├── 2017 ├── 11 │ ├── 10 │ │ ├── ARM-exploitation-for-IoT-Episode-2 │ │ │ ├── 0 │ │ │ ├── 1 │ │ │ ├── 2 │ │ │ ├── 3 │ │ │ ├── 4 │ │ │ └── 5 │ │ └── ARM-exploitation-for-IoT-Episode-3 │ │ │ ├── 0 │ │ │ ├── 1 │ │ │ ├── 2 │ │ │ ├── 3 │ │ │ ├── 4 │ │ │ ├── 5 │ │ │ ├── 6 │ │ │ ├── 7 │ │ │ ├── 8 │ │ │ ├── 9 │ │ │ ├── 10 │ │ │ ├── 11 │ │ │ ├── 12 │ │ │ ├── 13 │ │ │ ├── 14 │ │ │ ├── 15 │ │ │ ├── 16 │ │ │ ├── 17 │ │ │ ├── 18 │ │ │ ├── 19 │ │ │ ├── 20 │ │ │ ├── 21 │ │ │ ├── 22 │ │ │ ├── 23 │ │ │ ├── 24 │ │ │ ├── 25 │ │ │ ├── 26 │ │ │ ├── 27 │ │ │ ├── 28 │ │ │ ├── 29 │ │ │ ├── 30 │ │ │ ├── 31 │ │ │ ├── 32 │ │ │ ├── 33 │ │ │ └── 34 │ └── 06 │ │ └── IoT设备通信安全讨论 │ │ ├── 0 │ │ ├── 1 │ │ ├── 2 │ │ ├── 3 │ │ ├── 4 │ │ ├── 5 │ │ ├── 6 │ │ ├── 7 │ │ ├── 8 │ │ ├── 9 │ │ ├── 10 │ │ ├── 11 │ │ ├── 12 │ │ ├── 13 │ │ ├── 14 │ │ ├── 15 │ │ ├── 16 │ │ ├── 17 │ │ ├── 18 │ │ ├── 19 │ │ ├── 20 │ │ └── 21 └── 09 │ └── 27 │ ├── Burglar-and-Hacker │ ├── Dos.png │ ├── ssrf.png │ ├── step1.png │ ├── step2.png │ ├── step3.png │ ├── GetIpuEnr.png │ ├── 12345_port.png │ ├── internal_iSmartAlarm_website.png │ └── index.html │ ├── 路由器固件安全分析技术-一 │ ├── 1498205156636.png │ ├── 1498205368844.png │ ├── 14982054337685.png │ ├── 14982055759845.png │ ├── 14982056684523.png │ ├── 14982057419858.png │ ├── 14982057841064.png │ ├── 14982058212617.png │ ├── 14982058625887.png │ ├── 14982059585240.png │ ├── 14982060682879.png │ ├── 14982061673331.png │ ├── 14982062006814.png │ ├── 14982062532734.png │ ├── 14982063045813.png │ ├── 14982063369557.png │ ├── 14982063654436.png │ ├── 14982063961678.png │ ├── 14982064611821.png │ ├── 14982065398438.png │ ├── 14982066375651.png │ ├── 1498206710357.png │ ├── 14982067813666.png │ ├── 14982068387713.png │ ├── 14982068741928.png │ ├── 14982068997405.png │ ├── 14982069797635.png │ ├── 14982070565118.png │ ├── 14982071275093.png │ ├── 14982071625103.png │ ├── 14982072171339.png │ ├── 14982072686950.png │ └── 14982072916043.png │ ├── 路由器固件安全分析技术-二 │ ├── 14985524456992.jpg │ ├── 14991609258091.jpg │ ├── 14992257339133.jpg │ ├── 14992258407750.jpg │ ├── 14992360628857.jpg │ ├── 14993318232847.jpg │ ├── 1499332864463.jpg │ ├── 14993804636878.jpg │ ├── 15005456292920.jpg │ ├── 15005633108196.png │ ├── 15005633147554.png │ ├── 15005644893824.png │ ├── 15006012892796.jpg │ ├── 15006018399438.jpg │ ├── 15006023787213.jpg │ ├── 15006027826284.jpg │ ├── 15006075862795.jpg │ ├── 15006076981310.jpg │ ├── 15006128417750.jpg │ ├── 15006129074175.jpg │ ├── 15006133599281.jpg │ ├── 15006141269345.jpg │ ├── 15006141799661.jpg │ ├── 150061504655.jpg │ ├── 15006151152050.jpg │ ├── 15006156047635.jpg │ ├── 15006167591111.jpg │ ├── 15006189588651.jpg │ └── 15006189987695.jpg │ ├── ARM-exploitation-for-IoT-–-Episode-1 │ ├── loader1.png │ ├── plt_got1.png │ ├── plt_got2.png │ ├── plt_got3.png │ ├── plt_got4.png │ ├── plt_got5.png │ ├── ptrace10.png │ ├── ptrace11.png │ ├── ptrace12.png │ ├── ptrace13.png │ ├── ptrace14.png │ ├── ptrace15.png │ ├── ptrace16.png │ ├── ptrace17.png │ ├── ptrace18.png │ ├── ptrace19.png │ ├── ptrace2.png │ ├── ptrace20.png │ ├── ptrace21.png │ ├── ptrace22.png │ ├── ptrace3.png │ ├── ptrace4.png │ ├── ptrace5.png │ ├── ptrace6.png │ ├── ptrace7.png │ ├── ptrace8.png │ ├── ptrace9.png │ └── ptrace1-1.png │ └── 五大顶级物联网安全公司的安全建设思路及产品 │ ├── 07f82818c4f98d1466f06626af3bc40c.png │ ├── 4c992bd0fbd0952eb58690962bc256f4.png │ ├── 8aef21fa529069a9cd33bfcfb7f721e3.png │ ├── 9e734aae5d9936496f0e8d4854cd8a3a.png │ ├── a614c1944053285a9664fcdc6f8a8922.png │ ├── b2087253694a41211cf4ba2195a036dd.png │ └── de8d530de3751d25ab9bfed2d17ccbf9.png ├── README ├── CNAME ├── fancybox ├── blank.gif ├── fancybox_sprite.png ├── fancybox_loading.gif ├── fancybox_overlay.png ├── fancybox_loading@2x.gif ├── fancybox_sprite@2x.png ├── helpers │ ├── fancybox_buttons.png │ ├── jquery.fancybox-thumbs.css │ ├── jquery.fancybox-buttons.css │ ├── jquery.fancybox-buttons.js │ ├── jquery.fancybox-thumbs.js │ └── jquery.fancybox-media.js └── jquery.fancybox.css ├── css ├── images │ ├── pose.jpg │ ├── favicon.ico │ └── rocket.png ├── fonts │ ├── FontAwesome.otf │ ├── athemes-glyphs.woff │ ├── fontawesome-webfont.eot │ ├── fontawesome-webfont.ttf │ └── fontawesome-webfont.woff ├── glyphs.css ├── comment.css └── vdonate.css ├── preview ├── Hiero_home.png ├── code-theme.jpg ├── logo-preview.jpg ├── browser-support.png ├── mobile-preview.png └── code-default-preview.png ├── js ├── totop.js ├── main.js ├── scripts.js ├── insight.js └── vdonate.js ├── about └── index.html ├── tags └── index.html ├── categories └── index.html ├── tools └── index.html ├── archives └── 2017 │ └── 11 │ └── index.html └── books └── index.html /README: -------------------------------------------------------------------------------- 1 | Test 2 | -------------------------------------------------------------------------------- /CNAME: -------------------------------------------------------------------------------- 1 | iot.sec-wiki.com -------------------------------------------------------------------------------- /fancybox/blank.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/fancybox/blank.gif -------------------------------------------------------------------------------- /css/images/pose.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/css/images/pose.jpg -------------------------------------------------------------------------------- /css/images/favicon.ico: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/css/images/favicon.ico -------------------------------------------------------------------------------- /css/images/rocket.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/css/images/rocket.png -------------------------------------------------------------------------------- /preview/Hiero_home.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/preview/Hiero_home.png -------------------------------------------------------------------------------- /preview/code-theme.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/preview/code-theme.jpg -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/0: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/0 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/1 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/10: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/10 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/11: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/11 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/12: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/12 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/13: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/13 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/14: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/14 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/15: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/15 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/16: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/16 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/17: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/17 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/18: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/18 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/19: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/19 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/2 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/20: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/20 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/21: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/21 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/3 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/4: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/4 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/5: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/5 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/6: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/6 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/7: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/7 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/8: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/8 -------------------------------------------------------------------------------- /2017/11/06/IoT设备通信安全讨论/9: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/06/IoT设备通信安全讨论/9 -------------------------------------------------------------------------------- /css/fonts/FontAwesome.otf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/css/fonts/FontAwesome.otf -------------------------------------------------------------------------------- /preview/logo-preview.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/preview/logo-preview.jpg -------------------------------------------------------------------------------- /fancybox/fancybox_sprite.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/fancybox/fancybox_sprite.png -------------------------------------------------------------------------------- /preview/browser-support.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/preview/browser-support.png -------------------------------------------------------------------------------- /preview/mobile-preview.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/preview/mobile-preview.png -------------------------------------------------------------------------------- /css/fonts/athemes-glyphs.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/css/fonts/athemes-glyphs.woff -------------------------------------------------------------------------------- /fancybox/fancybox_loading.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/fancybox/fancybox_loading.gif -------------------------------------------------------------------------------- /fancybox/fancybox_overlay.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/fancybox/fancybox_overlay.png -------------------------------------------------------------------------------- /css/fonts/fontawesome-webfont.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/css/fonts/fontawesome-webfont.eot -------------------------------------------------------------------------------- /css/fonts/fontawesome-webfont.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/css/fonts/fontawesome-webfont.ttf -------------------------------------------------------------------------------- /fancybox/fancybox_loading@2x.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/fancybox/fancybox_loading@2x.gif -------------------------------------------------------------------------------- /fancybox/fancybox_sprite@2x.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/fancybox/fancybox_sprite@2x.png -------------------------------------------------------------------------------- /preview/code-default-preview.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/preview/code-default-preview.png -------------------------------------------------------------------------------- /css/fonts/fontawesome-webfont.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/css/fonts/fontawesome-webfont.woff -------------------------------------------------------------------------------- /2017/09/27/Burglar-and-Hacker/Dos.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/Burglar-and-Hacker/Dos.png -------------------------------------------------------------------------------- /2017/09/27/Burglar-and-Hacker/ssrf.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/Burglar-and-Hacker/ssrf.png -------------------------------------------------------------------------------- /fancybox/helpers/fancybox_buttons.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/fancybox/helpers/fancybox_buttons.png -------------------------------------------------------------------------------- /2017/09/27/Burglar-and-Hacker/step1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/Burglar-and-Hacker/step1.png -------------------------------------------------------------------------------- /2017/09/27/Burglar-and-Hacker/step2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/Burglar-and-Hacker/step2.png -------------------------------------------------------------------------------- /2017/09/27/Burglar-and-Hacker/step3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/Burglar-and-Hacker/step3.png -------------------------------------------------------------------------------- /2017/09/27/Burglar-and-Hacker/GetIpuEnr.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/Burglar-and-Hacker/GetIpuEnr.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/1498205156636.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/1498205156636.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/1498205368844.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/1498205368844.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982054337685.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982054337685.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982055759845.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982055759845.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982056684523.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982056684523.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982057419858.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982057419858.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982057841064.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982057841064.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982058212617.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982058212617.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982058625887.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982058625887.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982059585240.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982059585240.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982060682879.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982060682879.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982061673331.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982061673331.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982062006814.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982062006814.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982062532734.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982062532734.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982063045813.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982063045813.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982063369557.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982063369557.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982063654436.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982063654436.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982063961678.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982063961678.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982064611821.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982064611821.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982065398438.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982065398438.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982066375651.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982066375651.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/1498206710357.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/1498206710357.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982067813666.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982067813666.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982068387713.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982068387713.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982068741928.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982068741928.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982068997405.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982068997405.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982069797635.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982069797635.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982070565118.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982070565118.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982071275093.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982071275093.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982071625103.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982071625103.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982072171339.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982072171339.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982072686950.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982072686950.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-一/14982072916043.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-一/14982072916043.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/14985524456992.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/14985524456992.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/14991609258091.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/14991609258091.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/14992257339133.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/14992257339133.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/14992258407750.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/14992258407750.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/14992360628857.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/14992360628857.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/14993318232847.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/14993318232847.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/1499332864463.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/1499332864463.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/14993804636878.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/14993804636878.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15005456292920.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15005456292920.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15005633108196.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15005633108196.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15005633147554.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15005633147554.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15005644893824.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15005644893824.png -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006012892796.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006012892796.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006018399438.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006018399438.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006023787213.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006023787213.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006027826284.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006027826284.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006075862795.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006075862795.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006076981310.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006076981310.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006128417750.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006128417750.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006129074175.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006129074175.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006133599281.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006133599281.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006141269345.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006141269345.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006141799661.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006141799661.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/150061504655.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/150061504655.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006151152050.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006151152050.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006156047635.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006156047635.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006167591111.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006167591111.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006189588651.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006189588651.jpg -------------------------------------------------------------------------------- /2017/09/27/路由器固件安全分析技术-二/15006189987695.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/路由器固件安全分析技术-二/15006189987695.jpg -------------------------------------------------------------------------------- /2017/09/27/Burglar-and-Hacker/12345_port.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/Burglar-and-Hacker/12345_port.png -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-2/0: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-2/0 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-2/1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-2/1 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-2/2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-2/2 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-2/3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-2/3 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-2/4: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-2/4 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-2/5: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-2/5 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/0: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/0 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/1 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/10: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/10 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/11: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/11 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/12: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/12 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/13: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/13 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/14: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/14 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/15: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/15 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/16: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/16 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/17: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/17 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/18: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/18 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/19: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/19 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/2 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/20: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/20 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/21: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/21 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/22: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/22 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/23: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/23 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/24: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/24 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/25: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/25 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/26: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/26 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/27: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/27 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/28: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/28 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/29: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/29 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/3 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/30: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/30 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/31: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/31 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/32: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/32 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/33: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/33 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/34: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/34 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/4: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/4 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/5: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/5 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/6: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/6 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/7: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/7 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/8: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/8 -------------------------------------------------------------------------------- /2017/11/10/ARM-exploitation-for-IoT-Episode-3/9: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/11/10/ARM-exploitation-for-IoT-Episode-3/9 -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/loader1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/loader1.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/plt_got1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/plt_got1.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/plt_got2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/plt_got2.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/plt_got3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/plt_got3.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/plt_got4.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/plt_got4.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/plt_got5.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/plt_got5.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace10.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace10.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace11.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace11.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace12.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace12.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace13.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace13.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace14.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace14.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace15.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace15.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace16.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace16.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace17.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace17.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace18.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace18.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace19.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace19.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace2.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace20.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace20.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace21.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace21.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace22.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace22.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace3.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace4.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace4.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace5.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace5.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace6.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace6.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace7.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace7.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace8.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace8.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace9.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace9.png -------------------------------------------------------------------------------- /2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace1-1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/ARM-exploitation-for-IoT-–-Episode-1/ptrace1-1.png -------------------------------------------------------------------------------- /2017/09/27/Burglar-and-Hacker/internal_iSmartAlarm_website.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/Burglar-and-Hacker/internal_iSmartAlarm_website.png -------------------------------------------------------------------------------- /2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/07f82818c4f98d1466f06626af3bc40c.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/07f82818c4f98d1466f06626af3bc40c.png -------------------------------------------------------------------------------- /2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/4c992bd0fbd0952eb58690962bc256f4.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/4c992bd0fbd0952eb58690962bc256f4.png -------------------------------------------------------------------------------- /2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/8aef21fa529069a9cd33bfcfb7f721e3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/8aef21fa529069a9cd33bfcfb7f721e3.png -------------------------------------------------------------------------------- /2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/9e734aae5d9936496f0e8d4854cd8a3a.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/9e734aae5d9936496f0e8d4854cd8a3a.png -------------------------------------------------------------------------------- /2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/a614c1944053285a9664fcdc6f8a8922.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/a614c1944053285a9664fcdc6f8a8922.png -------------------------------------------------------------------------------- /2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/b2087253694a41211cf4ba2195a036dd.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/b2087253694a41211cf4ba2195a036dd.png -------------------------------------------------------------------------------- /2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/de8d530de3751d25ab9bfed2d17ccbf9.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SecWiki/iot/HEAD/2017/09/27/五大顶级物联网安全公司的安全建设思路及产品/de8d530de3751d25ab9bfed2d17ccbf9.png -------------------------------------------------------------------------------- /js/totop.js: -------------------------------------------------------------------------------- 1 | $(window).scroll(function() { 2 | $(window).scrollTop() > $(window).height()*0.5 ? $("#rocket").addClass("show") : $("#rocket").removeClass("show"); 3 | }); 4 | 5 | $("#rocket").click(function() { 6 | $("#rocket").addClass("launch"); 7 | $("html, body").animate({ 8 | scrollTop: 0 9 | }, 1000, function() { 10 | $("#rocket").removeClass("show launch"); 11 | }); 12 | return false; 13 | }); 14 | 15 | $("#homelogo").click(function() { 16 | $("html, body").animate({ 17 | scrollTop: $(window).height() 18 | }, 1000, null); 19 | return false; 20 | }); -------------------------------------------------------------------------------- /fancybox/helpers/jquery.fancybox-thumbs.css: -------------------------------------------------------------------------------- 1 | #fancybox-thumbs { 2 | position: fixed; 3 | left: 0; 4 | width: 100%; 5 | overflow: hidden; 6 | z-index: 8050; 7 | } 8 | 9 | #fancybox-thumbs.bottom { 10 | bottom: 2px; 11 | } 12 | 13 | #fancybox-thumbs.top { 14 | top: 2px; 15 | } 16 | 17 | #fancybox-thumbs ul { 18 | position: relative; 19 | list-style: none; 20 | margin: 0; 21 | padding: 0; 22 | } 23 | 24 | #fancybox-thumbs ul li { 25 | float: left; 26 | padding: 1px; 27 | opacity: 0.5; 28 | } 29 | 30 | #fancybox-thumbs ul li.active { 31 | opacity: 0.75; 32 | padding: 0; 33 | border: 1px solid #fff; 34 | } 35 | 36 | #fancybox-thumbs ul li:hover { 37 | opacity: 1; 38 | } 39 | 40 | #fancybox-thumbs ul li a { 41 | display: block; 42 | position: relative; 43 | overflow: hidden; 44 | border: 1px solid #222; 45 | background: #111; 46 | outline: none; 47 | } 48 | 49 | #fancybox-thumbs ul li img { 50 | display: block; 51 | position: relative; 52 | border: 0; 53 | padding: 0; 54 | max-width: none; 55 | } -------------------------------------------------------------------------------- /js/main.js: -------------------------------------------------------------------------------- 1 | (function(){ 2 | 3 | // Highlight current nav item 4 | var hasCurrent = false; 5 | 6 | //把相对路径解析成绝对路径 7 | function absolute(href) { 8 | var link = document.createElement("a"); 9 | link.href = href; 10 | return (link.protocol+"//"+link.host+link.pathname+link.search+link.hash); 11 | } 12 | 13 | //移出所有的菜单的选中样式 14 | $('#main-nav > li').each(function(){ 15 | $(this).removeClass('current-menu-item current_page_item'); 16 | }); 17 | var links = $('#main-nav > li > a'); 18 | var urls = window.location.href; 19 | //为什么要从后面往前面遍历?因为首页极有可能是https://xxxxx/, 20 | //这样的话肯定能够匹配所有的项 21 | for (var i = links.length; i >= 0; i--) { 22 | if(urls.indexOf(absolute(links[i])) != -1){ 23 | $(links[i]).parent().addClass('current-menu-item current_page_item'); 24 | //为什么还要设置hasCurrent?因为不排除首页是 25 | //https://xxxx/index.html格式的 26 | hasCurrent = true; 27 | break; 28 | } 29 | } 30 | 31 | 32 | if (!hasCurrent) { 33 | $('#main-nav > li:first').addClass('current-menu-item current_page_item'); 34 | } 35 | })(); 36 | 37 | 38 | 39 | // article toc 40 | var toc = document.getElementById('toc') 41 | 42 | if (toc != null) { 43 | window.addEventListener("scroll", scrollcatelogHandler); 44 | var tocPosition = 194+25; 45 | 46 | function scrollcatelogHandler(e) { 47 | var event = e || window.event, 48 | target = event.target || event.srcElement; 49 | var scrollTop = document.documentElement.scrollTop || document.body.scrollTop; 50 | if (scrollTop > tocPosition) { 51 | toc.classList.add("toc-fixed"); 52 | } else { 53 | toc.classList.remove("toc-fixed"); 54 | } 55 | } 56 | } 57 | 58 | 59 | $('#main-navigation').on('click', function(){ 60 | if ($('#main-navigation').hasClass('main-navigation-open')){ 61 | $('#main-navigation').removeClass('main-navigation-open'); 62 | } else { 63 | $('#main-navigation').addClass('main-navigation-open'); 64 | } 65 | }); 66 | 67 | $('#content').on('click', function(){ 68 | if ($('#main-navigation').hasClass('main-navigation-open')){ 69 | $('#main-navigation').removeClass('main-navigation-open'); 70 | } 71 | }); -------------------------------------------------------------------------------- /css/glyphs.css: -------------------------------------------------------------------------------- 1 | @font-face { 2 | font-family: 'athemes-glyphs'; 3 | src: url('fonts/athemes-glyphs.eot?48303859'); 4 | src: url('fonts/athemes-glyphs.eot?48303859#iefix') format('embedded-opentype'), 5 | url('fonts/athemes-glyphs.woff?48303859') format('woff'), 6 | url('fonts/athemes-glyphs.ttf?48303859') format('truetype'), 7 | url('fonts/athemes-glyphs.svg?48303859#athemes-glyphs') format('svg'); 8 | font-weight: normal; 9 | font-style: normal; 10 | } 11 | 12 | /* Chrome hack: SVG is rendered more smooth in Windozze. 100% magic, uncomment if you need it. */ 13 | /* Note, that will break hinting! In other OS-es font will be not as sharp as it could be */ 14 | /* 15 | @media screen and (-webkit-min-device-pixel-ratio:0) { 16 | @font-face { 17 | font-family: 'athemes-glyphs'; 18 | src: url('../fonts/athemes-glyphs.svg?48303859#athemes-glyphs') format('svg'); 19 | } 20 | } 21 | */ 22 | 23 | [class^="ico-"]:before, [class*=" ico-"]:before, 24 | [class^="fa-"]:before, [class*=" fa-"]:before { 25 | font-family: "athemes-glyphs"; 26 | font-family: 'FontAwesome'; 27 | font-style: normal; 28 | font-weight: normal; 29 | speak: none; 30 | 31 | display: inline-block; 32 | text-decoration: inherit; 33 | width: 1em; 34 | margin-right: .2em; 35 | text-align: center; 36 | /* opacity: .8; */ 37 | 38 | /* For safety - reset parent styles, that can break glyph codes*/ 39 | font-variant: normal; 40 | text-transform: none; 41 | 42 | /* fix buttons height, for twitter bootstrap */ 43 | line-height: 1em; 44 | 45 | /* Animation center compensation - margins should be symmetric */ 46 | /* remove if not needed */ 47 | margin-left: 0em; 48 | 49 | /* you can be more comfortable with increased icons size */ 50 | /* font-size: 120%; */ 51 | 52 | /* Uncomment for 3D effect */ 53 | /* text-shadow: 1px 1px 1px rgba(127, 127, 127, 0.3); */ 54 | } 55 | 56 | .ico-youtube:before { content: '\e810'; } /* '' */ 57 | .ico-chat:before { content: '\e813'; } /* '' */ 58 | .ico-left-open:before { content: '\e812'; } /* '' */ 59 | .ico-right-open:before { content: '\e811'; } /* '' */ 60 | .ico-flickr:before { content: '\e802'; } /* '' */ 61 | .ico-vimeo:before { content: '\e803'; } /* '' */ 62 | .ico-twitter:before { content: '\e804'; } /* '' */ 63 | .ico-facebook:before { content: '\e805'; } /* '' */ 64 | .ico-gplus:before { content: '\e806'; } /* '' */ 65 | .ico-pinterest:before { content: '\e807'; } /* '' */ 66 | .ico-tumblr:before { content: '\e808'; } /* '' */ 67 | .ico-linkedin:before { content: '\e809'; } /* '' */ 68 | .ico-dribbble:before { content: '\e80a'; } /* '' */ 69 | .ico-lastfm:before { content: '\e80b'; } /* '' */ 70 | .ico-spotify:before { content: '\e80e'; } /* '' */ 71 | .ico-instagram:before { content: '\e80c'; } /* '' */ 72 | .ico-skype:before { content: '\e80d'; } /* '' */ 73 | .ico-soundcloud:before { content: '\e80f'; } /* '' */ -------------------------------------------------------------------------------- /fancybox/helpers/jquery.fancybox-buttons.css: -------------------------------------------------------------------------------- 1 | #fancybox-buttons { 2 | position: fixed; 3 | left: 0; 4 | width: 100%; 5 | z-index: 8050; 6 | } 7 | 8 | #fancybox-buttons.top { 9 | top: 10px; 10 | } 11 | 12 | #fancybox-buttons.bottom { 13 | bottom: 10px; 14 | } 15 | 16 | #fancybox-buttons ul { 17 | display: block; 18 | width: 166px; 19 | height: 30px; 20 | margin: 0 auto; 21 | padding: 0; 22 | list-style: none; 23 | border: 1px solid #111; 24 | border-radius: 3px; 25 | -webkit-box-shadow: inset 0 0 0 1px rgba(255,255,255,.05); 26 | -moz-box-shadow: inset 0 0 0 1px rgba(255,255,255,.05); 27 | box-shadow: inset 0 0 0 1px rgba(255,255,255,.05); 28 | background: rgb(50,50,50); 29 | background: -moz-linear-gradient(top, rgb(68,68,68) 0%, rgb(52,52,52) 50%, rgb(41,41,41) 50%, rgb(51,51,51) 100%); 30 | background: -webkit-gradient(linear, left top, left bottom, color-stop(0%,rgb(68,68,68)), color-stop(50%,rgb(52,52,52)), color-stop(50%,rgb(41,41,41)), color-stop(100%,rgb(51,51,51))); 31 | background: -webkit-linear-gradient(top, rgb(68,68,68) 0%,rgb(52,52,52) 50%,rgb(41,41,41) 50%,rgb(51,51,51) 100%); 32 | background: -o-linear-gradient(top, rgb(68,68,68) 0%,rgb(52,52,52) 50%,rgb(41,41,41) 50%,rgb(51,51,51) 100%); 33 | background: -ms-linear-gradient(top, rgb(68,68,68) 0%,rgb(52,52,52) 50%,rgb(41,41,41) 50%,rgb(51,51,51) 100%); 34 | background: linear-gradient(top, rgb(68,68,68) 0%,rgb(52,52,52) 50%,rgb(41,41,41) 50%,rgb(51,51,51) 100%); 35 | filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#444444', endColorstr='#222222',GradientType=0 ); 36 | } 37 | 38 | #fancybox-buttons ul li { 39 | float: left; 40 | margin: 0; 41 | padding: 0; 42 | } 43 | 44 | #fancybox-buttons a { 45 | display: block; 46 | width: 30px; 47 | height: 30px; 48 | text-indent: -9999px; 49 | background-color: transparent; 50 | background-image: url('fancybox_buttons.png'); 51 | background-repeat: no-repeat; 52 | outline: none; 53 | opacity: 0.8; 54 | } 55 | 56 | #fancybox-buttons a:hover { 57 | opacity: 1; 58 | } 59 | 60 | #fancybox-buttons a.btnPrev { 61 | background-position: 5px 0; 62 | } 63 | 64 | #fancybox-buttons a.btnNext { 65 | background-position: -33px 0; 66 | border-right: 1px solid #3e3e3e; 67 | } 68 | 69 | #fancybox-buttons a.btnPlay { 70 | background-position: 0 -30px; 71 | } 72 | 73 | #fancybox-buttons a.btnPlayOn { 74 | background-position: -30px -30px; 75 | } 76 | 77 | #fancybox-buttons a.btnToggle { 78 | background-position: 3px -60px; 79 | border-left: 1px solid #111; 80 | border-right: 1px solid #3e3e3e; 81 | width: 35px 82 | } 83 | 84 | #fancybox-buttons a.btnToggleOn { 85 | background-position: -27px -60px; 86 | } 87 | 88 | #fancybox-buttons a.btnClose { 89 | border-left: 1px solid #111; 90 | width: 35px; 91 | background-position: -56px 0px; 92 | } 93 | 94 | #fancybox-buttons a.btnDisabled { 95 | opacity : 0.4; 96 | cursor: default; 97 | } -------------------------------------------------------------------------------- /css/comment.css: -------------------------------------------------------------------------------- 1 | 2 | /*头像旋转*/ 3 | #ds-reset .ds-avatar{background:none !important; box-shadow:none !important;} 4 | 5 | #ds-reset .ds-avatar img , #ds-thread #ds-reset ul.ds-children .ds-avatar img{width:30px !important;height: 30px !important;border-radius: 30px;-webkit-transition: .8s;-moz-transition: .8s;-o-transition: .8s;-ms-transition: .8s;padding:3px;background: #fff;} 6 | 7 | .ds-post:hover .ds-avatar img{transform:rotate(720deg);-webkit-transform:rotate(720deg);-moz-transform:rotate(720deg);-o-transform:rotate(720deg);-ms-transform:rotate(720deg);border-radius:30px !important;} 8 | 9 | #ds-reset .ds-avatar img:hover{transform:rotate(720deg);-webkit-transform:rotate(720deg);-moz-transform:rotate(720deg);-o-transform:rotate(720deg);-ms-transform:rotate(720deg);border-radius:30px !important;} 10 | 11 | #ds-thread #ds-reset .ds-comment-body, #ds-thread #ds-reset ul.ds-children .ds-comment-body{padding-left:70px !important;} 12 | 13 | #ds-thread #ds-reset .ds-comment-body, #ds-thread #ds-reset ul.ds-children .ds-comment-body{padding-left:70px !important;} 14 | 15 | .ds-post:hover{background:transparent !important;} 16 | 17 | #ds-thread #ds-reset ul.ds-children .ds-avatar{width:50px !important;} 18 | 19 | #ds-thread #ds-reset .ds-replybox{padding: 0 0 0 80px !important;} 20 | 21 | #ds-reset #ds-ctx .ds-ctx-entry .ds-ctx-body{margin-left: 68px !important;} 22 | 23 | #ds-recent-comments li.ds-comment:nth-of-type(1){border:none !important;} 24 | 25 | 26 | /* 隐藏 */ 27 | .ds-sync {display:none !important;} 28 | 29 | .ds-meta {display:none !important;} 30 | 31 | .ds-comments-info {display:none !important;} 32 | 33 | .ds-replybox .ds-avatar{display: none !important;} 34 | 35 | .ds-icons-32{display: none !important;} 36 | 37 | 38 | /*隐藏评论总数背景及边框*/ 39 | #ds-thread #ds-reset .ds-textarea-wrapper{border: none;background: #fcfcfc;} 40 | 41 | #ds-thread #ds-reset li.ds-post{border-top: none;} 42 | 43 | #ds-thread #ds-reset .ds-comments, #ds-thread #ds-reset .ds-paginator{border-bottom: none;} 44 | 45 | 46 | /*隐藏多说底部版权*/ 47 | #ds-thread #ds-reset .ds-powered-by{display:none;} 48 | 49 | #ds-thread #ds-reset .ds-textarea-wrapper{border: none;background: #fcfcfc;} 50 | 51 | #ds-thread #ds-reset .ds-post-self{border-bottom: 1px dotted #f2f2f2;} 52 | 53 | #ds-thread #ds-reset .ds-post-options{border: none;} 54 | 55 | #ds-thread{padding-top: 80px;padding-bottom: 80px;} 56 | 57 | #ds-thread #ds-reset .ds-replybox{padding: 0 !important;} 58 | 59 | 60 | .ds-post-likes {display: none !important;} 61 | 62 | .ds-post-repost{display: none !important;} 63 | 64 | .ds-post-report{display: none !important;} 65 | 66 | 67 | .ds-icon-reply{display: none !important;} 68 | 69 | 70 | #ds-thread #ds-reset a.ds-user-name[data-user-id='bpplpp']:after { 71 | content: "博主"; 72 | margin-left: 6px; 73 | font-size: 12px; 74 | color: #13BF20; 75 | background: rgba(255, 255, 255, .35); 76 | border-radius: 4px; 77 | padding: 0 3px; 78 | } 79 | 80 | 81 | #ds-thread #ds-reset .ds-replybox {background: #fafafa;padding: 0 !important;} 82 | 83 | #ds-thread #ds-reset .ds-post-button {background: #16171b;} 84 | #ds-thread #ds-reset .ds-post-button:hover {background: #ff2828;} 85 | -------------------------------------------------------------------------------- /css/vdonate.css: -------------------------------------------------------------------------------- 1 | #donation_div{ 2 | text-align: center; 3 | } 4 | 5 | #donation_div a { 6 | color: #fff; 7 | font-size: 1.2em; 8 | text-decoration: none; 9 | } 10 | 11 | #donate-modal-container { 12 | display: none; 13 | height: 100%; 14 | width: 100%; 15 | top: 0; 16 | left: 0; 17 | z-index: 999; 18 | transform: scale(0) 19 | } 20 | 21 | #donate-modal-container.active { 22 | display: table; 23 | transform: scale(1) 24 | } 25 | 26 | #donate-modal-container.active .donate-modal-background { 27 | background: rgba(0,0,0,.05) 28 | } 29 | 30 | #donate-modal-container.active .donate-modal-background .donate-modal { 31 | animation: blowUpModal .5s cubic-bezier(.165,.84,.44,1) forwards 32 | } 33 | 34 | #donate-modal-container .donate-quote { 35 | padding: 0; 36 | margin: 0 37 | } 38 | 39 | #donate-modal-container .donate-quote-left { 40 | display: inline-block; 41 | vertical-align: text-bottom; 42 | width: 32px; 43 | height: 32px; 44 | background: url("https://ooo.0o0.ooo/2017/03/09/58c158afac35c.png") 45 | } 46 | 47 | #donate-modal-container .donate-quote-word { 48 | font-size: 1.2em; 49 | color: #bbb; 50 | } 51 | 52 | #donate-modal-container .donate-quote-right { 53 | display: inline-block; 54 | vertical-align: text-bottom; 55 | width: 32px; 56 | height: 32px; 57 | background: url("https://ooo.0o0.ooo/2017/03/09/58c1584d5fd9d.png") 58 | } 59 | 60 | #donate-modal-container .donate-tab { 61 | margin-top: 20px; 62 | font-size: 0 63 | } 64 | 65 | #donate-modal-container .donate-tab a { 66 | display: inline-block; 67 | padding: 10px 0; 68 | width: 120px; 69 | font-size: 16px; 70 | text-decoration: none; 71 | color: #333; 72 | background-color: #eee; 73 | transition: all .3s 74 | } 75 | 76 | #donate-modal-container .donate-tab .donate-wechat.active { 77 | background-color: #44b549; 78 | color: #fff 79 | } 80 | 81 | #donate-modal-container .donate-tab .donate-alipay.active { 82 | background-color: #059AE3; 83 | color: #fff 84 | } 85 | 86 | #donate-modal-container .donate-image { 87 | display: none; 88 | max-width: 300px; 89 | margin: 20px auto 90 | } 91 | 92 | #donate-modal-container .donate-image.active { 93 | display: block 94 | } 95 | 96 | #donate-modal-container .donate-modal-background { 97 | display: table-cell; 98 | background: transparent; 99 | text-align: center; 100 | vertical-align: middle 101 | } 102 | 103 | #donate-modal-container .donate-modal-background .donate-modal { 104 | display: inline-block; 105 | position: relative; 106 | box-sizing: border-box; 107 | background: #fff; 108 | width: 100%; 109 | padding: 50px; 110 | border-radius: 3px; 111 | font-weight: 300 112 | } 113 | 114 | .donate-btn { 115 | display: inline-block; 116 | padding: 8px 16px; 117 | border-radius: 5px; 118 | background-color: #44b549; 119 | color: #fff; 120 | text-decoration: none; 121 | margin: 20px 0; 122 | transition: all .3s 123 | } 124 | 125 | .donate-btn:hover { 126 | opacity: .8 127 | } 128 | 129 | .donate-btn .donate-qrcode { 130 | display: inline-block; 131 | margin-right: 5px; 132 | vertical-align: -0.2em; 133 | width: 16px; 134 | height: 16px; 135 | background: url("https://ooo.0o0.ooo/2017/03/09/58c16b1f3eaa4.png") no-repeat 136 | } 137 | 138 | @keyframes blowUpModal { 139 | 0% { 140 | transform: scale(0) 141 | } 142 | 143 | 100% { 144 | transform: scale(1) 145 | } 146 | } 147 | 148 | @media (max-width:768px) { 149 | #donate-modal-container .donate-modal-background .donate-modal { 150 | padding: 20px; 151 | width: 100% 152 | } 153 | 154 | #donate-modal-container .donate-modal-background .donate-image { 155 | width: 100% 156 | } 157 | } -------------------------------------------------------------------------------- /fancybox/helpers/jquery.fancybox-buttons.js: -------------------------------------------------------------------------------- 1 | /*! 2 | * Buttons helper for fancyBox 3 | * version: 1.0.5 (Mon, 15 Oct 2012) 4 | * @requires fancyBox v2.0 or later 5 | * 6 | * Usage: 7 | * $(".fancybox").fancybox({ 8 | * helpers : { 9 | * buttons: { 10 | * position : 'top' 11 | * } 12 | * } 13 | * }); 14 | * 15 | */ 16 | ;(function ($) { 17 | //Shortcut for fancyBox object 18 | var F = $.fancybox; 19 | 20 | //Add helper object 21 | F.helpers.buttons = { 22 | defaults : { 23 | skipSingle : false, // disables if gallery contains single image 24 | position : 'top', // 'top' or 'bottom' 25 | tpl : '
' 26 | }, 27 | 28 | list : null, 29 | buttons: null, 30 | 31 | beforeLoad: function (opts, obj) { 32 | //Remove self if gallery do not have at least two items 33 | 34 | if (opts.skipSingle && obj.group.length < 2) { 35 | obj.helpers.buttons = false; 36 | obj.closeBtn = true; 37 | 38 | return; 39 | } 40 | 41 | //Increase top margin to give space for buttons 42 | obj.margin[ opts.position === 'bottom' ? 2 : 0 ] += 30; 43 | }, 44 | 45 | onPlayStart: function () { 46 | if (this.buttons) { 47 | this.buttons.play.attr('title', 'Pause slideshow').addClass('btnPlayOn'); 48 | } 49 | }, 50 | 51 | onPlayEnd: function () { 52 | if (this.buttons) { 53 | this.buttons.play.attr('title', 'Start slideshow').removeClass('btnPlayOn'); 54 | } 55 | }, 56 | 57 | afterShow: function (opts, obj) { 58 | var buttons = this.buttons; 59 | 60 | if (!buttons) { 61 | this.list = $(opts.tpl).addClass(opts.position).appendTo('body'); 62 | 63 | buttons = { 64 | prev : this.list.find('.btnPrev').click( F.prev ), 65 | next : this.list.find('.btnNext').click( F.next ), 66 | play : this.list.find('.btnPlay').click( F.play ), 67 | toggle : this.list.find('.btnToggle').click( F.toggle ), 68 | close : this.list.find('.btnClose').click( F.close ) 69 | } 70 | } 71 | 72 | //Prev 73 | if (obj.index > 0 || obj.loop) { 74 | buttons.prev.removeClass('btnDisabled'); 75 | } else { 76 | buttons.prev.addClass('btnDisabled'); 77 | } 78 | 79 | //Next / Play 80 | if (obj.loop || obj.index < obj.group.length - 1) { 81 | buttons.next.removeClass('btnDisabled'); 82 | buttons.play.removeClass('btnDisabled'); 83 | 84 | } else { 85 | buttons.next.addClass('btnDisabled'); 86 | buttons.play.addClass('btnDisabled'); 87 | } 88 | 89 | this.buttons = buttons; 90 | 91 | this.onUpdate(opts, obj); 92 | }, 93 | 94 | onUpdate: function (opts, obj) { 95 | var toggle; 96 | 97 | if (!this.buttons) { 98 | return; 99 | } 100 | 101 | toggle = this.buttons.toggle.removeClass('btnDisabled btnToggleOn'); 102 | 103 | //Size toggle button 104 | if (obj.canShrink) { 105 | toggle.addClass('btnToggleOn'); 106 | 107 | } else if (!obj.canExpand) { 108 | toggle.addClass('btnDisabled'); 109 | } 110 | }, 111 | 112 | beforeClose: function () { 113 | if (this.list) { 114 | this.list.remove(); 115 | } 116 | 117 | this.list = null; 118 | this.buttons = null; 119 | } 120 | }; 121 | 122 | }(jQuery)); 123 | -------------------------------------------------------------------------------- /fancybox/helpers/jquery.fancybox-thumbs.js: -------------------------------------------------------------------------------- 1 | /*! 2 | * Thumbnail helper for fancyBox 3 | * version: 1.0.7 (Mon, 01 Oct 2012) 4 | * @requires fancyBox v2.0 or later 5 | * 6 | * Usage: 7 | * $(".fancybox").fancybox({ 8 | * helpers : { 9 | * thumbs: { 10 | * width : 50, 11 | * height : 50 12 | * } 13 | * } 14 | * }); 15 | * 16 | */ 17 | ;(function ($) { 18 | //Shortcut for fancyBox object 19 | var F = $.fancybox; 20 | 21 | //Add helper object 22 | F.helpers.thumbs = { 23 | defaults : { 24 | width : 50, // thumbnail width 25 | height : 50, // thumbnail height 26 | position : 'bottom', // 'top' or 'bottom' 27 | source : function ( item ) { // function to obtain the URL of the thumbnail image 28 | var href; 29 | 30 | if (item.element) { 31 | href = $(item.element).find('img').attr('src'); 32 | } 33 | 34 | if (!href && item.type === 'image' && item.href) { 35 | href = item.href; 36 | } 37 | 38 | return href; 39 | } 40 | }, 41 | 42 | wrap : null, 43 | list : null, 44 | width : 0, 45 | 46 | init: function (opts, obj) { 47 | var that = this, 48 | list, 49 | thumbWidth = opts.width, 50 | thumbHeight = opts.height, 51 | thumbSource = opts.source; 52 | 53 | //Build list structure 54 | list = ''; 55 | 56 | for (var n = 0; n < obj.group.length; n++) { 57 | list += '
  • '; 58 | } 59 | 60 | this.wrap = $('
    ').addClass(opts.position).appendTo('body'); 61 | this.list = $('').appendTo(this.wrap); 62 | 63 | //Load each thumbnail 64 | $.each(obj.group, function (i) { 65 | var el = obj.group[ i ], 66 | href = thumbSource( el ); 67 | 68 | if (!href) { 69 | return; 70 | } 71 | 72 | $("").load(function () { 73 | var width = this.width, 74 | height = this.height, 75 | widthRatio, heightRatio, parent; 76 | 77 | if (!that.list || !width || !height) { 78 | return; 79 | } 80 | 81 | //Calculate thumbnail width/height and center it 82 | widthRatio = width / thumbWidth; 83 | heightRatio = height / thumbHeight; 84 | 85 | parent = that.list.children().eq(i).find('a'); 86 | 87 | if (widthRatio >= 1 && heightRatio >= 1) { 88 | if (widthRatio > heightRatio) { 89 | width = Math.floor(width / heightRatio); 90 | height = thumbHeight; 91 | 92 | } else { 93 | width = thumbWidth; 94 | height = Math.floor(height / widthRatio); 95 | } 96 | } 97 | 98 | $(this).css({ 99 | width : width, 100 | height : height, 101 | top : Math.floor(thumbHeight / 2 - height / 2), 102 | left : Math.floor(thumbWidth / 2 - width / 2) 103 | }); 104 | 105 | parent.width(thumbWidth).height(thumbHeight); 106 | 107 | $(this).hide().appendTo(parent).fadeIn(300); 108 | 109 | }) 110 | .attr('src', href) 111 | .attr('title', el.title); 112 | }); 113 | 114 | //Set initial width 115 | this.width = this.list.children().eq(0).outerWidth(true); 116 | 117 | this.list.width(this.width * (obj.group.length + 1)).css('left', Math.floor($(window).width() * 0.5 - (obj.index * this.width + this.width * 0.5))); 118 | }, 119 | 120 | beforeLoad: function (opts, obj) { 121 | //Remove self if gallery do not have at least two items 122 | if (obj.group.length < 2) { 123 | obj.helpers.thumbs = false; 124 | 125 | return; 126 | } 127 | 128 | //Increase bottom margin to give space for thumbs 129 | obj.margin[ opts.position === 'top' ? 0 : 2 ] += ((opts.height) + 15); 130 | }, 131 | 132 | afterShow: function (opts, obj) { 133 | //Check if exists and create or update list 134 | if (this.list) { 135 | this.onUpdate(opts, obj); 136 | 137 | } else { 138 | this.init(opts, obj); 139 | } 140 | 141 | //Set active element 142 | this.list.children().removeClass('active').eq(obj.index).addClass('active'); 143 | }, 144 | 145 | //Center list 146 | onUpdate: function (opts, obj) { 147 | if (this.list) { 148 | this.list.stop(true).animate({ 149 | 'left': Math.floor($(window).width() * 0.5 - (obj.index * this.width + this.width * 0.5)) 150 | }, 150); 151 | } 152 | }, 153 | 154 | beforeClose: function () { 155 | if (this.wrap) { 156 | this.wrap.remove(); 157 | } 158 | 159 | this.wrap = null; 160 | this.list = null; 161 | this.width = 0; 162 | } 163 | } 164 | 165 | }(jQuery)); -------------------------------------------------------------------------------- /js/scripts.js: -------------------------------------------------------------------------------- 1 | (function($){ 2 | // Search 3 | var $searchWrap = $('#search-form-wrap'), 4 | isSearchAnim = false, 5 | searchAnimDuration = 200; 6 | 7 | var startSearchAnim = function(){ 8 | isSearchAnim = true; 9 | }; 10 | 11 | var stopSearchAnim = function(callback){ 12 | setTimeout(function(){ 13 | isSearchAnim = false; 14 | callback && callback(); 15 | }, searchAnimDuration); 16 | }; 17 | 18 | var s = [ 19 | '
    ', 20 | '', 21 | '
    ' 22 | ].join(''); 23 | 24 | var di = $(s); 25 | 26 | $('#container').append(di); 27 | 28 | $('#nav-search-btn').on('click', function(){ 29 | if (isSearchAnim) return; 30 | 31 | startSearchAnim(); 32 | $searchWrap.addClass('on'); 33 | stopSearchAnim(function(){ 34 | $('.search-form-input').focus(); 35 | }); 36 | }); 37 | 38 | $('.search-form-input').on('blur', function(){ 39 | startSearchAnim(); 40 | $searchWrap.removeClass('on'); 41 | stopSearchAnim(); 42 | }); 43 | 44 | // Share 45 | $('body').on('click', function(){ 46 | $('.article-share-box.on').removeClass('on'); 47 | }).on('click', '.article-share-link', function(e){ 48 | e.stopPropagation(); 49 | 50 | var $this = $(this), 51 | url = $this.attr('data-url'), 52 | encodedUrl = encodeURIComponent(url), 53 | id = 'article-share-box-' + $this.attr('data-id'), 54 | offset = $this.offset(); 55 | 56 | if ($('#' + id).length){ 57 | var box = $('#' + id); 58 | 59 | if (box.hasClass('on')){ 60 | box.removeClass('on'); 61 | return; 62 | } 63 | } else { 64 | var html = [ 65 | '
    ', 66 | '', 67 | '
    ', 68 | '', 69 | '', 70 | '', 71 | '', 72 | '
    ', 73 | '
    ' 74 | ].join(''); 75 | 76 | var box = $(html); 77 | 78 | $('body').append(box); 79 | } 80 | 81 | $('.article-share-box.on').hide(); 82 | 83 | box.css({ 84 | top: offset.top + 25, 85 | left: offset.left 86 | }).addClass('on'); 87 | }).on('click', '.article-share-box', function(e){ 88 | e.stopPropagation(); 89 | }).on('click', '.article-share-box-input', function(){ 90 | $(this).select(); 91 | }).on('click', '.article-share-box-link', function(e){ 92 | e.preventDefault(); 93 | e.stopPropagation(); 94 | 95 | window.open(this.href, 'article-share-box-window-' + Date.now(), 'width=500,height=450'); 96 | }); 97 | 98 | // Caption 99 | $('.article-entry').each(function(i){ 100 | $(this).find('img').each(function(){ 101 | if ($(this).parent().hasClass('fancybox')) return; 102 | if ($(this).parent().parent().hasClass('entry-thumbnail')) return; 103 | 104 | var alt = this.alt; 105 | 106 | if (alt) $(this).after('' + alt + ''); 107 | 108 | $(this).wrap(''); 109 | }); 110 | 111 | $(this).find('.fancybox').each(function(){ 112 | $(this).attr('rel', 'article' + i); 113 | }); 114 | }); 115 | 116 | if ($.fancybox){ 117 | $('.fancybox').fancybox(); 118 | } 119 | 120 | // Mobile nav 121 | var $container = $('#container'), 122 | isMobileNavAnim = false, 123 | mobileNavAnimDuration = 200; 124 | 125 | var startMobileNavAnim = function(){ 126 | isMobileNavAnim = true; 127 | }; 128 | 129 | var stopMobileNavAnim = function(){ 130 | setTimeout(function(){ 131 | isMobileNavAnim = false; 132 | }, mobileNavAnimDuration); 133 | } 134 | 135 | $('#main-nav-toggle').on('click', function(){ 136 | if (isMobileNavAnim) return; 137 | 138 | startMobileNavAnim(); 139 | $container.toggleClass('mobile-nav-on'); 140 | stopMobileNavAnim(); 141 | }); 142 | 143 | $('#wrap').on('click', function(){ 144 | if (isMobileNavAnim || !$container.hasClass('mobile-nav-on')) return; 145 | 146 | $container.removeClass('mobile-nav-on'); 147 | }); 148 | })(jQuery); -------------------------------------------------------------------------------- /fancybox/jquery.fancybox.css: -------------------------------------------------------------------------------- 1 | /*! fancyBox v2.1.5 fancyapps.com | fancyapps.com/fancybox/#license */ 2 | .fancybox-wrap, 3 | .fancybox-skin, 4 | .fancybox-outer, 5 | .fancybox-inner, 6 | .fancybox-image, 7 | .fancybox-wrap iframe, 8 | .fancybox-wrap object, 9 | .fancybox-nav, 10 | .fancybox-nav span, 11 | .fancybox-tmp 12 | { 13 | padding: 0; 14 | margin: 0; 15 | border: 0; 16 | outline: none; 17 | vertical-align: top; 18 | } 19 | 20 | .fancybox-wrap { 21 | position: absolute; 22 | top: 0; 23 | left: 0; 24 | z-index: 8020; 25 | } 26 | 27 | .fancybox-skin { 28 | position: relative; 29 | background: #f9f9f9; 30 | color: #444; 31 | text-shadow: none; 32 | -webkit-border-radius: 4px; 33 | -moz-border-radius: 4px; 34 | border-radius: 4px; 35 | } 36 | 37 | .fancybox-opened { 38 | z-index: 8030; 39 | } 40 | 41 | .fancybox-opened .fancybox-skin { 42 | -webkit-box-shadow: 0 10px 25px rgba(0, 0, 0, 0.5); 43 | -moz-box-shadow: 0 10px 25px rgba(0, 0, 0, 0.5); 44 | box-shadow: 0 10px 25px rgba(0, 0, 0, 0.5); 45 | } 46 | 47 | .fancybox-outer, .fancybox-inner { 48 | position: relative; 49 | } 50 | 51 | .fancybox-inner { 52 | overflow: hidden; 53 | } 54 | 55 | .fancybox-type-iframe .fancybox-inner { 56 | -webkit-overflow-scrolling: touch; 57 | } 58 | 59 | .fancybox-error { 60 | color: #444; 61 | font: 14px/20px "Helvetica Neue",Helvetica,Arial,sans-serif; 62 | margin: 0; 63 | padding: 15px; 64 | white-space: nowrap; 65 | } 66 | 67 | .fancybox-image, .fancybox-iframe { 68 | display: block; 69 | width: 100%; 70 | height: 100%; 71 | } 72 | 73 | .fancybox-image { 74 | max-width: 100%; 75 | max-height: 100%; 76 | } 77 | 78 | #fancybox-loading, .fancybox-close, .fancybox-prev span, .fancybox-next span { 79 | background-image: url(fancybox_sprite.png); 80 | } 81 | 82 | #fancybox-loading { 83 | position: fixed; 84 | top: 50%; 85 | left: 50%; 86 | margin-top: -22px; 87 | margin-left: -22px; 88 | background-position: 0 -108px; 89 | opacity: 0.8; 90 | cursor: pointer; 91 | z-index: 8060; 92 | } 93 | 94 | #fancybox-loading div { 95 | width: 44px; 96 | height: 44px; 97 | background: url(fancybox_loading.gif) center center no-repeat; 98 | } 99 | 100 | .fancybox-close { 101 | position: absolute; 102 | top: -18px; 103 | right: -18px; 104 | width: 36px; 105 | height: 36px; 106 | cursor: pointer; 107 | z-index: 8040; 108 | } 109 | 110 | .fancybox-nav { 111 | position: absolute; 112 | top: 0; 113 | width: 40%; 114 | height: 100%; 115 | cursor: pointer; 116 | text-decoration: none; 117 | background: transparent url(blank.gif); /* helps IE */ 118 | -webkit-tap-highlight-color: rgba(0,0,0,0); 119 | z-index: 8040; 120 | } 121 | 122 | .fancybox-prev { 123 | left: 0; 124 | } 125 | 126 | .fancybox-next { 127 | right: 0; 128 | } 129 | 130 | .fancybox-nav span { 131 | position: absolute; 132 | top: 50%; 133 | width: 36px; 134 | height: 34px; 135 | margin-top: -18px; 136 | cursor: pointer; 137 | z-index: 8040; 138 | visibility: hidden; 139 | } 140 | 141 | .fancybox-prev span { 142 | left: 10px; 143 | background-position: 0 -36px; 144 | } 145 | 146 | .fancybox-next span { 147 | right: 10px; 148 | background-position: 0 -72px; 149 | } 150 | 151 | .fancybox-nav:hover span { 152 | visibility: visible; 153 | } 154 | 155 | .fancybox-tmp { 156 | position: absolute; 157 | top: -99999px; 158 | left: -99999px; 159 | max-width: 99999px; 160 | max-height: 99999px; 161 | overflow: visible !important; 162 | } 163 | 164 | /* Overlay helper */ 165 | 166 | .fancybox-lock { 167 | overflow: visible !important; 168 | width: auto; 169 | } 170 | 171 | .fancybox-lock body { 172 | overflow: hidden !important; 173 | } 174 | 175 | .fancybox-lock-test { 176 | overflow-y: hidden !important; 177 | } 178 | 179 | .fancybox-overlay { 180 | position: absolute; 181 | top: 0; 182 | left: 0; 183 | overflow: hidden; 184 | display: none; 185 | z-index: 8010; 186 | background: url(fancybox_overlay.png); 187 | } 188 | 189 | .fancybox-overlay-fixed { 190 | position: fixed; 191 | bottom: 0; 192 | right: 0; 193 | } 194 | 195 | .fancybox-lock .fancybox-overlay { 196 | overflow: auto; 197 | overflow-y: scroll; 198 | } 199 | 200 | /* Title helper */ 201 | 202 | .fancybox-title { 203 | visibility: hidden; 204 | font: normal 13px/20px "Helvetica Neue",Helvetica,Arial,sans-serif; 205 | position: relative; 206 | text-shadow: none; 207 | z-index: 8050; 208 | } 209 | 210 | .fancybox-opened .fancybox-title { 211 | visibility: visible; 212 | } 213 | 214 | .fancybox-title-float-wrap { 215 | position: absolute; 216 | bottom: 0; 217 | right: 50%; 218 | margin-bottom: -35px; 219 | z-index: 8050; 220 | text-align: center; 221 | } 222 | 223 | .fancybox-title-float-wrap .child { 224 | display: inline-block; 225 | margin-right: -100%; 226 | padding: 2px 20px; 227 | background: transparent; /* Fallback for web browsers that doesn't support RGBa */ 228 | background: rgba(0, 0, 0, 0.8); 229 | -webkit-border-radius: 15px; 230 | -moz-border-radius: 15px; 231 | border-radius: 15px; 232 | text-shadow: 0 1px 2px #222; 233 | color: #FFF; 234 | font-weight: bold; 235 | line-height: 24px; 236 | white-space: nowrap; 237 | } 238 | 239 | .fancybox-title-outside-wrap { 240 | position: relative; 241 | margin-top: 10px; 242 | color: #fff; 243 | } 244 | 245 | .fancybox-title-inside-wrap { 246 | padding-top: 10px; 247 | } 248 | 249 | .fancybox-title-over-wrap { 250 | position: absolute; 251 | bottom: 0; 252 | left: 0; 253 | color: #fff; 254 | padding: 10px; 255 | background: #000; 256 | background: rgba(0, 0, 0, .8); 257 | } 258 | 259 | /*Retina graphics!*/ 260 | @media only screen and (-webkit-min-device-pixel-ratio: 1.5), 261 | only screen and (min--moz-device-pixel-ratio: 1.5), 262 | only screen and (min-device-pixel-ratio: 1.5){ 263 | 264 | #fancybox-loading, .fancybox-close, .fancybox-prev span, .fancybox-next span { 265 | background-image: url(fancybox_sprite@2x.png); 266 | background-size: 44px 152px; /*The size of the normal image, half the size of the hi-res image*/ 267 | } 268 | 269 | #fancybox-loading div { 270 | background-image: url(fancybox_loading@2x.gif); 271 | background-size: 24px 24px; /*The size of the normal image, half the size of the hi-res image*/ 272 | } 273 | } -------------------------------------------------------------------------------- /fancybox/helpers/jquery.fancybox-media.js: -------------------------------------------------------------------------------- 1 | /*! 2 | * Media helper for fancyBox 3 | * version: 1.0.6 (Fri, 14 Jun 2013) 4 | * @requires fancyBox v2.0 or later 5 | * 6 | * Usage: 7 | * $(".fancybox").fancybox({ 8 | * helpers : { 9 | * media: true 10 | * } 11 | * }); 12 | * 13 | * Set custom URL parameters: 14 | * $(".fancybox").fancybox({ 15 | * helpers : { 16 | * media: { 17 | * youtube : { 18 | * params : { 19 | * autoplay : 0 20 | * } 21 | * } 22 | * } 23 | * } 24 | * }); 25 | * 26 | * Or: 27 | * $(".fancybox").fancybox({, 28 | * helpers : { 29 | * media: true 30 | * }, 31 | * youtube : { 32 | * autoplay: 0 33 | * } 34 | * }); 35 | * 36 | * Supports: 37 | * 38 | * Youtube 39 | * http://www.youtube.com/watch?v=opj24KnzrWo 40 | * http://www.youtube.com/embed/opj24KnzrWo 41 | * http://youtu.be/opj24KnzrWo 42 | * http://www.youtube-nocookie.com/embed/opj24KnzrWo 43 | * Vimeo 44 | * http://vimeo.com/40648169 45 | * http://vimeo.com/channels/staffpicks/38843628 46 | * http://vimeo.com/groups/surrealism/videos/36516384 47 | * http://player.vimeo.com/video/45074303 48 | * Metacafe 49 | * http://www.metacafe.com/watch/7635964/dr_seuss_the_lorax_movie_trailer/ 50 | * http://www.metacafe.com/watch/7635964/ 51 | * Dailymotion 52 | * http://www.dailymotion.com/video/xoytqh_dr-seuss-the-lorax-premiere_people 53 | * Twitvid 54 | * http://twitvid.com/QY7MD 55 | * Twitpic 56 | * http://twitpic.com/7p93st 57 | * Instagram 58 | * http://instagr.am/p/IejkuUGxQn/ 59 | * http://instagram.com/p/IejkuUGxQn/ 60 | * Google maps 61 | * http://maps.google.com/maps?q=Eiffel+Tower,+Avenue+Gustave+Eiffel,+Paris,+France&t=h&z=17 62 | * http://maps.google.com/?ll=48.857995,2.294297&spn=0.007666,0.021136&t=m&z=16 63 | * http://maps.google.com/?ll=48.859463,2.292626&spn=0.000965,0.002642&t=m&z=19&layer=c&cbll=48.859524,2.292532&panoid=YJ0lq28OOy3VT2IqIuVY0g&cbp=12,151.58,,0,-15.56 64 | */ 65 | ;(function ($) { 66 | "use strict"; 67 | 68 | //Shortcut for fancyBox object 69 | var F = $.fancybox, 70 | format = function( url, rez, params ) { 71 | params = params || ''; 72 | 73 | if ( $.type( params ) === "object" ) { 74 | params = $.param(params, true); 75 | } 76 | 77 | $.each(rez, function(key, value) { 78 | url = url.replace( '$' + key, value || '' ); 79 | }); 80 | 81 | if (params.length) { 82 | url += ( url.indexOf('?') > 0 ? '&' : '?' ) + params; 83 | } 84 | 85 | return url; 86 | }; 87 | 88 | //Add helper object 89 | F.helpers.media = { 90 | defaults : { 91 | youtube : { 92 | matcher : /(youtube\.com|youtu\.be|youtube-nocookie\.com)\/(watch\?v=|v\/|u\/|embed\/?)?(videoseries\?list=(.*)|[\w-]{11}|\?listType=(.*)&list=(.*)).*/i, 93 | params : { 94 | autoplay : 1, 95 | autohide : 1, 96 | fs : 1, 97 | rel : 0, 98 | hd : 1, 99 | wmode : 'opaque', 100 | enablejsapi : 1 101 | }, 102 | type : 'iframe', 103 | url : '//www.youtube.com/embed/$3' 104 | }, 105 | vimeo : { 106 | matcher : /(?:vimeo(?:pro)?.com)\/(?:[^\d]+)?(\d+)(?:.*)/, 107 | params : { 108 | autoplay : 1, 109 | hd : 1, 110 | show_title : 1, 111 | show_byline : 1, 112 | show_portrait : 0, 113 | fullscreen : 1 114 | }, 115 | type : 'iframe', 116 | url : '//player.vimeo.com/video/$1' 117 | }, 118 | metacafe : { 119 | matcher : /metacafe.com\/(?:watch|fplayer)\/([\w\-]{1,10})/, 120 | params : { 121 | autoPlay : 'yes' 122 | }, 123 | type : 'swf', 124 | url : function( rez, params, obj ) { 125 | obj.swf.flashVars = 'playerVars=' + $.param( params, true ); 126 | 127 | return '//www.metacafe.com/fplayer/' + rez[1] + '/.swf'; 128 | } 129 | }, 130 | dailymotion : { 131 | matcher : /dailymotion.com\/video\/(.*)\/?(.*)/, 132 | params : { 133 | additionalInfos : 0, 134 | autoStart : 1 135 | }, 136 | type : 'swf', 137 | url : '//www.dailymotion.com/swf/video/$1' 138 | }, 139 | twitvid : { 140 | matcher : /twitvid\.com\/([a-zA-Z0-9_\-\?\=]+)/i, 141 | params : { 142 | autoplay : 0 143 | }, 144 | type : 'iframe', 145 | url : '//www.twitvid.com/embed.php?guid=$1' 146 | }, 147 | twitpic : { 148 | matcher : /twitpic\.com\/(?!(?:place|photos|events)\/)([a-zA-Z0-9\?\=\-]+)/i, 149 | type : 'image', 150 | url : '//twitpic.com/show/full/$1/' 151 | }, 152 | instagram : { 153 | matcher : /(instagr\.am|instagram\.com)\/p\/([a-zA-Z0-9_\-]+)\/?/i, 154 | type : 'image', 155 | url : '//$1/p/$2/media/?size=l' 156 | }, 157 | google_maps : { 158 | matcher : /maps\.google\.([a-z]{2,3}(\.[a-z]{2})?)\/(\?ll=|maps\?)(.*)/i, 159 | type : 'iframe', 160 | url : function( rez ) { 161 | return '//maps.google.' + rez[1] + '/' + rez[3] + '' + rez[4] + '&output=' + (rez[4].indexOf('layer=c') > 0 ? 'svembed' : 'embed'); 162 | } 163 | } 164 | }, 165 | 166 | beforeLoad : function(opts, obj) { 167 | var url = obj.href || '', 168 | type = false, 169 | what, 170 | item, 171 | rez, 172 | params; 173 | 174 | for (what in opts) { 175 | if (opts.hasOwnProperty(what)) { 176 | item = opts[ what ]; 177 | rez = url.match( item.matcher ); 178 | 179 | if (rez) { 180 | type = item.type; 181 | params = $.extend(true, {}, item.params, obj[ what ] || ($.isPlainObject(opts[ what ]) ? opts[ what ].params : null)); 182 | 183 | url = $.type( item.url ) === "function" ? item.url.call( this, rez, params, obj ) : format( item.url, rez, params ); 184 | 185 | break; 186 | } 187 | } 188 | } 189 | 190 | if (type) { 191 | obj.href = url; 192 | obj.type = type; 193 | 194 | obj.autoHeight = false; 195 | } 196 | } 197 | }; 198 | 199 | }(jQuery)); -------------------------------------------------------------------------------- /js/insight.js: -------------------------------------------------------------------------------- 1 | /** 2 | * Insight search plugin 3 | * @author PPOffice { @link https://github.com/ppoffice } 4 | */ 5 | (function ($, CONFIG) { 6 | var $main = $('.ins-search'); 7 | var $input = $main.find('.ins-search-input'); 8 | var $wrapper = $main.find('.ins-section-wrapper'); 9 | var $container = $main.find('.ins-section-container'); 10 | $main.parent().remove('.ins-search'); 11 | $('body').append($main); 12 | 13 | function section (title) { 14 | return $('
    ').addClass('ins-section') 15 | .append($('
    ').addClass('ins-section-header').text(title)); 16 | } 17 | 18 | function searchItem (icon, title, slug, preview, url) { 19 | return $('
    ').addClass('ins-selectable').addClass('ins-search-item') 20 | .append($('
    ').append($('').addClass('fa').addClass('fa-' + icon)).append(title != null && title != '' ? title : CONFIG.TRANSLATION['UNTITLED']) 21 | .append(slug ? $('').addClass('ins-slug').text(slug) : null)) 22 | .append(preview ? $('

    ').addClass('ins-search-preview').text(preview) : null) 23 | .attr('data-url', url); 24 | } 25 | 26 | function sectionFactory (type, array) { 27 | var sectionTitle; 28 | var $searchItems; 29 | if (array.length === 0) return null; 30 | sectionTitle = CONFIG.TRANSLATION[type]; 31 | switch (type) { 32 | case 'POSTS': 33 | case 'PAGES': 34 | $searchItems = array.map(function (item) { 35 | // Use config.root instead of permalink to fix url issue 36 | return searchItem('file', item.title, null, item.text.slice(0, 150), CONFIG.ROOT_URL + item.path); 37 | }); 38 | break; 39 | case 'CATEGORIES': 40 | case 'TAGS': 41 | $searchItems = array.map(function (item) { 42 | return searchItem(type === 'CATEGORIES' ? 'folder' : 'tag', item.name, item.slug, null, item.permalink); 43 | }); 44 | break; 45 | default: 46 | return null; 47 | } 48 | return section(sectionTitle).append($searchItems); 49 | } 50 | 51 | function extractToSet (json, key) { 52 | var values = {}; 53 | var entries = json.pages.concat(json.posts); 54 | entries.forEach(function (entry) { 55 | if (entry[key]) { 56 | entry[key].forEach(function (value) { 57 | values[value.name] = value; 58 | }); 59 | } 60 | }); 61 | var result = []; 62 | for (var key in values) { 63 | result.push(values[key]); 64 | } 65 | return result; 66 | } 67 | 68 | function parseKeywords (keywords) { 69 | return keywords.split(' ').filter(function (keyword) { 70 | return !!keyword; 71 | }).map(function (keyword) { 72 | return keyword.toUpperCase(); 73 | }); 74 | } 75 | 76 | /** 77 | * Judge if a given post/page/category/tag contains all of the keywords. 78 | * @param Object obj Object to be weighted 79 | * @param Array fields Object's fields to find matches 80 | */ 81 | function filter (keywords, obj, fields) { 82 | var result = false; 83 | var keywordArray = parseKeywords(keywords); 84 | var containKeywords = keywordArray.filter(function (keyword) { 85 | var containFields = fields.filter(function (field) { 86 | if (!obj.hasOwnProperty(field)) 87 | return false; 88 | if (obj[field].toUpperCase().indexOf(keyword) > -1) 89 | return true; 90 | }); 91 | if (containFields.length > 0) 92 | return true; 93 | return false; 94 | }); 95 | return containKeywords.length === keywordArray.length; 96 | } 97 | 98 | function filterFactory (keywords) { 99 | return { 100 | POST: function (obj) { 101 | return filter(keywords, obj, ['title', 'text']); 102 | }, 103 | PAGE: function (obj) { 104 | return filter(keywords, obj, ['title', 'text']); 105 | }, 106 | CATEGORY: function (obj) { 107 | return filter(keywords, obj, ['name', 'slug']); 108 | }, 109 | TAG: function (obj) { 110 | return filter(keywords, obj, ['name', 'slug']); 111 | } 112 | }; 113 | } 114 | 115 | /** 116 | * Calculate the weight of a matched post/page/category/tag. 117 | * @param Object obj Object to be weighted 118 | * @param Array fields Object's fields to find matches 119 | * @param Array weights Weight of every field 120 | */ 121 | function weight (keywords, obj, fields, weights) { 122 | var value = 0; 123 | parseKeywords(keywords).forEach(function (keyword) { 124 | var pattern = new RegExp(keyword, 'img'); // Global, Multi-line, Case-insensitive 125 | fields.forEach(function (field, index) { 126 | if (obj.hasOwnProperty(field)) { 127 | var matches = obj[field].match(pattern); 128 | value += matches ? matches.length * weights[index] : 0; 129 | } 130 | }); 131 | }); 132 | return value; 133 | } 134 | 135 | function weightFactory (keywords) { 136 | return { 137 | POST: function (obj) { 138 | return weight(keywords, obj, ['title', 'text'], [3, 1]); 139 | }, 140 | PAGE: function (obj) { 141 | return weight(keywords, obj, ['title', 'text'], [3, 1]); 142 | }, 143 | CATEGORY: function (obj) { 144 | return weight(keywords, obj, ['name', 'slug'], [1, 1]); 145 | }, 146 | TAG: function (obj) { 147 | return weight(keywords, obj, ['name', 'slug'], [1, 1]); 148 | } 149 | }; 150 | } 151 | 152 | function search (json, keywords) { 153 | var WEIGHTS = weightFactory(keywords); 154 | var FILTERS = filterFactory(keywords); 155 | var posts = json.posts; 156 | var pages = json.pages; 157 | var tags = extractToSet(json, 'tags'); 158 | var categories = extractToSet(json, 'categories'); 159 | return { 160 | posts: posts.filter(FILTERS.POST).sort(function (a, b) { return WEIGHTS.POST(b) - WEIGHTS.POST(a); }).slice(0, 5), 161 | pages: pages.filter(FILTERS.PAGE).sort(function (a, b) { return WEIGHTS.PAGE(b) - WEIGHTS.PAGE(a); }).slice(0, 5), 162 | categories: categories.filter(FILTERS.CATEGORY).sort(function (a, b) { return WEIGHTS.CATEGORY(b) - WEIGHTS.CATEGORY(a); }).slice(0, 5), 163 | tags: tags.filter(FILTERS.TAG).sort(function (a, b) { return WEIGHTS.TAG(b) - WEIGHTS.TAG(a); }).slice(0, 5) 164 | }; 165 | } 166 | 167 | function searchResultToDOM (searchResult) { 168 | $container.empty(); 169 | for (var key in searchResult) { 170 | $container.append(sectionFactory(key.toUpperCase(), searchResult[key])); 171 | } 172 | } 173 | 174 | function scrollTo ($item) { 175 | if ($item.length === 0) return; 176 | var wrapperHeight = $wrapper[0].clientHeight; 177 | var itemTop = $item.position().top - $wrapper.scrollTop(); 178 | var itemBottom = $item[0].clientHeight + $item.position().top; 179 | if (itemBottom > wrapperHeight + $wrapper.scrollTop()) { 180 | $wrapper.scrollTop(itemBottom - $wrapper[0].clientHeight); 181 | } 182 | if (itemTop < 0) { 183 | $wrapper.scrollTop($item.position().top); 184 | } 185 | } 186 | 187 | function selectItemByDiff (value) { 188 | var $items = $.makeArray($container.find('.ins-selectable')); 189 | var prevPosition = -1; 190 | $items.forEach(function (item, index) { 191 | if ($(item).hasClass('active')) { 192 | prevPosition = index; 193 | return; 194 | } 195 | }); 196 | var nextPosition = ($items.length + prevPosition + value) % $items.length; 197 | $($items[prevPosition]).removeClass('active'); 198 | $($items[nextPosition]).addClass('active'); 199 | scrollTo($($items[nextPosition])); 200 | } 201 | 202 | function gotoLink ($item) { 203 | if ($item && $item.length) { 204 | location.href = $item.attr('data-url'); 205 | } 206 | } 207 | 208 | $.getJSON(CONFIG.CONTENT_URL, function (json) { 209 | if (location.hash.trim() === '#ins-search') { 210 | $main.addClass('show'); 211 | } 212 | $input.on('input', function () { 213 | var keywords = $(this).val(); 214 | searchResultToDOM(search(json, keywords)); 215 | }); 216 | $input.trigger('input'); 217 | }); 218 | 219 | 220 | $(document).on('click focus', '.search-field', function () { 221 | $main.addClass('show'); 222 | $main.find('.ins-search-input').focus(); 223 | }).on('click focus', '.search-form-submit', function () { 224 | $main.addClass('show'); 225 | $main.find('.ins-search-input').focus(); 226 | }).on('click', '.ins-search-item', function () { 227 | gotoLink($(this)); 228 | }).on('click', '.ins-close', function () { 229 | $main.removeClass('show'); 230 | }).on('keydown', function (e) { 231 | if (!$main.hasClass('show')) return; 232 | switch (e.keyCode) { 233 | case 27: // ESC 234 | $main.removeClass('show'); break; 235 | case 38: // UP 236 | selectItemByDiff(-1); break; 237 | case 40: // DOWN 238 | selectItemByDiff(1); break; 239 | case 13: //ENTER 240 | gotoLink($container.find('.ins-selectable.active').eq(0)); break; 241 | } 242 | }); 243 | })(jQuery, window.INSIGHT_CONFIG); -------------------------------------------------------------------------------- /about/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 关于 | 物联网安全技术研究 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 64 | 65 | 66 | 67 | 68 | 69 |

    106 | 107 | 108 |
    109 |
    110 | 111 |
    112 | 113 |
    114 |
    115 | 116 | 117 |
    118 | 119 | 120 |

    121 | about 122 |

    123 | 124 | 125 |
    126 | 127 | 135 |
    136 | 137 | 138 | 139 |
    140 |
    141 | 142 | 143 | 144 | 145 | 146 |
    147 |
    148 | 149 | 150 | 151 |
    152 | 153 | 154 |
    155 | 334 | 335 |
    336 |
    337 | 338 | 339 |
    340 |
    341 | © 2017 物联网安全技术研究 All Rights Reserved. 342 | 343 | 344 | 本站访客数人次 345 | 本站总访问量次 346 | 347 | 348 |
    349 |
    350 | Theme by hiero 351 |
    352 |
    353 |
    354 | 355 | 356 | 357 | 358 | 363 |
    364 | 375 | 376 | 377 | 378 | 379 | 387 | 388 | 395 | 396 | 404 | 405 | 407 | 408 | 409 | 410 | 411 | 412 | 413 | 414 | 415 | 416 | 417 | 418 | 419 | 420 | 421 | 422 | 423 |
    424 | 425 |
    426 | 427 | 428 | 429 | 431 | 432 | 433 | 434 | 435 | 436 | 437 |
    438 | 439 | 440 | 441 | 442 | 443 | -------------------------------------------------------------------------------- /tags/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 标签 | 物联网安全技术研究 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 64 | 65 | 66 | 67 | 68 | 69 | 106 | 107 | 108 |
    109 |
    110 | 111 |
    112 | 113 |
    114 |
    115 | 116 | 117 |
    118 | 119 | 120 |

    121 | tags 122 |

    123 | 124 | 125 |
    126 | 127 | 139 |
    140 | 141 | 142 | 143 |
    144 |
    145 | 146 | 147 | 148 | 149 | 150 |
    151 |
    152 | 153 | 154 | 155 |
    156 | 157 | 158 |
    159 | 338 | 339 |
    340 |
    341 | 342 | 343 |
    344 |
    345 | © 2017 物联网安全技术研究 All Rights Reserved. 346 | 347 | 348 | 本站访客数人次 349 | 本站总访问量次 350 | 351 | 352 |
    353 |
    354 | Theme by hiero 355 |
    356 |
    357 |
    358 | 359 | 360 | 361 | 362 | 367 |
    368 | 379 | 380 | 381 | 382 | 383 | 391 | 392 | 399 | 400 | 408 | 409 | 411 | 412 | 413 | 414 | 415 | 416 | 417 | 418 | 419 | 420 | 421 | 422 | 423 | 424 | 425 | 426 | 427 |
    428 | 429 |
    430 | 431 | 432 | 433 | 435 | 436 | 437 | 438 | 439 | 440 | 441 |
    442 | 443 | 444 | 445 | 446 | 447 | -------------------------------------------------------------------------------- /categories/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 分类 | 物联网安全技术研究 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 64 | 65 | 66 | 67 | 68 | 69 | 106 | 107 | 108 |
    109 |
    110 | 111 |
    112 | 113 |
    114 |
    115 | 116 | 117 |
    118 | 119 | 120 |

    121 | categories 122 |

    123 | 124 | 125 |
    126 | 127 | 139 |
    140 | 141 | 142 | 143 |
    144 |
    145 | 146 | 147 | 148 | 149 | 150 |
    151 |
    152 | 153 | 154 | 155 |
    156 | 157 | 158 |
    159 | 338 | 339 |
    340 |
    341 | 342 | 343 |
    344 |
    345 | © 2017 物联网安全技术研究 All Rights Reserved. 346 | 347 | 348 | 本站访客数人次 349 | 本站总访问量次 350 | 351 | 352 |
    353 |
    354 | Theme by hiero 355 |
    356 |
    357 |
    358 | 359 | 360 | 361 | 362 | 367 |
    368 | 379 | 380 | 381 | 382 | 383 | 391 | 392 | 399 | 400 | 408 | 409 | 411 | 412 | 413 | 414 | 415 | 416 | 417 | 418 | 419 | 420 | 421 | 422 | 423 | 424 | 425 | 426 | 427 |
    428 | 429 |
    430 | 431 | 432 | 433 | 435 | 436 | 437 | 438 | 439 | 440 | 441 |
    442 | 443 | 444 | 445 | 446 | 447 | -------------------------------------------------------------------------------- /2017/09/27/Burglar-and-Hacker/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | burglar and hacker | 物联网安全技术研究 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 73 | 74 | 75 | 76 | 77 | 78 | 115 | 116 | 117 |
    118 |
    119 | 120 |
    121 | 122 |
    123 |
    124 | 125 | 126 |
    127 | 128 | 129 |

    130 | Burglar and Hacker 131 |

    132 | 133 | 134 |
    135 | 136 | 148 |
    149 | 150 |

    本文对iSmartAlarm厂商的iSmartAlarm Cube产品相关的五个漏洞做了演示。

    151 |

    原文链接:http://dojo.bullguard.com/blog/burglar-hacker-when-a-physical-security-is-compromised-by-iot-vulnerabilities/

    152 |

    关于文中实验的说明:由于编辑人员时间和资源的限制,暂时没有实际验证。如果后续有条件的话,会实际验证一下。
    关于翻译的说明:遣词造句的功夫还欠缺火候,如有错误,烦请指出。

    153 |

    背景介绍

    物联网是下一个趋势。数字化和可接入互联网的设备正在组成和构建一种新的网络和生态系统。据Gartner介绍,到2020年,将有208亿个物联网设备连接到世界各地。这些设备几乎可以随时随地用于家庭,汽车和可穿戴设备。随着市场的增长,网络威胁也在增加。每一个接入网络的设备都容易受到一些可能导致设备损坏和窃取隐私信息的攻击。许多研究表明,安全和隐私是消费者采用IoT设备进入日常生活的首要关注点。Dojo发现iSmartAlarm有多重漏洞,容易成为攻击目标。一旦攻击者渗透到家庭/商业网络并找到这样的设备,他们就能够完全控制这些设备。至于控制这些设备有什么危害,则不必多言了。本文打算详细介绍iSmartAlarm的漏洞细节及其影响。

    154 |

    概览

    iSmartAlarm有多个能够导致设备被完全控制的漏洞。未授权的攻击者能够通过一些手段彻底破坏设备的功能,还有完整性和可靠性,从而长久地取得对iSmartAlarm设备的控制权限。例如,攻击者可以访问整个iSmartAlarm客户群,其用户的私人数据,用户的家庭地址,报警撤防以及“欢迎来到我的家庭标志”。

    155 |

    相关CVE总结:
    |————-|——|———————————-|—————-|
    |CVE-2017-7726|Remote|Missing SSL Certificate Validation|iSmartAlarm Cube|
    |CVE-2017-7727|Remote|Server Side Request Forgery |iSmartAlarm |
    |CVE-2017-7728|Remote|Authentication Bypass |iSmartAlarm Cube|
    |CVE-2017-7729|Remote|Incorrect Access Control |iSmartAlarm Cube|
    |CVE-2017-7730|Remote|Denial of Service |iSmartAlarm Cube|

    156 |

    前言

    作为网络安全研究员,我真的想测试接入互联网报警系统,看看我能从中得到什么。研究过程中,我选择了iSmartAlarm厂商的产品,它占有很大的市场份额,还收到不少好评。iSmartAlarm收到的好评

    157 |

    iSmartAlarm是智能报警系统领域的领先的IoT制造商之一。它提供了一个完整的报警系统,由报警器、监察相机、锁构成。它除了具备常见的报警系统所具有的功能,还有网络设备必要的功能:可以通过app弹出警报和远程操控设备。很合适的研究对象。

    158 |

    SSL Certificate Validation Vulnerability

    在搭建好实验环境,设备和程序正常运行之后,我找到了第一个漏洞。iSmartAlarm cube的证书校验漏洞。在设备开始运行的时候,iSmartAlarm cube会首先和运行在iSmartAlarm服务器上、监听端口为8443的程序建立连接。然而,cube在SSL握手阶段并不校验来自服务端的SSL证书的真伪。因此,在伪造的自签证书后,可以看到和控制来往的数据。

    159 |

    SSRF

    iSmartAlarm的一个API包含重定向,这导致我尝试利用它。

    令人惊讶的是它能正常执行!这是一个好的开始,但这不能满足我,我想控制任何人的报警系统。在检查iSmartAlarm的API时,我能够获取加密密钥。

    160 |

    Denial of service vulnerability

    我想看看app和cube的通信过程,并找出是否可以在没有app的情况下远程控制报警系统。iSmartAlarm的app有两种模式。一种模式是cube和app在局域网中。另一种模式是当它们在不同的网络上时。当两者处于局域网中,能够嗅探到cube和app之间的加密流量,cube监听了12345端口。

    161 |

    因为cube和app通过局域网直接进行通信,所以我能够对cube进行Dos攻击,让它无法为正常用户提供服务。

    在对cube进行DoS攻击的时候,不论app是运行在远程模式或者本地模式,正常用户将会失去对报警系统的控制权。

    162 |

    Authentication Bypass and Incorrect Access Control

    分析协议花费了一些时间,这超出了本文的范围,但最终cube和app之间的协议如下所示:
    首先app和cube通过复杂的4次握手进行身份验证:
    App:ISAT\x01\x003\x01\x007

    163 |

    Cube:ISAT\x02\x003\x01\x003\x10\x00*3 + “Cube generated Secret Key”

    164 |

    加密算法:app利用Ipu(在SSRF小节处获得的密钥)和接收到的”Cube generated Secret Key”来做运算,从而获得一个新的密钥。iSmartAlarm使用XXTEA加密算法(尽管它们的实现被破解)。之后,反转XXTEA加密算法的输出就可以得到新的密钥:”new key”。所以一旦我们有Ipu,我们可以让alarm来做任何我们想要的事情。加密密钥”new key”的创建如下所示:
    reverse(xxtea_encrypt(reversed(“secret_key”), reversed(“IPU_key”)))
    该操作的结果作为最终的密钥,对发往cube的命令做签名。
    接下来app发送如下数据继续身份验证过程:
    App:ISAT\x03\x003\x01\x003\x10\x00*3 + “new key”

    165 |

    Cube:ISAT\x04\x003\x01\x003\x01\x003\x01
    这会导致iSmartAlarm Cube的第三和第四个漏洞:
    Authentication Bypass and Incorrect Access Control
    使用新创建的密钥,我们现在可以发送任何我们想要的命令到cube - disarm,arm或者panic。 166 |
    DISARM ISATP\x003\x01\x003\x03\x003\x01\x002
    ARM ISATP\x003\x01\x003\x03\x003\x01\x000 167 | PANIC ISATP\x003\x01\x003\x03\x003\x01\x003

    168 |

    我决定深入研究应用程序,希望我能发现一些东西。幸运的是,我发现这个:

    169 |

    看起来是登陆iSmartAlarm某个内部网站。这是非常令人不安,所以我尝试了…
    (原文后面还有一些关于上报厂商的说明,我就没有罗列出来了)

    170 | 171 | 172 |
    173 |
    174 | 175 | 176 | 177 | 178 | 179 |
    180 |
    181 | 182 | 183 | 196 | 197 | 198 |
    199 | 200 | 201 |
    202 | 203 |
    204 |
    205 | 206 | 207 |
    208 |
    209 | © 2017 物联网安全技术研究 All Rights Reserved. 210 | 211 | 212 | 本站访客数人次 213 | 本站总访问量次 214 | 215 | 216 |
    217 |
    218 | Theme by hiero 219 |
    220 |
    221 |
    222 | 223 | 224 | 225 | 226 | 231 |
    232 | 243 | 244 | 245 | 246 | 247 | 255 | 256 | 263 | 264 | 272 | 273 | 275 | 276 | 277 | 278 | 279 | 280 | 281 | 282 | 283 | 284 | 285 | 286 | 287 | 288 | 289 | 290 | 291 |
    292 | 293 |
    294 | 295 | 296 | 297 | 299 | 300 | 301 | 302 | 303 | 304 | 305 |
    306 | 307 | 308 | 309 | 310 | 311 | -------------------------------------------------------------------------------- /js/vdonate.js: -------------------------------------------------------------------------------- 1 | ! function (t, e) { 2 | "object" == typeof exports && "object" == typeof module ? module.exports = e() : "function" == typeof define && define.amd ? define("Donate", [], e) : "object" == typeof exports ? exports.Donate = e() : t.Donate = e() 3 | }(this, function () { 4 | return function (t) { 5 | function e(o) { 6 | if (n[o]) return n[o].exports; 7 | var a = n[o] = { 8 | i: o, 9 | l: !1, 10 | exports: {} 11 | }; 12 | return t[o].call(a.exports, a, a.exports, e), a.l = !0, a.exports 13 | } 14 | var n = {}; 15 | return e.m = t, e.c = n, e.i = function (t) { 16 | return t 17 | }, e.d = function (t, n, o) { 18 | e.o(t, n) || Object.defineProperty(t, n, { 19 | configurable: !1, 20 | enumerable: !0, 21 | get: o 22 | }) 23 | }, e.n = function (t) { 24 | var n = t && t.__esModule ? function () { 25 | return t.default 26 | } : function () { 27 | return t 28 | }; 29 | return e.d(n, "a", n), n 30 | }, e.o = function (t, e) { 31 | return Object.prototype.hasOwnProperty.call(t, e) 32 | }, e.p = "./", e(e.s = 5) 33 | }([ 34 | function (t, e, n) { 35 | function o(t, e) { 36 | if (!(t instanceof e)) throw new TypeError("Cannot call a class as a function") 37 | } 38 | var a = "function" == typeof Symbol && "symbol" == typeof Symbol.iterator ? function (t) { 39 | return typeof t 40 | } : function (t) { 41 | return t && "function" == typeof Symbol && t.constructor === Symbol && t !== Symbol.prototype ? "symbol" : typeof t 42 | }, 43 | i = function () { 44 | function t(t, e) { 45 | for (var n = 0; n < e.length; n++) { 46 | var o = e[n]; 47 | o.enumerable = o.enumerable || !1, o.configurable = !0, "value" in o && (o.writable = !0), Object.defineProperty(t, o.key, o) 48 | } 49 | } 50 | return function (e, n, o) { 51 | return n && t(e.prototype, n), o && t(e, o), e 52 | } 53 | }(); 54 | n(2); 55 | var r = { 56 | title: "如果觉得我的文章对您有用,请随意打赏。您的支持将鼓励我继续创作!", 57 | btnText: "打赏支持" 58 | }, 59 | // d = document.body, 60 | d = document.getElementById('donation_div'), 61 | s = !1, 62 | l = function () { 63 | function t(e) { 64 | if (o(this, t), arguments[0] && "object" === a(arguments[0]) && (this.options = Object.assign({}, r, e)), !this.options.wechatImage) throw new Error("wechatImage is required"); 65 | if (!this.options.alipayImage) throw new Error("alipayImage is required"); 66 | this.el = this.options.el && this.options.el, this.render(), this.bind() 67 | } 68 | return i(t, [{ 69 | key: "render", 70 | value: function () { 71 | var t = '\n \n ', 72 | e = '\n \n "; 73 | this.el && (this.el.innerHTML = e), this.modal = document.createElement("div"), this.modal.innerHTML = t, this.modal.id = "donate-modal-container", d.appendChild(this.modal) 74 | } 75 | }, { 76 | key: "bind", 77 | value: function () { 78 | var t = this; 79 | this.btns = this.modal.querySelectorAll(".donate-tab a"), 80 | this.images = this.modal.querySelectorAll(".donate-tab .donate-image"), 81 | this.modal.addEventListener("click", this._modalEvent.bind(t), !1), 82 | this.el && this.el.addEventListener("click", this._donateBtnEvent.bind(t), !1) 83 | } 84 | }, { 85 | key: "_modalEvent", 86 | value: function (t) { 87 | if (t.stopPropagation(), t.target.dataset.index) 88 | return [].slice.call(this.btns).forEach(function (t) { 89 | t.classList.toggle("active") 90 | }), void[].slice.call(this.images).forEach(function (t) { 91 | t.classList.toggle("active") 92 | }); 93 | this.hide() 94 | } 95 | }, { 96 | key: "_donateBtnEvent", 97 | value: function (t) { 98 | "donate-btn" === t.target.className && (s ? this.hide() : this.show()) 99 | } 100 | }, { 101 | key: "show", 102 | value: function () { 103 | s || (this.modal.classList.add("active"), s = !0) 104 | } 105 | }, { 106 | key: "hide", 107 | value: function () { 108 | this.modal.classList.remove("active"), s = !1 109 | } 110 | }, { 111 | key: "destroy", 112 | value: function () { 113 | var t = this; 114 | this.modal.removeEventListener("click", this._modalEvent.bind(t), !1), this.el.removeEventListener("click", this._donateBtnEvent.bind(t), !1), d.removeChild(this.modal) 115 | } 116 | }]), t 117 | }(); 118 | t.exports = l 119 | }, 120 | function (t, e) { 121 | function n(t, e) { 122 | for (var n = 0; n < t.length; n++) { 123 | var o = t[n], 124 | a = p[o.id]; 125 | if (a) { 126 | a.refs++; 127 | for (var i = 0; i < a.parts.length; i++) a.parts[i](o.parts[i]); 128 | for (; i < o.parts.length; i++) a.parts.push(s(o.parts[i], e)) 129 | } else { 130 | for (var r = [], i = 0; i < o.parts.length; i++) r.push(s(o.parts[i], e)); 131 | p[o.id] = { 132 | id: o.id, 133 | refs: 1, 134 | parts: r 135 | } 136 | } 137 | } 138 | } 139 | 140 | function o(t) { 141 | for (var e = [], n = {}, o = 0; o < t.length; o++) { 142 | var a = t[o], 143 | i = a[0], 144 | r = a[1], 145 | d = a[2], 146 | s = a[3], 147 | l = { 148 | css: r, 149 | media: d, 150 | sourceMap: s 151 | }; 152 | n[i] ? n[i].parts.push(l) : e.push(n[i] = { 153 | id: i, 154 | parts: [l] 155 | }) 156 | } 157 | return e 158 | } 159 | 160 | function a(t, e) { 161 | var n = m(), 162 | o = g[g.length - 1]; 163 | if ("top" === t.insertAt) o ? o.nextSibling ? n.insertBefore(e, o.nextSibling) : n.appendChild(e) : n.insertBefore(e, n.firstChild), g.push(e); 164 | else { 165 | if ("bottom" !== t.insertAt) throw new Error("Invalid value for parameter 'insertAt'. Must be 'top' or 'bottom'."); 166 | n.appendChild(e) 167 | } 168 | } 169 | 170 | function i(t) { 171 | t.parentNode.removeChild(t); 172 | var e = g.indexOf(t); 173 | e >= 0 && g.splice(e, 1) 174 | } 175 | 176 | function r(t) { 177 | var e = document.createElement("style"); 178 | return e.type = "text/css", a(t, e), e 179 | } 180 | 181 | function d(t) { 182 | var e = document.createElement("link"); 183 | return e.rel = "stylesheet", a(t, e), e 184 | } 185 | 186 | function s(t, e) { 187 | var n, o, a; 188 | if (e.singleton) { 189 | var s = v++; 190 | n = b || (b = r(e)), o = l.bind(null, n, s, !1), a = l.bind(null, n, s, !0) 191 | } else t.sourceMap && "function" == typeof URL && "function" == typeof URL.createObjectURL && "function" == typeof URL.revokeObjectURL && "function" == typeof Blob && "function" == typeof btoa ? (n = d(e), o = u.bind(null, n), a = function () { 192 | i(n), n.href && URL.revokeObjectURL(n.href) 193 | }) : (n = r(e), o = c.bind(null, n), a = function () { 194 | i(n) 195 | }); 196 | return o(t), 197 | function (e) { 198 | if (e) { 199 | if (e.css === t.css && e.media === t.media && e.sourceMap === t.sourceMap) return; 200 | o(t = e) 201 | } else a() 202 | } 203 | } 204 | 205 | function l(t, e, n, o) { 206 | var a = n ? "" : o.css; 207 | if (t.styleSheet) t.styleSheet.cssText = y(e, a); 208 | else { 209 | var i = document.createTextNode(a), 210 | r = t.childNodes; 211 | r[e] && t.removeChild(r[e]), r.length ? t.insertBefore(i, r[e]) : t.appendChild(i) 212 | } 213 | } 214 | 215 | function c(t, e) { 216 | var n = e.css, 217 | o = e.media; 218 | if (o && t.setAttribute("media", o), t.styleSheet) t.styleSheet.cssText = n; 219 | else { 220 | for (; t.firstChild;) t.removeChild(t.firstChild); 221 | t.appendChild(document.createTextNode(n)) 222 | } 223 | } 224 | 225 | function u(t, e) { 226 | var n = e.css, 227 | o = e.sourceMap; 228 | o && (n += "\n/*# sourceMappingURL=data:application/json;base64," + btoa(unescape(encodeURIComponent(JSON.stringify(o)))) + " */"); 229 | var a = new Blob([n], { 230 | type: "text/css" 231 | }), 232 | i = t.href; 233 | t.href = URL.createObjectURL(a), i && URL.revokeObjectURL(i) 234 | } 235 | var p = {}, 236 | f = function (t) { 237 | var e; 238 | return function () { 239 | return void 0 === e && (e = t.apply(this, arguments)), e 240 | } 241 | }, 242 | h = f(function () { 243 | return /msie [6-9]\b/.test(self.navigator.userAgent.toLowerCase()) 244 | }), 245 | m = f(function () { 246 | return document.head || document.getElementsByTagName("head")[0] 247 | }), 248 | b = null, 249 | v = 0, 250 | g = []; 251 | t.exports = function (t, e) { 252 | if ("undefined" != typeof DEBUG && DEBUG && "object" != typeof document) throw new Error("The style-loader cannot be used in a non-browser environment"); 253 | e = e || {}, void 0 === e.singleton && (e.singleton = h()), void 0 === e.insertAt && (e.insertAt = "bottom"); 254 | var a = o(t); 255 | return n(a, e), 256 | function (t) { 257 | for (var i = [], r = 0; r < a.length; r++) { 258 | var d = a[r], 259 | s = p[d.id]; 260 | s.refs--, i.push(s) 261 | } 262 | if (t) { 263 | n(o(t), e) 264 | } 265 | for (var r = 0; r < i.length; r++) { 266 | var s = i[r]; 267 | if (0 === s.refs) { 268 | for (var l = 0; l < s.parts.length; l++) s.parts[l](); 269 | delete p[s.id] 270 | } 271 | } 272 | } 273 | }; 274 | var y = function () { 275 | var t = []; 276 | return function (e, n) { 277 | return t[e] = n, t.filter(Boolean).join("\n") 278 | } 279 | }() 280 | }, 281 | function (t, e, n) { 282 | var o = n(3); 283 | "string" == typeof o && (o = [ 284 | [t.i, o, ""] 285 | ]); 286 | n(1)(o, {}); 287 | o.locals && (t.exports = o.locals) 288 | }, 289 | function (t, e, n) { 290 | e = t.exports = n(4)(), e.push([t.i, 'body,html{height:100%}', ""]) 291 | }, 292 | function (t, e) { 293 | t.exports = function () { 294 | var t = []; 295 | return t.toString = function () { 296 | for (var t = [], e = 0; e < this.length; e++) { 297 | var n = this[e]; 298 | n[2] ? t.push("@media " + n[2] + "{" + n[1] + "}") : t.push(n[1]) 299 | } 300 | return t.join("") 301 | }, t.i = function (e, n) { 302 | "string" == typeof e && (e = [ 303 | [null, e, ""] 304 | ]); 305 | for (var o = {}, a = 0; a < this.length; a++) { 306 | var i = this[a][0]; 307 | "number" == typeof i && (o[i] = !0) 308 | } 309 | for (a = 0; a < e.length; a++) { 310 | var r = e[a]; 311 | "number" == typeof r[0] && o[r[0]] || (n && !r[2] ? r[2] = n : n && (r[2] = "(" + r[2] + ") and (" + n + ")"), t.push(r)) 312 | } 313 | }, t 314 | } 315 | }, 316 | function (t, e, n) { 317 | t.exports = n(0) 318 | } 319 | ]) 320 | }); -------------------------------------------------------------------------------- /tools/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | tools | 物联网安全技术研究 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 64 | 65 | 66 | 67 | 68 | 69 | 106 | 107 | 108 |
    109 |
    110 | 111 |
    112 | 113 |
    158 | 159 | 160 |
    161 | 340 | 341 |
    342 |
    343 | 344 | 345 |
    346 |
    347 | © 2017 物联网安全技术研究 All Rights Reserved. 348 | 349 | 350 | 本站访客数人次 351 | 本站总访问量次 352 | 353 | 354 |
    355 |
    356 | Theme by hiero 357 |
    358 |
    359 |
    360 | 361 | 362 | 363 | 364 | 369 |
    370 | 381 | 382 | 383 | 384 | 385 | 393 | 394 | 401 | 402 | 410 | 411 | 413 | 414 | 415 | 416 | 417 | 418 | 419 | 420 | 421 | 422 | 423 | 424 | 425 | 426 | 427 | 428 | 429 |
    430 | 431 |
    432 | 433 | 434 | 435 | 437 | 438 | 439 | 440 | 441 | 442 | 443 |
    444 | 445 | 446 | 447 | 448 | 449 | -------------------------------------------------------------------------------- /archives/2017/11/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 归档: 2017/11 | 物联网安全技术研究 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 63 | 64 | 65 | 66 | 67 | 68 | 105 | 106 | 107 |
    108 |
    109 | 110 |
    111 | 112 |
    113 |
    嗯,目前共计9篇文章
    114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 |
    126 |
    127 |

    2017

    128 |
    129 |
    130 | 131 | 148 | 149 | 150 | 151 | 168 | 169 | 170 | 171 | 188 | 189 | 190 |
    191 | 192 | 193 | 194 | 195 | 196 | 197 | 198 |
    199 | 378 | 379 |
    380 |
    381 | 382 | 383 |
    384 |
    385 | © 2017 物联网安全技术研究 All Rights Reserved. 386 | 387 | 388 | 本站访客数人次 389 | 本站总访问量次 390 | 391 | 392 |
    393 |
    394 | Theme by hiero 395 |
    396 |
    397 |
    398 | 399 | 400 | 401 | 402 | 407 |
    408 | 419 | 420 | 421 | 422 | 423 | 431 | 432 | 439 | 440 | 448 | 449 | 451 | 452 | 453 | 454 | 455 | 456 | 457 | 458 | 459 | 460 | 461 | 462 | 463 | 464 | 465 | 466 | 467 |
    468 | 469 |
    470 | 471 | 472 | 473 | 475 | 476 | 477 | 478 | 479 | 480 | 481 |
    482 | 483 | 484 | 485 | 486 | 487 | -------------------------------------------------------------------------------- /books/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | books | 物联网安全技术研究 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 64 | 65 | 66 | 67 | 68 | 69 | 106 | 107 | 108 |
    109 |
    110 | 111 |
    112 | 113 |
    114 |
    115 | 116 | 117 |
    118 | 119 | 120 |

    121 | books 122 |

    123 | 124 | 125 |
    126 | 127 | 139 |
    140 | 141 |

    Embedded Device Security: Pwn the device

    第2章到第4章介绍的是硬件安全
    142 | 第5章是固件分析的一些工具和环境介绍
    143 | 第6章开始是重点,用户接口的安全测试,涉及的重点是Web安全
    144 | 第7章开始说的是硬件的逆向调试环境及工具的准备
    145 | 最后8、9两章是重点中的重点,介绍了pwn嵌入式设备最严重的两个漏洞,命令注入和缓冲区溢出
    146 | 

    详情见安全攻防书籍推荐 - 20170801

    147 | 148 | 149 |
    150 |
    151 | 152 | 153 | 154 | 155 | 156 |
    157 |
    158 | 159 | 160 | 161 |
    162 | 163 | 164 |
    165 | 344 | 345 |
    346 |
    347 | 348 | 349 |
    350 |
    351 | © 2017 物联网安全技术研究 All Rights Reserved. 352 | 353 | 354 | 本站访客数人次 355 | 本站总访问量次 356 | 357 | 358 |
    359 |
    360 | Theme by hiero 361 |
    362 |
    363 |
    364 | 365 | 366 | 367 | 368 | 373 |
    374 | 385 | 386 | 387 | 388 | 389 | 397 | 398 | 405 | 406 | 414 | 415 | 417 | 418 | 419 | 420 | 421 | 422 | 423 | 424 | 425 | 426 | 427 | 428 | 429 | 430 | 431 | 432 | 433 |
    434 | 435 |
    436 | 437 | 438 | 439 | 441 | 442 | 443 | 444 | 445 | 446 | 447 |
    448 | 449 | 450 | 451 | 452 | 453 | --------------------------------------------------------------------------------