6hz7vif 发表于 2024-10-3 17:14:07

黑客是怎么样入侵网站?为么企业网站需要渗透测试?


    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><span style="color: black;">做为</span><span style="color: black;">机构</span>的运维人员,<span style="color: black;">尤其</span>是中大型企业,网站被攻击,网站打不开是一件再平常<span style="color: black;">不外</span>的事情了。今天<span style="color: black;">咱们</span>就<span style="color: black;">来讲</span>说黑客是<span style="color: black;">怎样</span>入侵你的网站<span style="color: black;">引起</span>用户<span style="color: black;">没法</span>正常<span style="color: black;">拜访</span>的。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><span style="color: black;">因为</span>关注<span style="color: black;">咱们</span>的用户有<span style="color: black;">有些</span>是企业运维者,<span style="color: black;">因此</span><span style="color: black;">博主</span>在后面再说下<span style="color: black;">为何</span>企业网站需要做渗透测试。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><span style="color: black;">日前</span>的网站可分为三大块:个人运营、团队/<span style="color: black;">机构</span>运营、政府运营。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">个人网站比例还是很大的,这种网站<span style="color: black;">都数</span>采用开源系统。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">如<span style="color: black;">博客类</span>:Wordpress、Emlog、Typecho、Z-blog、More...,</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">社区类</span><span style="color: black;">:Discuz、PHPwind、StartBBS、Mybb等等。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">团队/<span style="color: black;">机构</span>网站<span style="color: black;">运用</span>常用的开源CMS比例<span style="color: black;">亦</span>是非常大,政府类网站基本上外包<span style="color: black;">研发</span>较多。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">当然互联网<span style="color: black;">机构</span>自家<span style="color: black;">制品</span>应用必然都是<span style="color: black;">机构</span>自主<span style="color: black;">研发</span>:淘宝?知乎?豆瓣?等等。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><span style="color: black;">倘若</span>更广泛的话,可分为两大块:<strong style="color: blue;"><span style="color: black;">开源与闭源</span></strong>。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">能够有效说明网站伪安全的<span style="color: black;">便是</span>从实战出发的<span style="color: black;">方向</span>去证明到底是不是真的固若金汤。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><span style="color: black;">这儿</span>之<span style="color: black;">因此</span>讲到入侵<span style="color: black;">办法</span>不是为了教<span style="color: black;">大众</span><span style="color: black;">怎样</span>入侵网站,而是<span style="color: black;">认识</span>入侵的<span style="color: black;">办法</span>多种多样,知己知彼<span style="color: black;">才可</span>百战不殆。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">菜刀能够用来切菜,<span style="color: black;">一样</span><span style="color: black;">亦</span>能够用来杀人。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">下面<span style="color: black;">咱们</span>就<span style="color: black;">来讲</span>下黑客入侵网站的<span style="color: black;">有些</span>普通的流程。</span></p><img src="http://mmbiz.qpic.cn/mmbiz_png/fgnkxfGnnkTxNKrXUEXD3zYazBqYyojHTakeicibDD1sNic53Kic9K7lcsT7kXpTJQrJHpTC9w2glbP6ialpFhccTIw/640?tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"><span style="color: black;"><strong style="color: blue;">黑客们入侵网站<span style="color: black;">广泛</span>的流程</strong></span><img src="http://mmbiz.qpic.cn/mmbiz_png/fgnkxfGnnkTwicRUel5L1ict7HNvhOJ2JBcJEeHskjCZDptTqaePv3VuDkehg0VibkXs97k1Xeuq2Q5yBXwnakZCQ/640?tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"><span style="color: black;">1、信息收集</span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">1.1/ Whois信息--注册人、<span style="color: black;">tel</span>、邮箱、DNS、<span style="color: black;">位置</span></span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">1.2/ Googlehack--<span style="color: black;">敏锐</span>目录、<span style="color: black;">敏锐</span>文件、<span style="color: black;">更加多</span>信息收集</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">1.3/ 服务器IP--Nmap扫描、端口对应的服务、C段</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">1.4/ 旁注--Bing<span style="color: black;">查找</span>、脚本工具</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">1.5/ <span style="color: black;">倘若</span>遇到CDN--Cloudflare(绕过)、从子域入手(mail,postfix)、DNS传送域漏洞</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">1.6/ 服务器、组件(指纹)--操作系统、web server(apache,nginx,iis)、脚本语言</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">1.7/ More...</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><span style="color: black;">经过</span>信息收集<span style="color: black;">周期</span>,攻击者基本上<span style="color: black;">已然</span>能够获取到网站的绝大部分信息,当然信息收集<span style="color: black;">做为</span>网站入侵的<span style="color: black;">第1</span>步,决定着后续入侵的成功。</span></p><span style="color: black;">2、漏洞挖掘</span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">2.1/ 探测Web应用指纹--Discuz、PHPwind、Dedecms、Ecshop...</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">2.2/ XSS、CSRF、XSIO、SQLinjection、权限绕过、任意文件读取、文件<span style="color: black;">包括</span>...</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">2.3/ 上传漏洞--截断、修改、解析漏洞</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">2.4/ <span style="color: black;">有没有</span>验证码--进行暴力破解</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">2.5/ More...</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">经过漫长的一天,攻击者手里<span style="color: black;">已然</span><span style="color: black;">把握</span>了你网站的<span style="color: black;">海量</span>信息以及不大不小的漏洞若干,下一步<span style="color: black;">她们</span>便会<span style="color: black;">起始</span>利用这些漏洞获取网站权限。</span></p><span style="color: black;">3、漏洞利用</span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">3.1/ 思考目的性--达到什么样的效果</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">3.2/ <span style="color: black;">隐匿</span>,破坏性--<span style="color: black;">按照</span>探测到的应用指纹寻找对应的EXP攻击载荷<span style="color: black;">或</span>自己编写</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">3.3/ <span style="color: black;">起始</span>漏洞攻击,获取相应权限,<span style="color: black;">按照</span>场景<span style="color: black;">区别</span>变化思路拿到webshell</span></p><span style="color: black;">4、权限<span style="color: black;">提高</span></span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">4.1/ <span style="color: black;">按照</span>服务器类型<span style="color: black;">选取</span><span style="color: black;">区别</span>的攻击载荷进行权限<span style="color: black;">提高</span></span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">4.2/ <span style="color: black;">没法</span>进行权限<span style="color: black;">提高</span>,结合获取的资料<span style="color: black;">起始</span><span style="color: black;">秘码</span>猜解,回溯信息收集</span></p><span style="color: black;">5、<span style="color: black;">移植</span>后门</span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">5.1/ 隐蔽性</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">5.2/ <span style="color: black;">定时</span>查看并更新,保持周期性</span></p><span style="color: black;">6、日志清理</span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">6.1/ 伪装性,隐蔽性,避免激警<span style="color: black;">她们</span><span style="color: black;">一般</span><span style="color: black;">选取</span>删除指定日志</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">6.2/ <span style="color: black;">按照</span>时间段,find相应日志文件 太多太多。。。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">说了<span style="color: black;">那样</span>多,这些<span style="color: black;">过程</span>不<span style="color: black;">晓得</span>你看懂了多少?其实大部分的脚本小黑显然<span style="color: black;">不消</span>这些繁琐的<span style="color: black;">过程</span>,<span style="color: black;">她们</span>只<span style="color: black;">爱好</span>快感!</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><span style="color: black;">一般</span><span style="color: black;">她们</span>会<span style="color: black;">运用</span><span style="color: black;">各样</span>漏洞利用工具<span style="color: black;">或</span>弱口令(admin,admin888)进行攻击。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">当然,这种“黑客”仅仅是出于“快感”而去想入侵你的网站,<span style="color: black;">倘若</span>是别有它意的人,麻烦就来了。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">对了,上面这些<span style="color: black;">过程</span>是刚翻到12年我整理的一个freemind思维导图的部分内容:</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><img src="http://mmbiz.qpic.cn/mmbiz_jpg/YPliaPic9m8ucLD5zNs6bJs8b1rM8icWZSQ0Z08ZAZJQZ8k5apohxMpZfbZsnaTQ4VySp1iaAEtxTubwUSsa3IuwkA/640?wx_fmt=jpeg&amp;tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">虽然时间比较久远,但大概的思路<span style="color: black;">便是</span><span style="color: black;">这般</span>子。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">说完入侵的流程,<span style="color: black;">咱们</span><span style="color: black;">来讲</span>下<span style="color: black;">为何</span>企业网站需要做渗透测试。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><strong style="color: blue;"><span style="color: black;">第1</span>:网络安全法规定</strong></span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">2017年6月1日正式实施的网络安全法中<span style="color: black;">知道</span><span style="color: black;">需求</span>:第三十三条,至第三十八条针对关键信息<span style="color: black;">基本</span><span style="color: black;">设备</span>运营者所做的规定(如关键信息<span style="color: black;">基本</span><span style="color: black;">设备</span>运营商应当<span style="color: black;">自动</span>或<span style="color: black;">拜托</span>网络安全服务<span style="color: black;">公司</span>对其网络安全性和可能存在的<span style="color: black;">危害</span>每年<span style="color: black;">最少</span>进行一次检测<span style="color: black;">评定</span>,并将检测<span style="color: black;">评定</span><span style="color: black;">状况</span>和改进<span style="color: black;">办法</span>报送<span style="color: black;">关联</span>负责关键信息<span style="color: black;">基本</span><span style="color: black;">设备</span>安全<span style="color: black;">守护</span>工作的<span style="color: black;">分部</span>),<span style="color: black;">拥有</span>相当的强制性——在法律责任部分<span style="color: black;">知道</span><span style="color: black;">说到</span>若不履行这些规定,则由<span style="color: black;">相关</span>主管<span style="color: black;">分部</span>责令整改、给予警告;</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">拒不改正或<span style="color: black;">引起</span><span style="color: black;">害处</span>网络安全等后果的,处十万元以上一百万元以下罚款,<span style="color: black;">况且</span>还对直接负责的主管人员除以一万元以上、十万元以下罚款。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">关于网络安全法的<span style="color: black;">诠释</span>,<span style="color: black;">能够</span>点击【<span style="color: black;"><strong style="color: blue;">网络安全<span style="color: black;">诠释</span></strong></span>】进行查看</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">值得关注的是,在信息安全<span style="color: black;">危害</span><span style="color: black;">评定</span>中,渗透测试是一种常用且非常重要的手段。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><strong style="color: blue;">第二:渗透测试助力PCI DSS合规建设</strong></span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">在PCI DSS(Payment Card Industry Security Standards Council支付卡行业安全标准委员会)第 11.3中有<span style="color: black;">这般</span>的<span style="color: black;">需求</span>:<span style="color: black;">最少</span>每年<span style="color: black;">或</span>在<span style="color: black;">基本</span>架构或应用程序有任何重大升级或修改后(例如操作系统升级、环境中添加子网络或环境中添加网络服务器)都需要执行内部和<span style="color: black;">外边</span>基于应用层和网络层的渗透测试。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;"><span style="color: black;">第三:ISO27001认证的基线<span style="color: black;">需求</span></span></strong></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">ISO27001 附录“A12信息系统<span style="color: black;">研发</span>、获取和<span style="color: black;">守护</span>”的<span style="color: black;">需求</span>,<span style="color: black;">创立</span>了软件安全<span style="color: black;">研发</span>周期,并且<span style="color: black;">尤其</span>提出应在上线前参<span style="color: black;">按例</span>如OWASP标准进行额外的渗透测试 。<span style="color: black;">日前</span>北京安普诺信息<span style="color: black;">机构</span><span style="color: black;">已然</span><span style="color: black;">得到</span>ISO27001的认证。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;"><span style="color: black;">第四:银监会多项监管指引中<span style="color: black;">需求</span></span></strong></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">依据银监会<span style="color: black;">颁布</span>的多项监管指引中<span style="color: black;">知道</span><span style="color: black;">需求</span>,对银行的安全策略、内<span style="color: black;">掌控</span>度、<span style="color: black;">危害</span>管理、系统安全等方面需要进行的渗透测试和管控能力的考察与<span style="color: black;">评估</span>。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><strong style="color: blue;">第五:最大限度减少业务损失</strong></span></p><span style="color: black;">除了满足政策的合规性<span style="color: black;">需求</span>、提高客户的操作安全性或满足业务合作伙伴的<span style="color: black;">需求</span>。<span style="color: black;">最后</span>的<span style="color: black;">目的</span>应该是最大限度地减小业务<span style="color: black;">危害</span>。</span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">企业需要尽可能多地进行渗透测试,以保持安全<span style="color: black;">危害</span>在可<span style="color: black;">掌控</span>的范围内。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">网站<span style="color: black;">研发</span>过程中,会<span style="color: black;">出现</span><span style="color: black;">非常多</span>难以<span style="color: black;">掌控</span>、难以<span style="color: black;">发掘</span>的隐形安全问题,当这些<span style="color: black;">海量</span>的瑕疵暴露于<span style="color: black;">外边</span>网络环境中的时候,就产生了信息安全威胁。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">这个问题,企业<span style="color: black;">能够</span><span style="color: black;">经过</span><span style="color: black;">定时</span>的渗透测试进行有效防范,早<span style="color: black;">发掘</span>、早<span style="color: black;">处理</span>。经过专业渗透人员测试加固后的系统会变得更加稳定、安全,测试后的报告<span style="color: black;">能够</span><span style="color: black;">帮忙</span>管理人员进行更好的项目决策,<span style="color: black;">同期</span>证明<span style="color: black;">增多</span>安全预算的必要性,并将安全问题传达到高级管理层。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;">渗透测试与安全检测的区别</strong></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">渗透测试<span style="color: black;">区别</span>于传统的安全扫描,在整体<span style="color: black;">危害</span><span style="color: black;">评定</span>框架中,脆弱性与安全扫描的关系可描述为“承上”,即如上面所讲,是对扫描结果的一种验证和<span style="color: black;">弥补</span>。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><span style="color: black;">另一</span>,渗透测试相对传统安全扫描的最大差异在于渗透测试需要<span style="color: black;">海量</span>的人工介入的工作。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">这些工作<span style="color: black;">重点</span>由专业安全人员发起,一方面,<span style="color: black;">她们</span>利用自己的专业知识,对扫描结果进行深入的分析和判断。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">另一方面则是<span style="color: black;">按照</span><span style="color: black;">她们</span>的经验,对扫描器<span style="color: black;">没法</span><span style="color: black;">发掘</span>的、<span style="color: black;">隐匿</span>较深的安全问题进行手工的<span style="color: black;">检测</span>和测试,从而做出更为精确的验证(或模拟入侵)<span style="color: black;">行径</span>。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">源自</span>:悬镜安全实验室</p><span style="color: black;"><strong style="color: blue;"><span style="color: black;">你会<span style="color: black;">爱好</span></span></strong></span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><a style="color: black;">渗透流程与相应的工具<span style="color: black;">运用</span></a></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><a style="color: black;">渗透小知识之Web渗透入侵流程思路(二)</a></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><img src="http://mmbiz.qpic.cn/mmbiz/UV167rT9naICHpYkN8XdvXnKLGzucYkKjMtT2HrT1O0ubtRvXP7RVzJWnERiaP2dU82Rk02kvcSlTR6VYrkibhAA/640?tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><span style="color: black;">亲<span style="color: black;">爱好</span>吗?</span><span style="color: black;">记得</span><strong style="color: blue;"><span style="color: black;">点赞</span></strong><span style="color: black;">&nbsp;|&nbsp;</span><strong style="color: blue;"><span style="color: black;">留言</span></strong><span style="color: black;">&nbsp;|&nbsp;</span><strong style="color: blue;"><span style="color: black;">分享</span></strong></span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><span style="color: black;">长按公众号,可“&nbsp;</span><span style="color: black;"><strong style="color: blue;"><span style="color: black;">置顶</span></strong></span><span style="color: black;">&nbsp;”</span></span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">----------------------------------</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><span style="color: black;">要闻,干货,原创,专业</span><span style="color: black;">关注“黑白之道”<span style="color: black;">微X</span>:i77169&nbsp;</span><span style="color: black;">华夏黑客同盟<span style="color: black;">咱们</span><span style="color: black;">保持</span>,自由,免费,共享!</span></span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><img src="http://mmbiz.qpic.cn/mmbiz/3xxicXNlTXLicC5yZICpV1JRibhFQUOCNVWibPgMDeS4UaqkmCUFsk3Pkw8J1oZnKMG9wNM80weibcEp8TghvqQhvBw/0?wx_fmt=gif&amp;tp=webp&amp;wxfrom=5&amp;wx_lazy=1" style="width: 50%; margin-bottom: 20px;"></p>




7wu1wm0 发表于 2024-10-14 08:30:59

感谢你的精彩评论,带给我新的思考角度。

nykek5i 发表于 2024-10-17 00:53:12

谷歌网站排名优化 http://www.fok120.com/

4zhvml8 发表于 2024-10-18 09:57:49

认真阅读了楼主的帖子,非常有益。

1fy07h 发表于 2024-11-10 22:13:50

这篇文章真的让我受益匪浅,外链发布感谢分享!
页: [1]
查看完整版本: 黑客是怎么样入侵网站?为么企业网站需要渗透测试?