{"id":415,"date":"2017-03-19T21:08:00","date_gmt":"2017-03-19T13:08:00","guid":{"rendered":"http:\/\/note.systw.net\/note\/?p=415"},"modified":"2024-02-17T20:35:00","modified_gmt":"2024-02-17T12:35:00","slug":"system-hacking","status":"publish","type":"post","link":"https:\/\/systw.net\/note\/archives\/415","title":{"rendered":"system hacking"},"content":{"rendered":"\n<p>hacking cycle<br>1 enumeration<br>\u5217\u51fauser<br>2 cracking passwords<br>\u53d6\u5f97 user\u5bc6\u78bc<br>3 escalating privileges<br>\u5f9euser\u5e33\u865f\u63d0\u5347\u5230admin\u6b0a\u9650,\u76ee\u5730\u662f\u53ef\u57f7\u884c\u66f4\u591a\u7a0b\u5f0f<br>4 executing applications<br>\u57f7\u884ckeylogging,spyware&#8230;\u7b49\u8a18\u9304admin\u4f7f\u7528\u7fd2\u6163,\u4e26\u4fdd\u7559\u6a5f\u5668\u7684\u4f7f\u7528\u6b0a\u7d66\u4e0b\u4e00\u6b21\u9032\u5165\u7cfb\u7d71<br>5 hidding files<br>\u5c07\u60e1\u610f\u7a0b\u5f0f\u96b1\u85cf\u8d77\u4f86,ex:\u4f7f\u7528ntfs\u7684ads\u7279\u6027<br>6 covering tracks<br>7 steganography<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">escalating privileges<\/h2>\n\n\n\n<p><strong>\u8a2d\u6b0a\u9650\u5efa\u8b70:<\/strong><br>least possible privileges:\u6700\u5c0f\u7684\u6b0a\u9650<br>just enough privileges:\u525b\u525b\u597d\u6700\u5c0f\u7684\u6b0a\u9650<br>\u5148\u5c07\u5e33\u865f\u6240\u6709\u6b0a\u9650disable,\u5728\u6839\u64da\u9700\u6c42\u4ee5\u6700\u5c0f\u6b0a\u9650\u7684\u539f\u5247enable<\/p>\n\n\n\n<p>privilege\u8a2d\u5b9a\u5de5\u5177:<br>cacls.exe<\/p>\n\n\n\n<p><strong>\u907f\u514d\u975e\u6cd5escating privileges\u5efa\u8b70:<\/strong><br>restricting interactive logons<br>\u8981\u6c42 user\u4e0d\u80fd\u7528cmd.exe\u5b58\u53d6system programs<br>auditing success\/failure,\u5305\u62ecaccount logon events,privilege use,system events<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>if the attacker has access to a w2k sp1 server<\/strong><br>\u53ef\u4f7f\u7528ERunAs2X.exe to escalate his\/her privileges to that of system by using &#8220;nc.exe -l -p 50000 -d -e cmd.exe&#8221;<br>ps:this can also be used remotely<\/p>\n\n\n\n<p>ps:\u7528\u5f31\u9ede\u9032\u53bbwin\u7cfb\u7d71shell\u6642,\u9810\u8a2d\u6b0a\u9650\u662flocalsystem<\/p>\n\n\n\n<p><strong>if attacker\u5df2\u7d93\u9032\u5165windows system<\/strong><br>1 booting to an alternate os:ex:ntfsdos,\u5fae\u8edf\u7684minisystem<br>2 backup sam from the repair directory:sam\u5099\u4efd\u6a94\u6703\u5b58\u5728%systemroot%repair<br>3 extract the hashes from the sam:\u4f7f\u7528l0phtrack\u89e3\u958bsam<br>ps<br>sam file \u5132\u5b58win nt\/2000\u7684password,username<br>sam file is located at %systemroot%system32config<br>\u7576os is running,sam file\u6703\u88ablock<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p>privilege escalation tool:<\/p>\n\n\n\n<p><strong>active@password changer<\/strong><br>\u53ef\u904b\u4f5c\u5728win xp\/2003\/2000\/nt<\/p>\n\n\n\n<p><strong>x.exe<\/strong><br>\u7279\u8272:\u6a94\u6848\u5c0f,\u4f7f\u7528buffer overflow exploits<br>\u904b\u4f5c:\u6703\u5efax\u5e33\u865f\u4e26\u653e\u5165administrator group\u4e2d<br>ps:1 \u57f7\u884c\u6642\u9700\u5728administrator\u6b0a\u9650\u4e0b,2\u9700\u8a2d\u6cd5\u7d66\u6709administrator\u6b0a\u9650\u7684\u5e33\u865f\u57f7\u884c<br>\u4e00\u822c\u7528\u6cd5:\u5c07\u6b64\u6a94\u653e\u5165\u67d0\u500b\u6a94\u88e1\u9762,\u5728\u7d66\u5225\u4eba\u57f7\u884c<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">executing applications<\/h2>\n\n\n\n<p>tool<br>psexec:\u5728ps\u7cfb\u5217tools\u4e2d,\u53ef\u9060\u7aef\u57f7\u884c\u5176\u4ed6\u7a0b\u5f0f<br>remoexec:\u53ef\u9060\u7aef\u57f7\u884c\u5176\u4ed6\u7a0b\u5f0f,\u5716\u5f62\u5316<br>ras n map<br>alchemy remote executor:\u9060\u7aef\u57f7\u884c\u5176\u4ed6\u7a0b\u5f0f<br>emsa flexinfo pro<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p>keystroke loggers tool<\/p>\n\n\n\n<p><strong>software tool<\/strong><br>e-mail keylogger:sc-keylog,\u7528\u8907\u88fd\u8cbc\u4e0a\u7684\u8cc7\u6599\u4e5f\u6703\u8a18\u9304,\u53ef\u9060\u7aef\u5b89\u88dd\u6b64\u7a0b\u5f0f,\u53efemail\u56de\u5831<br>revealer keylogger<br>handy keylogger<br>ardamax keylogger<br>powered keylogger<br>elite keylogger<br>quick keylogger<br>spy-keylogger<br>perfect keylogger:\u652f\u63f4\u8f03\u591a\u7248\u672c,\u5305\u62ecmac,\u4e5f\u652f\u63f4screenshots<br>invisible keylogger<br>actual spy<br>spytector ftp keylogger:\u91dd\u5c0dftp<br>iks software keylogger<br>ghost keylogger:\u7db2\u8def\u9023\u7dda\u6642\u6703\u5373\u6642\u628a\u8cc7\u6599\u56de\u5831<\/p>\n\n\n\n<p><strong>hard tool<\/strong><br>hardware keylogger<br>keyboard keylogger<br>usb keylogger<br>ps:\u5167\u90e8\u4eba\u54e1\u6709\u8f03\u5927\u7684\u6a5f\u6703\u4f7f\u7528<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>sypware<\/strong><br>\u7528\u4f86\u53d6\u5f97\u4ee5\u4e0b\u8cc7\u6599<br>keystorkes<br>email messages<br>chat<br>websites visited<\/p>\n\n\n\n<p><strong>tool<\/strong><br>spector: \u8a18\u9304\u4f7f\u7528\u8005\u884c\u70ba<br>remotespy<br>spytech spyagent:\u5716\u5f62\u754c\u9762<br>oo7 spy software<br>spybuddy: \u8a18\u9304\u7db2\u8def\u884c\u70ba<br>acespy<br>keystroke spy<br>activity monitor<br>eblaster:\u8a18\u9304\u76f8\u95dc\u884c\u70ba\u6a21\u5f0f<br>stealth voice recorder:\u53ef\u5b9a\u671f\u9304\u97f3\u4e26email\u56de\u5831<br>stealth keylogger<br>stealth website logger<br>digi-watcher video survillance:\u53ef\u9304\u5f71<br>desktop spy screen capture program: \u684c\u9762\u5b8c\u6574\u8a18\u9304,\u53efscreenshot,\u4e26\u5b58\u5728\u9060\u7aef<br>telphone spy:\u8a18\u9304ip phone<br>print monitor spy tool:\u76e3\u8996\u5370\u8868\u6a5f\u72c0\u614b<br>stealth email redirector<br>wiretap professional<br>flexispy<br>pc phonehome:\u4e0a\u7dda\u6642\u6703\u56de\u5831ip\u4f4d\u7f6e<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>countermeasures tool<\/strong><br>anti-keylogger<br>anvanced antii keylogger<br>privacykeyboard:\u505a\u5728keyboard\u4e2d\u9593<br>spy hunter-spyware remover<br>spy sweeper:detects and removes more traces of spyware including trojans,adware,keyloggers,system monitoring tool<br>spyware terminator<br>wincleaner antispyware<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>hiding files<\/strong><\/h2>\n\n\n\n<p>attrib:\u8a2d\u5b9ahide\u5c6c\u6027<br>rootkit:\u963b\u64cb\u56de\u5831\u7cfb\u7d71\u9054\u5230\u96b1\u85cf\u6548\u679c<br>ntfs ads<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p>attrib\u7bc4\u4f8b<br>ex:<br>ATTRIB +S +H file<br>ATTRIB +H C:file<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>rootkit<\/strong><br>hide processes from the process list, can hide files, registry entries, and intercept keystrokes.<br>primary objective of a rootkit:It replaces legitimate programs<\/p>\n\n\n\n<p>\u4e3b\u8981\u662ffile\u3001process\u3001system log\u7684\u96b1\u85cf\u6280\u8853\uff0c\u548cpacket\u3001keylogger\u7684\u6514\u622a\u7aca\u807d\u6280\u8853\u7b49&nbsp;<br>Rootkit\u6280\u8853\u901a\u904e\u4fee\u6539\u9019\u4e9b\u8cc7\u6599\u7d50\u69cb\u4f86\u96b1\u85cf\u5176\u5b83\u7a0b\u5f0f\u7684process\u3001file\u3001network communcation\u548c\u5176\u5b83\u76f8\u95dc\u8cc7\u8a0a<br>ex:<br>\u4fee\u6539OS\u7684EPROCESS\u9023\u7d50\u4e32\u5217\u7d50\u69cb\u53ef\u96b1\u85cf\u884c\u7a0b<br>hook\u670d\u52d9\u547c\u53eb\u8868\u53ef\u96b1\u85cf\u6a94\u6848\u548c\u76ee\u9304<br>hook\u4e2d\u65b7\u63cf\u8ff0\u7b26\u8868\u53ef\u76e3\u807d\u9375\u76e4\u8f38\u5165<br>ps:<br>\u5f88\u591a\u6728\u99ac\u90fd\u7528\u9019\u4e9b\u6280\u8853\uff0c\u56e0\u6b64\u6728\u99ac\u4e5f\u53ef\u8996\u70baRootkit\u7684\u4e00\u7a2e<br>Rootkit\u4e00\u8a5e\u6700\u65e9\u51fa\u73fe\u5728Unix\u4e0a\u3002Attacker\u70ba\u4e86\u53d6\u5f97root\u6b0a\u9650\uff0c\u6216\u6e05\u9664\u5165\u4fb5\u8a18\u9304\uff0c\u6703\u91cd\u65b0compiler\u4e00\u4e9b\u6307\u4ee4\u5de5\u5177\uff0c\u4e5f\u7a31\u70bakit\uff0c\u50cf\u662f\u91cd\u505aps\u3001netstat\u3001passwd\u7b49\u5de5\u5177&nbsp;<br>rootkit \u5728unix\u7cfb\u7d71\u8f03\u9ebb\u7169,\u56e0unix\u53ef\u76f4\u63a5\u63dbkernel,\u53ef\u63db\u6210\u542brootkit\u7684kernel,\u96e3\u4ee5\u5075\u6e2c<\/p>\n\n\n\n<p><strong>rootkit tool<\/strong><br>fu<br>afx<br>nuclear<br>vanquish<\/p>\n\n\n\n<p><strong>rootkit countermeasures<\/strong><br>\u5b9a\u671f\u5099\u4efd\u8cc7\u6599<br>\u5b89\u88dd\u6642\u505a\u8a18\u9304<br>\u4f7f\u7528patchfinder<br>\u4f7f\u7528 rootkitrevealer<\/p>\n\n\n\n<p><strong>rootkit detection tool:<\/strong><br>blacklight<br>rootkitrevealer<br>malicious software removal tool<br>PC Hunter<br>gMER<br>Rootkit Unhooker<br>IceSword<br>Kernel Detective<br>XueTr<\/p>\n\n\n\n<p><strong>rootkit detection common function summary for below:<\/strong><br>Hidden processes, hidden DLLs, hidden threads, hidden kernel drivers, hidden services, hidden files, and hidden Registry keys<br>Alternate data stream<br>Import Address Table (IAT) hooks, Export Address Table (EAT) hooks, and inline hooks<br>System Service Dispatch Table (SSDT) hooks<br>Interrupt Descriptor Table (IDT) hooks<br>Hooked I\/O Request Packet (IRP) routines in kernel drivers<br>Suspicious modifications of the Master Boot Record (MBR)<br>Suspicious layered drivers or attached devices<br>Drivers whose entry points land in suspicious PE sections, such as the .rsrc section. This indicates a rootkit may have patched the driver on disk.<br>Processes with mismatched section permissions (for example, an executable .rdata section)<\/p>\n\n\n\n<p>If a rootkit is discovered<br>you will need to reload from known good media. This typically means performing a complete reinstall<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>ADS(alternate data streaming)<\/strong><br>\u4f5c\u7528\u5728NTFS\u683c\u5f0f\u4e0a<br>\u53efhide file<br>\u5c07a\u6a94\u6848\u9644\u52a0\u5728b\u6a94\u6848\u4e0a,\u800c\u4e14b\u6a94\u6848\u5927\u5c0f\u4e0d\u8b8a<\/p>\n\n\n\n<p><strong>how to create ntfs steam<\/strong><br>1 to move the contents of trojan.exe to readme.txt<br>ex:type c:trojan.exe &gt; c:readme.txt:trojan.exe<br>2 to execute the trojan.exe inside readme.txt<br>ex:start c:readme.txt:trojan.exe<br>3 extract the trojan.exe from readme.txt<br>ex:cat c:readme.txt:trojan.exe &gt; trojan.exe<\/p>\n\n\n\n<p><strong>\u907f\u514dads countermeasures<\/strong><br>\u4e0d\u4f7f\u7528ntfs,\u4f7f\u7528fat<\/p>\n\n\n\n<p>ntfs stream detectors tool:<br>ads spy<br>ads tools<\/p>\n\n\n\n<p>usb dumper:hacking tool<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>steganography<\/strong><\/h2>\n\n\n\n<p>hiding of a secret message within an ordinary message and the extration of it at its destination<br>\u901a\u5e38\u96b1\u85cf\u5728\u5716\u7247\u4e2d<\/p>\n\n\n\n<p><strong>steganography tool:<\/strong><br>\u7279\u7570\u6027\u9ad8,\u96b1\u85cf\u8cc7\u6599\u7684\u5de5\u5177\u53ea\u6709\u8a72\u5de5\u5177\u53ef\u89e3<br>merge streams: \u5c07\u6587\u5b57\u8207\u53e6\u5916\u4e00\u500b\u6a94\u6848\u5408\u5728\u4e00\u8d77,\u53ea\u80fd\u5408\u4f75word\u548cexcel<br>invisible folders:\u9078\u64c7\u67d0\u4e00\u500b\u6a94\u6848\u96b1\u85cf<br>invisible secrets:hide file\u548cunhide file,\u4ee5\u53ca\u5176\u4ed6\u529f\u80fd<br>image hide<br>stealth files<br>steganography<br>masker steganography tool<br>hermetic stego<br>dcpp<br>camera\/shy:\u85cf\u5728gif<br>www.spammimic.com:online\u5de5\u5177,\u96b1\u85cf\u6587\u5b57<br>mp3stego: \u5229\u7528\u97f3\u6a02\u683c\u5f0f<br>snow.exe:hide the data on the cd&#8217;s and usb flash drivers<br>fortknox<br>blindside<br>s-tools<br>steghide<br>steganos<br>pretty good envelop<br>gifshuffle<br>jphide,jpseek<br>wbstego<br>outguess<br>data stash<br>hydan<br>cloak<br>steganote<br>stegomagic<br>steganos security suite<br>sams big play maker<br>video steganography:\u5c07\u8cc7\u6599\u653e\u5165\u5f71\u50cf<\/p>\n\n\n\n<p><strong>detect steganography<\/strong><br>steganalysis tools<br>stegdetect:\u5075\u6e2c\u85cf\u5728\u5716\u7247\u4e2d\u7684\u96b1\u85cf\u8cc7\u6599<br>sids(stego intrusion detection system)<br>high level view<br>stego watch-steg<br>stegspy<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>covering tracks<\/strong><br>disabling auditing<br>ex:auditpol<br>clearing event log<br>ex:dumpel<\/p>\n\n\n\n<p><strong>windows log<\/strong><br>\u5b89\u5168\u65e5\u8a8c:%winsystem%\\system32\\config\\Secevent.evt<br>ps:brute force log\u6703\u5728secevent.evt\u51fa\u73fe<br>\u61c9\u7528\u7a0b\u5f0f\u65e5\u8a8c:%winsystem%\\system32\\config\\AppEvent.evt<br>\u7cfb\u7d71\u65e5\u8a8c:%winsystem%\\system32\\config\\SysEvent.evt<\/p>\n\n\n\n<p><strong>tool<\/strong><br>elsave.exe:\u53ef\u6e05 log\u6a94\u6848<br>winzapper<br>evidence eliminator:\u91dd\u5c0d\u6b77\u53f2\u8a18\u9304\u505a\u6e05\u9664,\u53ef\u505a\u975e\u5e38\u5b8c\u6574\u7684format<br>traceless:\u91dd\u5c0d\u7db2\u9801\u700f\u89bd\u8a18\u9304<br>tracks eraser pro<br>armor tools<br>zerotrack<\/p>\n","protected":false},"excerpt":{"rendered":"<p>hacking cycle1 enumeration\u5217\u51faus &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[39],"tags":[],"class_list":["post-415","post","type-post","status-publish","format-standard","hentry","category-concept"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/comments?post=415"}],"version-history":[{"count":0,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/415\/revisions"}],"wp:attachment":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/media?parent=415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/categories?post=415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/tags?post=415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}