限
|
||||
|
||||
恶意攻击者需猜解Samba服务端共享目录的
|
||||
...
|
||||
Samba漏洞臭名昭著
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/03/25/Samba-CVE/#more" rel="contents">
|
||||
<a class="btn" href="/2019/03/25/Samba-CVE/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -824,13 +780,10 @@ WinDbg
|
||||
|
||||
|
||||
|
||||
|
||||
我们实验室有个光荣传统,每天早上起床叫醒我的不是闹钟,而是群里雷打不动的安全新闻(其实我免提醒了2333)而这个发送新闻的人,一代一代的传承,我没想到竟然有一天会落在我头上,哭了o(╥﹏╥)o为了不暴露我的起床时间,同时能保质保量的完成任务,我决定做个机器人帮我完成。这就是这片po文的由来啦!
|
||||
大杀
|
||||
...
|
||||
看了这篇文章,女朋友还会问你为什么不给她发微信吗?
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/03/23/auto-send-WX/#more" rel="contents">
|
||||
<a class="btn" href="/2019/03/23/auto-send-WX/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1011,12 +964,10 @@ WinDbg
|
||||
|
||||
|
||||
|
||||
|
||||
小米固件工具mkxqimage小米自己改了个打包解包固件的工具,基于 trx 改的(本质上还是 trx 格式),加了 RSA 验证和解包功能,路由系统里自带:1234Usage:mkxqimg [-o outfile] [-p private_key] [-f file] [-f file [-f
|
||||
...
|
||||
小米基于 trx 改了个打包解包固件的工具
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/03/16/小米固件工具mkxqimage/#more" rel="contents">
|
||||
<a class="btn" href="/2019/03/16/小米固件工具mkxqimage/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1197,13 +1148,10 @@ WinDbg
|
||||
|
||||
|
||||
|
||||
|
||||
qq数据库采用简单加密——异或加密数据获取:DENGTA_META.xml—IMEI:867179032952446databases/2685371834.db——数据库文件
|
||||
解密方式:明文msg_t 密文msg_Data key:IMEImsg_t = msg_Data[i]^IMEI[i
|
||||
...
|
||||
很久远的攻击,可能现在还有效
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/02/22/qq数据库的加密解密/#more" rel="contents">
|
||||
<a class="btn" href="/2019/02/22/qq数据库的加密解密/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1384,15 +1332,10 @@ WinDbg
|
||||
|
||||
|
||||
|
||||
|
||||
TCP侧信道分析及利用的学习报告论文来源:USENIX SECURITY 2018:Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets下载:原文pdf中文slides
|
||||
背景知识测信道香农信息论
|
||||
|
||||
什么是信息?
|
||||
...
|
||||
什么是信息?什么是加密?什么是侧信道?
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/01/16/wifi半双工侧信道攻击学习笔记/#more" rel="contents">
|
||||
<a class="btn" href="/2019/01/16/wifi半双工侧信道攻击学习笔记/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1573,13 +1516,10 @@ WinDbg
|
||||
|
||||
|
||||
|
||||
|
||||
TCPDUMP 4.5.1 拒绝服务攻击漏洞分析Tcpdump介绍
|
||||
tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。tcpdump 适用于大多数的类Unix系统 操作系统:包括Linux、Solaris、BSD、Mac O
|
||||
...
|
||||
TCPDUMP 4.5.1 拒绝服务攻击漏洞分析
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2018/12/25/TCPDUMP拒绝服务攻击漏洞/#more" rel="contents">
|
||||
<a class="btn" href="/2018/12/25/TCPDUMP拒绝服务攻击漏洞/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1760,14 +1700,10 @@ tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和
|
||||
|
||||
|
||||
|
||||
|
||||
论文来源:USENIX SECURITY 2018:Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices下载:原文pdf中文slides
|
||||
论文解读概要:
|
||||
物联网(IoT)设备的快速增长的格局为其管理和安全
|
||||
...
|
||||
提前发现、登记和注释物联网设备
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2018/12/23/基于规则引擎发现IOT设备/#more" rel="contents">
|
||||
<a class="btn" href="/2018/12/23/基于规则引擎发现IOT设备/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1948,13 +1884,10 @@ tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和
|
||||
|
||||
|
||||
|
||||
|
||||
控制局域网内的IOT设备中间人攻击—流量分析使用Nmap分析局域网内设备,得到智能设备的IP 小米智能插座:192.168.31.197 网关:192.168.31.147(控制它的手机ip)
|
||||
ettercap嗅探智能设备和网关之间的流量sudo ettercap -i ens33 -T -q
|
||||
...
|
||||
局域网内所有的动作都在黑客的掌握之中吗?
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2018/12/15/miio-control/#more" rel="contents">
|
||||
<a class="btn" href="/2018/12/15/miio-control/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -2307,7 +2240,7 @@ ettercap嗅探智能设备和网关之间的流量sudo ettercap -i ens33 -T -q
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
3862
search.xml
3862
search.xml
File diff suppressed because one or more lines are too long
376
sitemap.xml
376
sitemap.xml
@ -2,100 +2,205 @@
|
||||
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/04/10/vm-escape1/</loc>
|
||||
<loc>https://cool-y.github.io/2019/04/21/XIAOMI-UPnP/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:25:44.694Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-Injection/</loc>
|
||||
|
||||
<lastmod>2021-04-10T10:51:34.640Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/nvram-config/</loc>
|
||||
|
||||
<lastmod>2021-01-08T08:31:40.139Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/Netgear-psv-2020-0211/</loc>
|
||||
|
||||
<lastmod>2021-01-08T05:45:50.553Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/dolphin-attack-practice/</loc>
|
||||
|
||||
<lastmod>2021-01-08T05:21:51.940Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/Dolphin-Attack/</loc>
|
||||
|
||||
<lastmod>2021-01-08T04:50:09.488Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2020/10/16/coremail/</loc>
|
||||
|
||||
<lastmod>2020-10-20T13:59:55.666Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/01/16/wifi%E5%8D%8A%E5%8F%8C%E5%B7%A5%E4%BE%A7%E4%BF%A1%E9%81%93%E6%94%BB%E5%87%BB%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0/</loc>
|
||||
|
||||
<lastmod>2020-10-19T04:44:41.846Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/03/25/Samba-CVE/</loc>
|
||||
|
||||
<lastmod>2020-10-19T04:26:54.240Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/05/13/PE-file/</loc>
|
||||
|
||||
<lastmod>2020-10-19T04:14:48.537Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/11/12/web-information-collect/</loc>
|
||||
|
||||
<lastmod>2019-11-12T13:05:50.020Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/10/25/PWNtw-start/</loc>
|
||||
|
||||
<lastmod>2019-10-26T02:44:23.409Z</lastmod>
|
||||
<lastmod>2021-04-10T13:52:11.589Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/10/x86basic/</loc>
|
||||
|
||||
<lastmod>2019-10-25T13:07:23.257Z</lastmod>
|
||||
<lastmod>2021-04-10T13:51:32.349Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/01/16/wifi%E5%8D%8A%E5%8F%8C%E5%B7%A5%E4%BE%A7%E4%BF%A1%E9%81%93%E6%94%BB%E5%87%BB%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:51:18.277Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/11/12/web-information-collect/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:49:16.555Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/24/web-dvwa/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:48:51.989Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2018/12/25/TCPDUMP%E6%8B%92%E7%BB%9D%E6%9C%8D%E5%8A%A1%E6%94%BB%E5%87%BB%E6%BC%8F%E6%B4%9E/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:48:18.517Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/03/25/Samba-CVE/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:47:36.387Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/02/22/qq%E6%95%B0%E6%8D%AE%E5%BA%93%E7%9A%84%E5%8A%A0%E5%AF%86%E8%A7%A3%E5%AF%86/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:47:12.326Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/10/25/PWNtw-start/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:46:47.397Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/05/13/PE-file/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:46:18.806Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/05/14/pack-and-unpack/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:45:39.726Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/nvram-config/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:45:01.826Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/Netgear-psv-2020-0211/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:44:13.142Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2018/12/15/miio-control/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:43:57.848Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/16/linux-pwn-32/</loc>
|
||||
|
||||
<lastmod>2019-10-25T13:06:26.899Z</lastmod>
|
||||
<lastmod>2021-04-10T13:43:18.149Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/Dolphin-Attack/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:42:46.870Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/01/08/dolphin-attack-practice/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:41:53.589Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-Injection/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:39:29.524Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/25/Debug-a-router-firmware/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:39:05.082Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2020/10/16/coremail/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:38:12.227Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/04/15/Caving-db-storage/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:37:48.593Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/03/23/auto-send-WX/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:36:52.758Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/09/afl-first-try/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:35:35.911Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/01/AFL-first-learn/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:35:23.942Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/03/16/%E5%B0%8F%E7%B1%B3%E5%9B%BA%E4%BB%B6%E5%B7%A5%E5%85%B7mkxqimage/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:35:03.596Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/03/28/%E9%80%86%E5%90%91%E5%B7%A5%E7%A8%8B%E5%AE%9E%E9%AA%8C/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:34:37.251Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2018/12/23/%E5%9F%BA%E4%BA%8E%E8%A7%84%E5%88%99%E5%BC%95%E6%93%8E%E5%8F%91%E7%8E%B0IOT%E8%AE%BE%E5%A4%87/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:33:47.037Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/24/%E8%8E%B7%E5%8F%96%E5%9B%BA%E4%BB%B6/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:33:17.285Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2021/04/10/vm-escape1/</loc>
|
||||
|
||||
<lastmod>2021-04-10T13:33:14.007Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
@ -106,55 +211,6 @@
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/25/Debug-a-router-firmware/</loc>
|
||||
|
||||
<lastmod>2019-07-25T14:36:28.915Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/03/16/%E5%B0%8F%E7%B1%B3%E5%9B%BA%E4%BB%B6%E5%B7%A5%E5%85%B7mkxqimage/</loc>
|
||||
|
||||
<lastmod>2019-07-24T06:32:11.089Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/24/%E8%8E%B7%E5%8F%96%E5%9B%BA%E4%BB%B6/</loc>
|
||||
|
||||
<lastmod>2019-07-24T06:01:00.825Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/24/web-dvwa/</loc>
|
||||
|
||||
<lastmod>2019-07-24T06:00:56.862Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/04/21/XIAOMI-UPnP/</loc>
|
||||
|
||||
<lastmod>2019-07-11T01:51:28.743Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/01/AFL-first-learn/</loc>
|
||||
|
||||
<lastmod>2019-07-09T09:27:22.887Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/07/09/afl-first-try/</loc>
|
||||
|
||||
<lastmod>2019-07-09T09:03:52.647Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/bookmarks/index.html</loc>
|
||||
|
||||
@ -163,35 +219,7 @@
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/05/14/pack-and-unpack/</loc>
|
||||
|
||||
<lastmod>2019-07-01T12:04:55.244Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2018/12/25/TCPDUMP%E6%8B%92%E7%BB%9D%E6%9C%8D%E5%8A%A1%E6%94%BB%E5%87%BB%E6%BC%8F%E6%B4%9E/</loc>
|
||||
|
||||
<lastmod>2019-07-01T09:28:40.813Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/03/28/%E9%80%86%E5%90%91%E5%B7%A5%E7%A8%8B%E5%AE%9E%E9%AA%8C/</loc>
|
||||
|
||||
<lastmod>2019-05-07T11:34:22.987Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/04/15/Caving-db-storage/</loc>
|
||||
|
||||
<lastmod>2019-04-15T08:01:31.751Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/tags/index.html</loc>
|
||||
<loc>https://cool-y.github.io/googleacf4df440b4becc4.html</loc>
|
||||
|
||||
<lastmod>2019-04-15T07:35:38.085Z</lastmod>
|
||||
|
||||
@ -205,7 +233,7 @@
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/googleacf4df440b4becc4.html</loc>
|
||||
<loc>https://cool-y.github.io/tags/index.html</loc>
|
||||
|
||||
<lastmod>2019-04-15T07:35:38.085Z</lastmod>
|
||||
|
||||
@ -225,34 +253,6 @@
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2018/12/23/%E5%9F%BA%E4%BA%8E%E8%A7%84%E5%88%99%E5%BC%95%E6%93%8E%E5%8F%91%E7%8E%B0IOT%E8%AE%BE%E5%A4%87/</loc>
|
||||
|
||||
<lastmod>2019-04-15T07:35:38.083Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2018/12/15/miio-control/</loc>
|
||||
|
||||
<lastmod>2019-04-15T07:35:38.082Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/02/22/qq%E6%95%B0%E6%8D%AE%E5%BA%93%E7%9A%84%E5%8A%A0%E5%AF%86%E8%A7%A3%E5%AF%86/</loc>
|
||||
|
||||
<lastmod>2019-04-15T07:35:38.082Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2019/03/23/auto-send-WX/</loc>
|
||||
|
||||
<lastmod>2019-04-15T07:35:38.081Z</lastmod>
|
||||
|
||||
</url>
|
||||
|
||||
<url>
|
||||
<loc>https://cool-y.github.io/2000/01/01/hello-world/</loc>
|
||||
|
||||
|
@ -482,7 +482,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -482,7 +482,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -482,7 +482,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -508,7 +508,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -482,7 +482,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -292,7 +292,7 @@
|
||||
目前共计 55 个标签
|
||||
</div>
|
||||
<div class="tag-cloud-tags">
|
||||
<a href="/tags/AFL/" style="font-size: 18px; color: #8e8e8e">AFL</a> <a href="/tags/CTF/" style="font-size: 12px; color: #ccc">CTF</a> <a href="/tags/CVE/" style="font-size: 18px; color: #8e8e8e">CVE</a> <a href="/tags/D-LINK/" style="font-size: 12px; color: #ccc">D-LINK</a> <a href="/tags/IoT/" style="font-size: 12px; color: #ccc">IoT</a> <a href="/tags/Linux/" style="font-size: 12px; color: #ccc">Linux</a> <a href="/tags/MiniUPnP/" style="font-size: 12px; color: #ccc">MiniUPnP</a> <a href="/tags/NVRAM/" style="font-size: 12px; color: #ccc">NVRAM</a> <a href="/tags/Netgear/" style="font-size: 18px; color: #8e8e8e">Netgear</a> <a href="/tags/PE/" style="font-size: 12px; color: #ccc">PE</a> <a href="/tags/QEMU/" style="font-size: 12px; color: #ccc">QEMU</a> <a href="/tags/QQ/" style="font-size: 12px; color: #ccc">QQ</a> <a href="/tags/SSH/" style="font-size: 12px; color: #ccc">SSH</a> <a href="/tags/Samba/" style="font-size: 12px; color: #ccc">Samba</a> <a href="/tags/TCPDUMP/" style="font-size: 12px; color: #ccc">TCPDUMP</a> <a href="/tags/UPnP/" style="font-size: 24px; color: #4f4f4f">UPnP</a> <a href="/tags/USENIX/" style="font-size: 12px; color: #ccc">USENIX</a> <a href="/tags/Windows/" style="font-size: 12px; color: #ccc">Windows</a> <a href="/tags/ctf/" style="font-size: 18px; color: #8e8e8e">ctf</a> <a href="/tags/itchat/" style="font-size: 12px; color: #ccc">itchat</a> <a href="/tags/linux/" style="font-size: 12px; color: #ccc">linux</a> <a href="/tags/miio/" style="font-size: 12px; color: #ccc">miio</a> <a href="/tags/phishing-email/" style="font-size: 12px; color: #ccc">phishing email</a> <a href="/tags/pwn/" style="font-size: 12px; color: #ccc">pwn</a> <a href="/tags/web/" style="font-size: 18px; color: #8e8e8e">web</a> <a href="/tags/wifi/" style="font-size: 12px; color: #ccc">wifi</a> <a href="/tags/中间人/" style="font-size: 12px; color: #ccc">中间人</a> <a href="/tags/二进制/" style="font-size: 18px; color: #8e8e8e">二进制</a> <a href="/tags/传感器/" style="font-size: 18px; color: #8e8e8e">传感器</a> <a href="/tags/侧信道攻击/" style="font-size: 12px; color: #ccc">侧信道攻击</a> <a href="/tags/信息泄露/" style="font-size: 12px; color: #ccc">信息泄露</a> <a href="/tags/取证/" style="font-size: 12px; color: #ccc">取证</a> <a href="/tags/固件模拟/" style="font-size: 24px; color: #4f4f4f">固件模拟</a> <a href="/tags/复原文件/" style="font-size: 12px; color: #ccc">复原文件</a> <a href="/tags/密码/" style="font-size: 12px; color: #ccc">密码</a> <a href="/tags/小米/" style="font-size: 30px; color: #111">小米</a> <a href="/tags/微信/" style="font-size: 12px; color: #ccc">微信</a> <a href="/tags/拒绝服务攻击/" style="font-size: 12px; color: #ccc">拒绝服务攻击</a> <a href="/tags/数据库/" style="font-size: 18px; color: #8e8e8e">数据库</a> <a href="/tags/数据挖掘/" style="font-size: 12px; color: #ccc">数据挖掘</a> <a href="/tags/文件格式/" style="font-size: 18px; color: #8e8e8e">文件格式</a> <a href="/tags/栈溢出/" style="font-size: 12px; color: #ccc">栈溢出</a> <a href="/tags/模糊测试/" style="font-size: 18px; color: #8e8e8e">模糊测试</a> <a href="/tags/漏洞/" style="font-size: 12px; color: #ccc">漏洞</a> <a href="/tags/破解/" style="font-size: 12px; color: #ccc">破解</a> <a href="/tags/硬件层/" style="font-size: 12px; color: #ccc">硬件层</a> <a href="/tags/硬件攻击/" style="font-size: 18px; color: #8e8e8e">硬件攻击</a> <a href="/tags/自然语言处理/" style="font-size: 12px; color: #ccc">自然语言处理</a> <a href="/tags/语音助手/" style="font-size: 18px; color: #8e8e8e">语音助手</a> <a href="/tags/调试/" style="font-size: 12px; color: #ccc">调试</a> <a href="/tags/路由器/" style="font-size: 18px; color: #8e8e8e">路由器</a> <a href="/tags/远程执行/" style="font-size: 12px; color: #ccc">远程执行</a> <a href="/tags/逆向/" style="font-size: 12px; color: #ccc">逆向</a> <a href="/tags/重放攻击/" style="font-size: 12px; color: #ccc">重放攻击</a> <a href="/tags/钓鱼邮件/" style="font-size: 12px; color: #ccc">钓鱼邮件</a>
|
||||
<a href="/tags/AFL/" style="font-size: 18px; color: #8e8e8e">AFL</a> <a href="/tags/CTF/" style="font-size: 12px; color: #ccc">CTF</a> <a href="/tags/CVE/" style="font-size: 18px; color: #8e8e8e">CVE</a> <a href="/tags/D-LINK/" style="font-size: 12px; color: #ccc">D-LINK</a> <a href="/tags/IoT/" style="font-size: 12px; color: #ccc">IoT</a> <a href="/tags/Linux/" style="font-size: 12px; color: #ccc">Linux</a> <a href="/tags/MiniUPnP/" style="font-size: 12px; color: #ccc">MiniUPnP</a> <a href="/tags/NVRAM/" style="font-size: 12px; color: #ccc">NVRAM</a> <a href="/tags/Netgear/" style="font-size: 18px; color: #8e8e8e">Netgear</a> <a href="/tags/PE/" style="font-size: 12px; color: #ccc">PE</a> <a href="/tags/QEMU/" style="font-size: 12px; color: #ccc">QEMU</a> <a href="/tags/QQ/" style="font-size: 12px; color: #ccc">QQ</a> <a href="/tags/SSH/" style="font-size: 12px; color: #ccc">SSH</a> <a href="/tags/Samba/" style="font-size: 12px; color: #ccc">Samba</a> <a href="/tags/TCPDUMP/" style="font-size: 12px; color: #ccc">TCPDUMP</a> <a href="/tags/UPnP/" style="font-size: 24px; color: #4f4f4f">UPnP</a> <a href="/tags/USENIX/" style="font-size: 12px; color: #ccc">USENIX</a> <a href="/tags/Windows/" style="font-size: 12px; color: #ccc">Windows</a> <a href="/tags/ctf/" style="font-size: 18px; color: #8e8e8e">ctf</a> <a href="/tags/itchat/" style="font-size: 12px; color: #ccc">itchat</a> <a href="/tags/linux/" style="font-size: 12px; color: #ccc">linux</a> <a href="/tags/miio/" style="font-size: 12px; color: #ccc">miio</a> <a href="/tags/phishing-email/" style="font-size: 12px; color: #ccc">phishing email</a> <a href="/tags/pwn/" style="font-size: 12px; color: #ccc">pwn</a> <a href="/tags/web/" style="font-size: 18px; color: #8e8e8e">web</a> <a href="/tags/wifi/" style="font-size: 12px; color: #ccc">wifi</a> <a href="/tags/中间人/" style="font-size: 12px; color: #ccc">中间人</a> <a href="/tags/二进制/" style="font-size: 18px; color: #8e8e8e">二进制</a> <a href="/tags/传感器/" style="font-size: 18px; color: #8e8e8e">传感器</a> <a href="/tags/侧信道攻击/" style="font-size: 12px; color: #ccc">侧信道攻击</a> <a href="/tags/信息泄露/" style="font-size: 12px; color: #ccc">信息泄露</a> <a href="/tags/取证/" style="font-size: 12px; color: #ccc">取证</a> <a href="/tags/固件模拟/" style="font-size: 24px; color: #4f4f4f">固件模拟</a> <a href="/tags/复原文件/" style="font-size: 12px; color: #ccc">复原文件</a> <a href="/tags/密码/" style="font-size: 12px; color: #ccc">密码</a> <a href="/tags/小米/" style="font-size: 30px; color: #111">小米</a> <a href="/tags/微信/" style="font-size: 12px; color: #ccc">微信</a> <a href="/tags/拒绝服务攻击/" style="font-size: 12px; color: #ccc">拒绝服务攻击</a> <a href="/tags/数据库/" style="font-size: 18px; color: #8e8e8e">数据库</a> <a href="/tags/数据挖掘/" style="font-size: 12px; color: #ccc">数据挖掘</a> <a href="/tags/文件格式/" style="font-size: 18px; color: #8e8e8e">文件格式</a> <a href="/tags/栈溢出/" style="font-size: 12px; color: #ccc">栈溢出</a> <a href="/tags/模糊测试/" style="font-size: 18px; color: #8e8e8e">模糊测试</a> <a href="/tags/漏洞/" style="font-size: 12px; color: #ccc">漏洞</a> <a href="/tags/破解/" style="font-size: 18px; color: #8e8e8e">破解</a> <a href="/tags/硬件层/" style="font-size: 12px; color: #ccc">硬件层</a> <a href="/tags/硬件攻击/" style="font-size: 18px; color: #8e8e8e">硬件攻击</a> <a href="/tags/自然语言处理/" style="font-size: 12px; color: #ccc">自然语言处理</a> <a href="/tags/语音助手/" style="font-size: 18px; color: #8e8e8e">语音助手</a> <a href="/tags/调试/" style="font-size: 12px; color: #ccc">调试</a> <a href="/tags/路由器/" style="font-size: 18px; color: #8e8e8e">路由器</a> <a href="/tags/远程执行/" style="font-size: 12px; color: #ccc">远程执行</a> <a href="/tags/逆向/" style="font-size: 18px; color: #8e8e8e">逆向</a> <a href="/tags/重放攻击/" style="font-size: 12px; color: #ccc">重放攻击</a> <a href="/tags/钓鱼邮件/" style="font-size: 12px; color: #ccc">钓鱼邮件</a>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@ -448,7 +448,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -482,7 +482,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -482,7 +482,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -482,7 +482,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -456,7 +456,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user