<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>所有文章 - n0tr00t's blog</title><link>https://n0tr00t.eu.org/posts/</link><description>所有文章 | n0tr00t's blog</description><generator>Hugo -- gohugo.io</generator><language>zh</language><managingEditor>blog@n0tr00t.eu.org (n0tr00t)</managingEditor><webMaster>blog@n0tr00t.eu.org (n0tr00t)</webMaster><lastBuildDate>Sun, 19 Feb 2023 12:33:08 +0000</lastBuildDate><atom:link href="https://n0tr00t.eu.org/posts/" rel="self" type="application/rss+xml"/><item><title>已知所用开源项目扫描目标站点可用路经</title><link>https://n0tr00t.eu.org/posts/%E5%B7%B2%E7%9F%A5%E6%89%80%E7%94%A8%E5%BC%80%E6%BA%90%E9%A1%B9%E7%9B%AE%E6%89%AB%E6%8F%8F%E7%9B%AE%E6%A0%87%E7%AB%99%E7%82%B9%E5%8F%AF%E7%94%A8%E8%B7%AF%E7%BB%8F/</link><pubDate>Sun, 19 Feb 2023 12:33:08 +0000</pubDate><author>n0tr00t</author><guid>https://n0tr00t.eu.org/posts/%E5%B7%B2%E7%9F%A5%E6%89%80%E7%94%A8%E5%BC%80%E6%BA%90%E9%A1%B9%E7%9B%AE%E6%89%AB%E6%8F%8F%E7%9B%AE%E6%A0%87%E7%AB%99%E7%82%B9%E5%8F%AF%E7%94%A8%E8%B7%AF%E7%BB%8F/</guid><description>部署项目，在生成的站点目录下使用以下命令扫描即可
1 find | gobuster dir -w - -u https://target.com</description></item><item><title>密码管理器password-store命令行自动填入GPG私钥密码</title><link>https://n0tr00t.eu.org/posts/%E5%AF%86%E7%A0%81%E7%AE%A1%E7%90%86%E5%99%A8password-store%E5%91%BD%E4%BB%A4%E8%A1%8C%E8%87%AA%E5%8A%A8%E5%A1%AB%E5%85%A5gpg%E7%A7%81%E9%92%A5%E5%AF%86%E7%A0%81/</link><pubDate>Mon, 26 Sep 2022 23:30:00 +0000</pubDate><author>n0tr00t</author><guid>https://n0tr00t.eu.org/posts/%E5%AF%86%E7%A0%81%E7%AE%A1%E7%90%86%E5%99%A8password-store%E5%91%BD%E4%BB%A4%E8%A1%8C%E8%87%AA%E5%8A%A8%E5%A1%AB%E5%85%A5gpg%E7%A7%81%E9%92%A5%E5%AF%86%E7%A0%81/</guid><description><![CDATA[TL;DR 设置环境变量PASSWORD_STORE_GPG_OPTS=&quot;--pinentry-mode loopback --passphrase 私钥密码&quot;
研究过程 man page 说明了环境变量 PASSWORD_STORE_GPG_OPTS 是要传递给 GPG 的所有调用的附加选项。 通过翻阅源码可以看到GPG选项为：
1 GPG_OPTS=( $PASSWORD_STORE_GPG_OPTS &#34;--quiet&#34; &#34;--yes&#34; &#34;--compress-algo=none&#34; &#34;--no-encrypt-to&#34; ) 那么只需要拼接--pinentry-mode loopback --passphrase 私钥密码即可]]></description></item><item><title>Wordpress网站渗透方法指南</title><link>https://n0tr00t.eu.org/posts/wordpress%E7%BD%91%E7%AB%99%E6%B8%97%E9%80%8F%E6%96%B9%E6%B3%95%E6%8C%87%E5%8D%97/</link><pubDate>Thu, 15 Sep 2022 08:00:18 +0000</pubDate><author>n0tr00t</author><guid>https://n0tr00t.eu.org/posts/wordpress%E7%BD%91%E7%AB%99%E6%B8%97%E9%80%8F%E6%96%B9%E6%B3%95%E6%8C%87%E5%8D%97/</guid><description>原作者：HACK学习呀 n0tr00t进行补充
如果您遇到使用 WordPress 的网站，您会怎么做，渗透思路和安全检测思路？
如何挖掘Wordpress网站的漏洞 如果您访问https://target.com并查看源代码，您将看到来自 WordPress 的主题和插件的链接。
或者你可以访问https://target.com/wp-login.php，它是 WordPress 登录管理页面
通过查看核心、插件和主题版本找到相关的CVE
如何找到wordpress版本 1 2 3 4 https://target.com/feed https://target.com/?feed=rss2 https://target.com/.git/config https://target.com/SECURITY.md (开发版) 如何找到插件版本 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 https://target.com/wp-content/plugins/PLUGINNAME/.git/config https://target.com/wp-content/plugins/PLUGINNAME/changelog https://target.com/wp-content/plugins/PLUGINNAME/changelog.txt https://target.com/wp-content/plugins/PLUGINNAME/changelog.md https://target.com/wp-content/plugins/PLUGINNAME/changelog.rst https://target.</description></item><item><title>记录F-Droid软件源</title><link>https://n0tr00t.eu.org/posts/f-droid-mirrors/</link><pubDate>Mon, 05 Sep 2022 08:57:40 +0000</pubDate><author>n0tr00t</author><guid>https://n0tr00t.eu.org/posts/f-droid-mirrors/</guid><description>F-Droid Archive The archive of the official F-Droid Free Software repository. Apps here are old and can contain known vulnerabilities and security issues!
中国科学院软件研究所 https://mirror.iscas.ac.cn/fdroid/archive?fingerprint=43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
清华大学 https://mirrors.tuna.tsinghua.edu.cn/fdroid/archive?fingerprint=43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
南京大学 https://mirror.nju.edu.cn/fdroid/archive?fingerprint=43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
F-Droid The official F-Droid Free Software repository. Everything in this repository is always built from the source code.
中国科学院软件研究所 https://mirror.iscas.ac.cn/fdroid/repo?fingerprint=43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
清华大学 https://mirrors.tuna.tsinghua.edu.cn/fdroid/repo?fingerprint=43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
南京大学 https://mirror.nju.edu.cn/fdroid/repo?fingerprint=43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
Collabora Office F-Droid Repo Collabora Office is a text editor, spreadsheet and presentation program based on LibreOffice, the world&amp;rsquo;s most popular Open Source office suite - and now it&amp;rsquo;s on Android, enhancing your possibilities to work on mobile and for collaboration.</description></item><item><title>TryHackMe Confidential(Chinese)</title><link>https://n0tr00t.eu.org/posts/tryhackme-confidentialchinese/</link><pubDate>Sat, 20 Aug 2022 00:07:23 +0000</pubDate><author>n0tr00t</author><guid>https://n0tr00t.eu.org/posts/tryhackme-confidentialchinese/</guid><description>LibreOffice 打开文件，移动图片，扫描QR码即可。</description></item><item><title>Hello World</title><link>https://n0tr00t.eu.org/posts/hello-world/</link><pubDate>Mon, 18 Jul 2022 07:46:46 +0000</pubDate><author>n0tr00t</author><guid>https://n0tr00t.eu.org/posts/hello-world/</guid><description>Hello World!</description></item></channel></rss>