修改样式
This commit is contained in:
@@ -77,5 +77,74 @@ export default defineAppConfig({
|
|||||||
name: 'estel_docs',
|
name: 'estel_docs',
|
||||||
branch: 'main',
|
branch: 'main',
|
||||||
rootDir: ''
|
rootDir: ''
|
||||||
|
},
|
||||||
|
uiPro: {
|
||||||
|
prose: {
|
||||||
|
code: {
|
||||||
|
base: 'px-1.5 py-0.5 text-sm font-mono font-medium rounded-md inline-block',
|
||||||
|
variants: {
|
||||||
|
color: {
|
||||||
|
new: 'border border-muted text-base font-medium bg-muted bg-gray-100 dark:bg-gray-800 text-[#DD1144]'
|
||||||
|
}
|
||||||
|
},
|
||||||
|
defaultVariants: {
|
||||||
|
color: 'new'
|
||||||
|
}
|
||||||
|
},
|
||||||
|
pre: {
|
||||||
|
slots: {
|
||||||
|
root: 'relative my-5 group',
|
||||||
|
header: 'flex items-center gap-1.5 border border-muted bg-default border-b-0 relative rounded-t-md px-4 py-3',
|
||||||
|
filename: 'text-default text-sm/6',
|
||||||
|
icon: 'size-5 shrink-0',
|
||||||
|
copy: 'absolute top-[11px] right-[11px] transition',
|
||||||
|
base: 'group font-mono text-sm/6 border border-muted bg-gray-100 dark:bg-gray-800 rounded-md px-4 py-3 whitespace-pre-wrap break-words overflow-x-auto focus:outline-none'
|
||||||
|
}
|
||||||
|
},
|
||||||
|
codeIcon: {
|
||||||
|
terminal: 'i-lucide-terminal',
|
||||||
|
code:'vscode-icons:file-type-codekit',
|
||||||
|
},
|
||||||
|
codeCollapse: {
|
||||||
|
slots: {
|
||||||
|
root: 'relative [&_pre]:h-[350px]',
|
||||||
|
footer: 'h-14 absolute inset-x-px bottom-px rounded-b-md flex items-center justify-center',
|
||||||
|
trigger: 'group',
|
||||||
|
triggerIcon: 'group-data-[state=open]:rotate-180',
|
||||||
|
},
|
||||||
|
variants: {
|
||||||
|
open: {
|
||||||
|
true: {
|
||||||
|
root: '[&_pre]:h-auto [&_pre]:min-h-[200px] [&_pre]:max-h-[80vh] [&_pre]:pb-12'
|
||||||
|
},
|
||||||
|
false: {
|
||||||
|
root: '[&_pre]:overflow-hidden',
|
||||||
|
footer: 'bg-gradient-to-t from-muted'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
table: {
|
||||||
|
slots: {
|
||||||
|
root: 'relative my-5 overflow-x-auto mx-auto',
|
||||||
|
base: 'w-auto table-auto border-separate border-spacing-0 rounded-md'
|
||||||
|
}
|
||||||
|
},
|
||||||
|
thead: {
|
||||||
|
base: 'bg-muted'
|
||||||
|
},
|
||||||
|
tbody: {
|
||||||
|
base: ''
|
||||||
|
},
|
||||||
|
tr: {
|
||||||
|
base: '[&:first-child>th:first-child]:rounded-tl-md [&:first-child>th:last-child]:rounded-tr-md [&:last-child>td:first-child]:rounded-bl-md [&:last-child>td:last-child]:rounded-br-md'
|
||||||
|
},
|
||||||
|
th: {
|
||||||
|
base: 'py-3 px-4 font-semibold text-base text-left border-e border-b first:border-s border-t border-muted bg-gray-200 dark:bg-gray-800'
|
||||||
|
},
|
||||||
|
td: {
|
||||||
|
base: 'py-3 px-4 text-sm text-left align-top border-e border-b first:border-s border-muted [&_code]:text-xs/5 [&_p]:my-0 [&_p]:leading-6 [&_ul]:my-0 [&_ol]:my-0 [&_ul]:ps-4.5 [&_ol]:ps-4.5 [&_li]:leading-6 [&_li]:my-0.5'
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
@@ -31,7 +31,7 @@ const { selectedTheme } = useTheme()
|
|||||||
// - 否则(classic 或 elegant),使用较大字号 'text-3xl lg:text-4xl'
|
// - 否则(classic 或 elegant),使用较大字号 'text-3xl lg:text-4xl'
|
||||||
const themeSizeClass = computed(() => {
|
const themeSizeClass = computed(() => {
|
||||||
return selectedTheme.value === 'classic'
|
return selectedTheme.value === 'classic'
|
||||||
? 'text-2xl lg:text-3xl border-b border-gray-200 dark:border-gray-700'
|
? 'text-2xl lg:text-3xl underline decoration-3 decoration-primary dark:decoration-gray-700 underline-offset-8 mb-3'
|
||||||
: 'text-3xl lg:text-4xl'
|
: 'text-3xl lg:text-4xl'
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@@ -1,15 +0,0 @@
|
|||||||
<template>
|
|
||||||
<table>
|
|
||||||
<slot />
|
|
||||||
</table>
|
|
||||||
</template>
|
|
||||||
|
|
||||||
<!-- <style scoped>
|
|
||||||
/* 强化表头背景,仅此组件内生效 */
|
|
||||||
table :deep(thead th) {
|
|
||||||
background-color: rgba(0, 0, 0, 0.05);
|
|
||||||
}
|
|
||||||
.dark table :deep(thead th) {
|
|
||||||
background-color: rgba(255, 255, 255, 0.08);
|
|
||||||
}
|
|
||||||
</style> -->
|
|
@@ -1,5 +0,0 @@
|
|||||||
<template>
|
|
||||||
<th class=" bg-gray-100 dark:bg-gray-800 border border-gray-200 dark:border-gray-700 py-2">
|
|
||||||
<slot />
|
|
||||||
</th>
|
|
||||||
</template>
|
|
@@ -1,5 +0,0 @@
|
|||||||
<template>
|
|
||||||
<thead>
|
|
||||||
<slot />
|
|
||||||
</thead>
|
|
||||||
</template>
|
|
@@ -114,7 +114,7 @@ const links = computed(() => {
|
|||||||
}"
|
}"
|
||||||
>
|
>
|
||||||
<span
|
<span
|
||||||
v-if="page"
|
v-if="page.date"
|
||||||
class="text-sm text-pretty text-muted mt-4"
|
class="text-sm text-pretty text-muted mt-4"
|
||||||
> {{ page.date }} </span>
|
> {{ page.date }} </span>
|
||||||
<template #links>
|
<template #links>
|
||||||
|
103
content/blog/1.技术栈/972.nmap高级应用技巧-实战.md
Normal file
103
content/blog/1.技术栈/972.nmap高级应用技巧-实战.md
Normal file
@@ -0,0 +1,103 @@
|
|||||||
|
---
|
||||||
|
title: nmap高级应用技巧-实战
|
||||||
|
description: 实战中使用nmap进行渗透测试和信息收集。
|
||||||
|
date: 2025-08-12
|
||||||
|
img: https://lijue-me.oss-cn-chengdu.aliyuncs.com/20250812130604330.png
|
||||||
|
navigation:
|
||||||
|
icon: simple-icons:openstreetmap
|
||||||
|
---
|
||||||
|
|
||||||
|
```bash[test.shell]
|
||||||
|
nmap -p- --min-rate=1000 -T4 -v -n -Pn 192.168.1.1
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
### NSE
|
||||||
|
Nmap Scripting Engine(NSE)是Nmap的核心扩展功能,通过Lua脚本实现自动化扫描、漏洞检测、信息收集等高级操作。
|
||||||
|
|
||||||
|
#### NSE脚本按功能分为12大类,每类对应不同扫描需求
|
||||||
|
|
||||||
|
| 类别 | 核心目的 | 样例脚本 | 典型使用场合 |
|
||||||
|
|------------|---------------------------------------|-------------------------------|----------------------------------------------------------|
|
||||||
|
| vuln | CVE/漏洞快速验证 | http-vuln-cve2017-5638 | 目标服务版本与已知漏洞匹配 |
|
||||||
|
| safe | 只读式安全审计(无破坏性) | ssh2-enum-algos | 建立会话后立即枚举支持的算法 |
|
||||||
|
| default | 默认已开启的基础信息采集 | http-title | 首次扫描时的“看一眼” |
|
||||||
|
| discovery | 发现服务/子网/资产信息 | smb-os-discovery | 内网资产清点、OS 指纹识别 |
|
||||||
|
| auth | 认证、密钥与票据处理 | ssh-hostkey | 密钥指纹比对、横向渗透准备 |
|
||||||
|
| brute | 弱口令爆破 | http-form-brute | 对表单类登录口的暴力尝试 |
|
||||||
|
| exploit | 利用已确认漏洞取得立足点(需授权) | http-vuln-cve2021-41773 | 实战攻击复现、漏洞验证 |
|
||||||
|
| intrusive | 高交互操作(易被 IDS 告警) | http-slowloris | 拒绝服务场景模拟/压力测试(慎用!) |
|
||||||
|
| malware | 嗅探后门或恶意软件痕迹 | http-malware-host | 威胁狩猎与入侵后取证 |
|
||||||
|
| version | 精细化版本指纹 | http-apache-negotiation | 为后续补丁或 PoC 匹配做准备 |
|
||||||
|
| broadcast | 广播域/多播发现 | nbstat | 内网渗透早期:快速识别 NetBIOS 设备 |
|
||||||
|
| external | 外链第三方数据源(DNSBL 等) | dns-blacklist | 资产信誉检查、垃圾邮件源或钓鱼域名扫描 |
|
||||||
|
|
||||||
|
### 常用 NSE 脚本一览
|
||||||
|
|
||||||
|
| 脚本名称 | 主要用途 | Nmap 一键示例 |
|
||||||
|
|---|---|---|
|
||||||
|
| **http-title** | 抓取 HTTP 网站标题 | `nmap --script http-title <target>` |
|
||||||
|
| **https-redirect** | 识别 HTTP→HTTPS 跳转链 | `nmap --script https-redirect -p 80 <target>` |
|
||||||
|
| **http-robtots** | 收集目标 robots/disallow 条目 | `nmap --script http-robots.txt -p 80 <target>` |
|
||||||
|
| **http-headers** | 枚举响应标头与安全策略 | `nmap --script http-headers -p 80 <target>` |
|
||||||
|
| **http-methods** | 检测允许/禁止的 HTTP 方法 | `nmap --script http-methods -p 80 <target>` |
|
||||||
|
| **http-cors** | 测试 CORS、CSRF 漏洞 | `nmap --script http-cors <target>` |
|
||||||
|
| **http-sql-injection** | 基本 SQL 注入探针 | `nmap --script http-sql-injection -p 80 <target>` |
|
||||||
|
| **http-xssed** | 与 xssed.com 集成交叉检测 | `nmap --script http-xssed <target>` |
|
||||||
|
| **smb-os-discovery** | 枚举 SMB 服务器操作系统/域信息 | `nmap --script smb-os-discovery -p 445 <target>` |
|
||||||
|
| **smb-enum-shares** | 列出共享目录(需 guest) | `nmap --script smb-enum-shares -p 445 <target>` |
|
||||||
|
| **smb-enum-users** | 提取本地/域用户列表 | `nmap --script smb-enum-users -p 445 <target>` |
|
||||||
|
| **smb-vuln-ms17-010** | 探测 EternalBlue(MS17-010) | `nmap --script smb-vuln-ms17-010 -p 445 <target>` |
|
||||||
|
| **ssh-hostkey** | 抓取并对比公钥指纹 | `nmap --script ssh-hostkey -p 22 <target>` |
|
||||||
|
| **ssh-brute** | SSH 账号密码暴力破解(需授权) | `nmap --script ssh-brute --script-args userdb=users.txt,passdb=pass.txt -p 22 <target>` |
|
||||||
|
| **ssh2-enum-algos** | 列出支持的算法与 KEX | `nmap --script ssh2-enum-algos -p 22 <target>` |
|
||||||
|
| **http-vuln-cve2023-XXXX** | 按指定 CVE 编号进行漏洞检查(替换 XXXX) | `nmap --script http-vuln-cve2023-XXXX <target>` |
|
||||||
|
| **ftp-anon** | 检测是否允许匿名登录 | `nmap --script ftp-anon -p 21 <target>` |
|
||||||
|
| **ftp-bounce** | 检查是否允许 FTP Bounce 扫描 | `nmap --script ftp-bounce -p 21 <target>` |
|
||||||
|
| **dns-zone-transfer** | 测试 AXFR(区域传输)泄露 | `nmap --script dns-zone-transfer -p 53 <target>` |
|
||||||
|
| **dns-brute** | 字典爆破子域名 | `nmap --script dns-brute --script-args dns-brute.domain=<domain>` |
|
||||||
|
| **mysql-brute** | 暴力破解 MySQL 实例 | `nmap --script mysql-brute -p 3306 <target>` |
|
||||||
|
| **mysql-audit** | 核对 MySQL CIS/基线配置 | `nmap --script mysql-audit --script-args mysql-audit.username='root',mysql-audit.password='pass123' -p 3306 <target>` |
|
||||||
|
| **ssl-cert** | 解析 TLS 证书详情 | `nmap --script ssl-cert -p 443 <target>` |
|
||||||
|
| **ssl-poodle** | 探测 SSLv3 & POODLE 漏洞 | `nmap --script ssl-poodle -p 443 <target>` |
|
||||||
|
| **vulners** | 基于 Vulners DB 的版本漏洞关联 | `nmap --script vulners -sV <target>` |
|
||||||
|
| **whois-ip** | 查询归属 IP 段的 Whois 信息 | `nmap --script whois-ip <target>` |
|
||||||
|
| **smtp-enum-users** | VRFY/EXPN 暴力枚举邮箱账户 | `nmap --script smtp-enum-users -p 25 <target>` |
|
||||||
|
|
||||||
|
### 自定义脚本
|
||||||
|
|
||||||
|
```lua[演示.lua]
|
||||||
|
-- myecho.nse
|
||||||
|
local stdnse = require "stdnse"
|
||||||
|
|
||||||
|
description = [[极简回显脚本:打印自定义消息]]
|
||||||
|
author = "YourName"
|
||||||
|
license = "GPLv2"
|
||||||
|
categories = {"safe"}
|
||||||
|
|
||||||
|
-- 任何 TCP 端口都触发
|
||||||
|
portrule = function(host,port) return port.protocol == "tcp" end
|
||||||
|
|
||||||
|
action = function(host,port)
|
||||||
|
local msg = stdnse.get_script_args("myecho.msg") or "Hi from custom-NSE!"
|
||||||
|
return ("%s -> %s:%d (%s)"):format(msg, host.ip, port.number, port.service or "unknown")
|
||||||
|
end
|
||||||
|
```
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# 复制.nse到脚本文件夹
|
||||||
|
sudo cp myecho.nse /usr/share/nmap/scripts/
|
||||||
|
nmap --script-updatedb # 更新索引
|
||||||
|
```
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# 执行脚本
|
||||||
|
nmap --script myecho -p22 127.0.0.1
|
||||||
|
nmap --script myecho --script-args 'myecho.msg=HelloNSE' -p80 scanme.nmap.org
|
||||||
|
nmap --script '(safe or discovery) and myecho' -p80,443 10.0.2.0/24
|
||||||
|
```
|
||||||
|
|
||||||
|
### 总结
|
||||||
|
NSE 脚本可大幅提升 Nmap 在渗透测试和信息收集中的效率。建议定期关注 Nmap 官方脚本库更新([NSE Docs](https://nmap.org/nsedoc/ "NSE Docs"))以覆盖最新漏洞。
|
||||||
|
|
||||||
|
|
99
content/blog/1.技术栈/973.nmap高级应用技巧-NSE.md
Normal file
99
content/blog/1.技术栈/973.nmap高级应用技巧-NSE.md
Normal file
@@ -0,0 +1,99 @@
|
|||||||
|
---
|
||||||
|
title: nmap高级应用技巧-NSE
|
||||||
|
description: Nmap Scripting Engine(NSE)是Nmap的核心扩展功能,通过Lua脚本实现自动化扫描、漏洞检测、信息收集等高级操作。
|
||||||
|
date: 2025-08-12
|
||||||
|
img: https://lijue-me.oss-cn-chengdu.aliyuncs.com/20250812130604330.png
|
||||||
|
navigation:
|
||||||
|
icon: simple-icons:openstreetmap
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
### NSE
|
||||||
|
Nmap Scripting Engine(NSE)是Nmap的核心扩展功能,通过Lua脚本实现自动化扫描、漏洞检测、信息收集等高级操作。
|
||||||
|
|
||||||
|
#### NSE脚本按功能分为12大类,每类对应不同扫描需求
|
||||||
|
|
||||||
|
| 类别 | 核心目的 | 样例脚本 | 典型使用场合 |
|
||||||
|
|------------|---------------------------------------|-------------------------------|----------------------------------------------------------|
|
||||||
|
| vuln | CVE/漏洞快速验证 | http-vuln-cve2017-5638 | 目标服务版本与已知漏洞匹配 |
|
||||||
|
| safe | 只读式安全审计(无破坏性) | ssh2-enum-algos | 建立会话后立即枚举支持的算法 |
|
||||||
|
| default | 默认已开启的基础信息采集 | http-title | 首次扫描时的“看一眼” |
|
||||||
|
| discovery | 发现服务/子网/资产信息 | smb-os-discovery | 内网资产清点、OS 指纹识别 |
|
||||||
|
| auth | 认证、密钥与票据处理 | ssh-hostkey | 密钥指纹比对、横向渗透准备 |
|
||||||
|
| brute | 弱口令爆破 | http-form-brute | 对表单类登录口的暴力尝试 |
|
||||||
|
| exploit | 利用已确认漏洞取得立足点(需授权) | http-vuln-cve2021-41773 | 实战攻击复现、漏洞验证 |
|
||||||
|
| intrusive | 高交互操作(易被 IDS 告警) | http-slowloris | 拒绝服务场景模拟/压力测试(慎用!) |
|
||||||
|
| malware | 嗅探后门或恶意软件痕迹 | http-malware-host | 威胁狩猎与入侵后取证 |
|
||||||
|
| version | 精细化版本指纹 | http-apache-negotiation | 为后续补丁或 PoC 匹配做准备 |
|
||||||
|
| broadcast | 广播域/多播发现 | nbstat | 内网渗透早期:快速识别 NetBIOS 设备 |
|
||||||
|
| external | 外链第三方数据源(DNSBL 等) | dns-blacklist | 资产信誉检查、垃圾邮件源或钓鱼域名扫描 |
|
||||||
|
|
||||||
|
### 常用 NSE 脚本一览
|
||||||
|
|
||||||
|
| 脚本名称 | 主要用途 | Nmap 一键示例 |
|
||||||
|
|---|---|---|
|
||||||
|
| **http-title** | 抓取 HTTP 网站标题 | `nmap --script http-title <target>` |
|
||||||
|
| **https-redirect** | 识别 HTTP→HTTPS 跳转链 | `nmap --script https-redirect -p 80 <target>` |
|
||||||
|
| **http-robtots** | 收集目标 robots/disallow 条目 | `nmap --script http-robots.txt -p 80 <target>` |
|
||||||
|
| **http-headers** | 枚举响应标头与安全策略 | `nmap --script http-headers -p 80 <target>` |
|
||||||
|
| **http-methods** | 检测允许/禁止的 HTTP 方法 | `nmap --script http-methods -p 80 <target>` |
|
||||||
|
| **http-cors** | 测试 CORS、CSRF 漏洞 | `nmap --script http-cors <target>` |
|
||||||
|
| **http-sql-injection** | 基本 SQL 注入探针 | `nmap --script http-sql-injection -p 80 <target>` |
|
||||||
|
| **http-xssed** | 与 xssed.com 集成交叉检测 | `nmap --script http-xssed <target>` |
|
||||||
|
| **smb-os-discovery** | 枚举 SMB 服务器操作系统/域信息 | `nmap --script smb-os-discovery -p 445 <target>` |
|
||||||
|
| **smb-enum-shares** | 列出共享目录(需 guest) | `nmap --script smb-enum-shares -p 445 <target>` |
|
||||||
|
| **smb-enum-users** | 提取本地/域用户列表 | `nmap --script smb-enum-users -p 445 <target>` |
|
||||||
|
| **smb-vuln-ms17-010** | 探测 EternalBlue(MS17-010) | `nmap --script smb-vuln-ms17-010 -p 445 <target>` |
|
||||||
|
| **ssh-hostkey** | 抓取并对比公钥指纹 | `nmap --script ssh-hostkey -p 22 <target>` |
|
||||||
|
| **ssh-brute** | SSH 账号密码暴力破解(需授权) | `nmap --script ssh-brute --script-args userdb=users.txt,passdb=pass.txt -p 22 <target>` |
|
||||||
|
| **ssh2-enum-algos** | 列出支持的算法与 KEX | `nmap --script ssh2-enum-algos -p 22 <target>` |
|
||||||
|
| **http-vuln-cve2023-XXXX** | 按指定 CVE 编号进行漏洞检查(替换 XXXX) | `nmap --script http-vuln-cve2023-XXXX <target>` |
|
||||||
|
| **ftp-anon** | 检测是否允许匿名登录 | `nmap --script ftp-anon -p 21 <target>` |
|
||||||
|
| **ftp-bounce** | 检查是否允许 FTP Bounce 扫描 | `nmap --script ftp-bounce -p 21 <target>` |
|
||||||
|
| **dns-zone-transfer** | 测试 AXFR(区域传输)泄露 | `nmap --script dns-zone-transfer -p 53 <target>` |
|
||||||
|
| **dns-brute** | 字典爆破子域名 | `nmap --script dns-brute --script-args dns-brute.domain=<domain>` |
|
||||||
|
| **mysql-brute** | 暴力破解 MySQL 实例 | `nmap --script mysql-brute -p 3306 <target>` |
|
||||||
|
| **mysql-audit** | 核对 MySQL CIS/基线配置 | `nmap --script mysql-audit --script-args mysql-audit.username='root',mysql-audit.password='pass123' -p 3306 <target>` |
|
||||||
|
| **ssl-cert** | 解析 TLS 证书详情 | `nmap --script ssl-cert -p 443 <target>` |
|
||||||
|
| **ssl-poodle** | 探测 SSLv3 & POODLE 漏洞 | `nmap --script ssl-poodle -p 443 <target>` |
|
||||||
|
| **vulners** | 基于 Vulners DB 的版本漏洞关联 | `nmap --script vulners -sV <target>` |
|
||||||
|
| **whois-ip** | 查询归属 IP 段的 Whois 信息 | `nmap --script whois-ip <target>` |
|
||||||
|
| **smtp-enum-users** | VRFY/EXPN 暴力枚举邮箱账户 | `nmap --script smtp-enum-users -p 25 <target>` |
|
||||||
|
|
||||||
|
### 自定义脚本
|
||||||
|
|
||||||
|
```lua[演示.lua]
|
||||||
|
-- myecho.nse
|
||||||
|
local stdnse = require "stdnse"
|
||||||
|
|
||||||
|
description = [[极简回显脚本:打印自定义消息]]
|
||||||
|
author = "YourName"
|
||||||
|
license = "GPLv2"
|
||||||
|
categories = {"safe"}
|
||||||
|
|
||||||
|
-- 任何 TCP 端口都触发
|
||||||
|
portrule = function(host,port) return port.protocol == "tcp" end
|
||||||
|
|
||||||
|
action = function(host,port)
|
||||||
|
local msg = stdnse.get_script_args("myecho.msg") or "Hi from custom-NSE!"
|
||||||
|
return ("%s -> %s:%d (%s)"):format(msg, host.ip, port.number, port.service or "unknown")
|
||||||
|
end
|
||||||
|
```
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# 复制.nse到脚本文件夹
|
||||||
|
sudo cp myecho.nse /usr/share/nmap/scripts/
|
||||||
|
nmap --script-updatedb # 更新索引
|
||||||
|
```
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# 执行脚本
|
||||||
|
nmap --script myecho -p22 127.0.0.1
|
||||||
|
nmap --script myecho --script-args 'myecho.msg=HelloNSE' -p80 scanme.nmap.org
|
||||||
|
nmap --script '(safe or discovery) and myecho' -p80,443 10.0.2.0/24
|
||||||
|
```
|
||||||
|
|
||||||
|
### 总结
|
||||||
|
NSE 脚本可大幅提升 Nmap 在渗透测试和信息收集中的效率。建议定期关注 Nmap 官方脚本库更新([NSE Docs](https://nmap.org/nsedoc/ "NSE Docs"))以覆盖最新漏洞。
|
||||||
|
|
||||||
|
|
@@ -35,15 +35,21 @@ navigation:
|
|||||||
这个页面 **尚未完成**,用于测试一些组件的语法和样式.
|
这个页面 **尚未完成**,用于测试一些组件的语法和样式.
|
||||||
::
|
::
|
||||||
|
|
||||||
<UBanner
|
|
||||||
icon="lucide-link"
|
|
||||||
to="https://lijue.net"
|
|
||||||
target="_blank"
|
|
||||||
title="点击跳转"
|
|
||||||
color="primary"
|
|
||||||
/>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
::details
|
||||||
|
::summary
|
||||||
|
### 点击我查看内容
|
||||||
|
::
|
||||||
|
这里是折叠区域的内容
|
||||||
|
可以包含任何Markdown元素:
|
||||||
|
- 段落
|
||||||
|
- 列表
|
||||||
|
- 代码块
|
||||||
|
- 图片等
|
||||||
|
::
|
||||||
|
|
||||||
|
|
||||||
|
@@ -7,8 +7,6 @@ navigation:
|
|||||||
icon: simple-icons:nuxtdotjs
|
icon: simple-icons:nuxtdotjs
|
||||||
---
|
---
|
||||||
|
|
||||||
# 文档系统新样式
|
|
||||||
|
|
||||||
## 重新对文档的样式进行了优化
|
## 重新对文档的样式进行了优化
|
||||||
- 周日在家闭关重写了十几个渲染组件。
|
- 周日在家闭关重写了十几个渲染组件。
|
||||||
- 纯古法手工敲代码,兼容 Markdown 语法.部分 css 样式由 GPT-5 生成.
|
- 纯古法手工敲代码,兼容 Markdown 语法.部分 css 样式由 GPT-5 生成.
|
||||||
|
@@ -25,7 +25,7 @@ export default defineNuxtConfig({
|
|||||||
highlight: {
|
highlight: {
|
||||||
langs:
|
langs:
|
||||||
['js', 'ts', 'jsx', 'tsx', 'js', 'json', 'bash', 'python', 'html', 'css', 'sql',
|
['js', 'ts', 'jsx', 'tsx', 'js', 'json', 'bash', 'python', 'html', 'css', 'sql',
|
||||||
'yaml', 'md', 'sh', 'go', 'java', 'c', 'cpp', 'php', 'ruby', 'swift', 'html'],
|
'yaml', 'md', 'sh', 'go', 'java','lua', 'c', 'cpp', 'php', 'ruby', 'swift', 'html'],
|
||||||
theme: {
|
theme: {
|
||||||
// Default theme (same as single string)
|
// Default theme (same as single string)
|
||||||
default: 'github-dark',
|
default: 'github-dark',
|
||||||
|
Reference in New Issue
Block a user