<!DOCTYPE html>
<html lang="zh-CN">
<head>
  <meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=2">
<meta name="theme-color" content="#222">
<meta name="generator" content="Hexo 5.3.0">
  <link rel="apple-touch-icon" sizes="180x180" href="/images/avatar.jpg">
  <link rel="icon" type="image/png" sizes="32x32" href="/images/avatar.jpg">
  <link rel="icon" type="image/png" sizes="16x16" href="/images/avatar.jpg">
  <link rel="mask-icon" href="/images/logo.svg" color="#222">

<link rel="stylesheet" href="/css/main.css">


<link rel="stylesheet" href="/lib/font-awesome/css/font-awesome.min.css">

<script id="hexo-configurations">
    var NexT = window.NexT || {};
    var CONFIG = {"hostname":"yoursite.com","root":"/","scheme":"Mist","version":"7.7.2","exturl":false,"sidebar":{"position":"left","display":"post","padding":18,"offset":12,"onmobile":false},"copycode":{"enable":false,"show_result":false,"style":null},"back2top":{"enable":true,"sidebar":false,"scrollpercent":false},"bookmark":{"enable":false,"color":"#222","save":"auto"},"fancybox":false,"mediumzoom":false,"lazyload":false,"pangu":false,"comments":{"style":"tabs","active":null,"storage":true,"lazyload":false,"nav":null},"algolia":{"hits":{"per_page":10},"labels":{"input_placeholder":"Search for Posts","hits_empty":"We didn't find any results for the search: ${query}","hits_stats":"${hits} results found in ${time} ms"}},"localsearch":{"enable":false,"trigger":"auto","top_n_per_article":1,"unescape":false,"preload":false},"motion":{"enable":true,"async":false,"transition":{"post_block":"fadeIn","post_header":"slideDownIn","post_body":"slideDownIn","coll_header":"slideLeftIn","sidebar":"slideUpIn"}}};
  </script>

  <meta name="description" content="后渗透基础">
<meta property="og:type" content="article">
<meta property="og:title" content="PTES渗透测试执行标准">
<meta property="og:url" content="http://yoursite.com/2021/01/24/security/PTES%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E6%89%A7%E8%A1%8C%E6%A0%87%E5%87%86/index.html">
<meta property="og:site_name" content="Shouquan">
<meta property="og:description" content="后渗透基础">
<meta property="og:locale" content="zh_CN">
<meta property="article:published_time" content="2021-01-24T11:53:40.407Z">
<meta property="article:modified_time" content="2021-01-25T03:38:26.806Z">
<meta property="article:author" content="shou quan">
<meta property="article:tag" content="渗透执行标准">
<meta name="twitter:card" content="summary">

<link rel="canonical" href="http://yoursite.com/2021/01/24/security/PTES%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E6%89%A7%E8%A1%8C%E6%A0%87%E5%87%86/">


<script id="page-configurations">
  // https://hexo.io/docs/variables.html
  CONFIG.page = {
    sidebar: "",
    isHome : false,
    isPost : true
  };
</script>

  <title>PTES渗透测试执行标准 | Shouquan</title>
  






  <noscript>
  <style>
  .use-motion .brand,
  .use-motion .menu-item,
  .sidebar-inner,
  .use-motion .post-block,
  .use-motion .pagination,
  .use-motion .comments,
  .use-motion .post-header,
  .use-motion .post-body,
  .use-motion .collection-header { opacity: initial; }

  .use-motion .site-title,
  .use-motion .site-subtitle {
    opacity: initial;
    top: initial;
  }

  .use-motion .logo-line-before i { left: initial; }
  .use-motion .logo-line-after i { right: initial; }
  </style>
</noscript>

</head>

<body itemscope itemtype="http://schema.org/WebPage">
  <div class="container use-motion">
    <div class="headband"></div>

    <header class="header" itemscope itemtype="http://schema.org/WPHeader">
      <div class="header-inner"><div class="site-brand-container">
  <div class="site-nav-toggle">
    <div class="toggle" aria-label="切换导航栏">
      <span class="toggle-line toggle-line-first"></span>
      <span class="toggle-line toggle-line-middle"></span>
      <span class="toggle-line toggle-line-last"></span>
    </div>
  </div>

  <div class="site-meta">

    <div>
      <a href="/" class="brand" rel="start">
        <span class="logo-line-before"><i></i></span>
        <span class="site-title">Shouquan</span>
        <span class="logo-line-after"><i></i></span>
      </a>
    </div>
  </div>

  <div class="site-nav-right">
    <div class="toggle popup-trigger">
    </div>
  </div>
</div>


<nav class="site-nav">
  
  <ul id="menu" class="menu">
        <li class="menu-item menu-item-home">

    <a href="/" rel="section"><i class="fa fa-fw fa-home"></i>首页</a>

  </li>
        <li class="menu-item menu-item-about">

    <a href="/about/" rel="section"><i class="fa fa-fw fa-user"></i>关于</a>

  </li>
        <li class="menu-item menu-item-tags">

    <a href="/tags/" rel="section"><i class="fa fa-fw fa-tags"></i>标签</a>

  </li>
        <li class="menu-item menu-item-categories">

    <a href="/categories/" rel="section"><i class="fa fa-fw fa-th"></i>分类</a>

  </li>
        <li class="menu-item menu-item-archives">

    <a href="/archives/" rel="section"><i class="fa fa-fw fa-archive"></i>归档</a>

  </li>
        <li class="menu-item menu-item-sitemap">

    <a href="/sitemap.xml" rel="section"><i class="fa fa-fw fa-sitemap"></i>站点地图</a>

  </li>
  </ul>

</nav>
</div>
    </header>

    
  <div class="back-to-top">
    <i class="fa fa-arrow-up"></i>
    <span>0%</span>
  </div>


    <main class="main">
      <div class="main-inner">
        <div class="content-wrap">
          

          <div class="content">
            

  <div class="posts-expand">
      
  
  
  <article itemscope itemtype="http://schema.org/Article" class="post-block " lang="zh-CN">
    <link itemprop="mainEntityOfPage" href="http://yoursite.com/2021/01/24/security/PTES%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E6%89%A7%E8%A1%8C%E6%A0%87%E5%87%86/">

    <span hidden itemprop="author" itemscope itemtype="http://schema.org/Person">
      <meta itemprop="image" content="/images/avatar.jpg">
      <meta itemprop="name" content="shou quan">
      <meta itemprop="description" content="">
    </span>

    <span hidden itemprop="publisher" itemscope itemtype="http://schema.org/Organization">
      <meta itemprop="name" content="Shouquan">
    </span>
      <header class="post-header">
        <h1 class="post-title" itemprop="name headline">
          PTES渗透测试执行标准
        </h1>

        <div class="post-meta">
            <span class="post-meta-item">
              <span class="post-meta-item-icon">
                <i class="fa fa-calendar-o"></i>
              </span>
              <span class="post-meta-item-text">发表于</span>

              <time title="创建时间：2021-01-24 19:53:40" itemprop="dateCreated datePublished" datetime="2021-01-24T19:53:40+08:00">2021-01-24</time>
            </span>
              <span class="post-meta-item">
                <span class="post-meta-item-icon">
                  <i class="fa fa-calendar-check-o"></i>
                </span>
                <span class="post-meta-item-text">更新于</span>
                <time title="修改时间：2021-01-25 11:38:26" itemprop="dateModified" datetime="2021-01-25T11:38:26+08:00">2021-01-25</time>
              </span>
            <span class="post-meta-item">
              <span class="post-meta-item-icon">
                <i class="fa fa-folder-o"></i>
              </span>
              <span class="post-meta-item-text">分类于</span>
                <span itemprop="about" itemscope itemtype="http://schema.org/Thing">
                  <a href="/categories/%E6%B8%97%E9%80%8F/" itemprop="url" rel="index"><span itemprop="name">渗透</span></a>
                </span>
            </span>

          
            <span id="/2021/01/24/security/PTES%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E6%89%A7%E8%A1%8C%E6%A0%87%E5%87%86/" class="post-meta-item leancloud_visitors" data-flag-title="PTES渗透测试执行标准" title="阅读次数">
              <span class="post-meta-item-icon">
                <i class="fa fa-eye"></i>
              </span>
              <span class="post-meta-item-text">阅读次数：</span>
              <span class="leancloud-visitors-count"></span>
            </span>
  
  <span class="post-meta-item">
    
      <span class="post-meta-item-icon">
        <i class="fa fa-comment-o"></i>
      </span>
      <span class="post-meta-item-text">Valine：</span>
    
    <a title="valine" href="/2021/01/24/security/PTES%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E6%89%A7%E8%A1%8C%E6%A0%87%E5%87%86/#valine-comments" itemprop="discussionUrl">
      <span class="post-comments-count valine-comment-count" data-xid="/2021/01/24/security/PTES%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E6%89%A7%E8%A1%8C%E6%A0%87%E5%87%86/" itemprop="commentCount"></span>
    </a>
  </span>
  
  

        </div>
      </header>

    
    
    
    <div class="post-body" itemprop="articleBody">

      
        <p>后渗透基础</p>
<a id="more"></a>
<h1 id="前期交互"><a href="#前期交互" class="headerlink" title="前期交互"></a>前期交互</h1><p>确认渗透测试的范围、目标、限制条件以及服务合同细节。该阶段通常涉及收集客户需求、准备测试计划、定义测试范围和边界、定义业务目标、项目管理与规划等活动。</p>
<h1 id="情报收集"><a href="#情报收集" class="headerlink" title="情报收集"></a>情报收集</h1><p>利用各种信息来源与搜索技术，获取目标的相关信息，包括目标的网络拓扑，系统配置，安全防御措施等等。</p>
<h2 id="针对web服务的信息搜集"><a href="#针对web服务的信息搜集" class="headerlink" title="针对web服务的信息搜集"></a>针对web服务的信息搜集</h2><p>具体针对web服务的信息搜集主要包括</p>
<p>网站真实IP、操作系统、语言、服务器、数据库、主机端口、子域名、CMS等等，并通过子域名挖掘等方式扩大攻击面。</p>
<p>获取服务器主机版本，服务器采用的框架，具体的业务类型等。</p>
<h1 id="威胁建模"><a href="#威胁建模" class="headerlink" title="威胁建模"></a>威胁建模</h1><p>利用上一阶段获取到的信息进行威胁建模和攻击规划，从大量的信息情报中理清思路，构造攻击树，确定出最可行的攻击路径。</p>
<p>威胁建模：利用获取到的信息来识别目标可能存在的漏洞或者缺陷，因为攻击的目的实际是获取资产，因此威胁建模可以针对资产进行有针对性的分析。</p>
<p>攻击规划：根据威胁模型确定下一步要搜集的信息和攻击方法。威胁模型建立后，可以分析具体的攻击方法，这个过程中也会伴随着威胁模型的调整。</p>
<h1 id="漏洞分析"><a href="#漏洞分析" class="headerlink" title="漏洞分析"></a>漏洞分析</h1><p>确定可行的攻击路径之后，需要考虑如何取得目标系统的访问控制权，在该阶段，渗透测试人员需要从和分析前几个阶段获取汇总的情报和信息，找出攻击点并验证</p>
<p>例如可以借助之前收集的版本信息，获取对应版本可能存在的CVE漏洞并进行验证；分析主机开放的各个端口，各个端口存在的漏洞；分析具体页面可能存在的注入点、可能的代码执行漏洞；分析业务存在的逻辑漏洞(例如修改任意用户密码)等等；</p>
<h1 id="漏洞攻击"><a href="#漏洞攻击" class="headerlink" title="漏洞攻击"></a>漏洞攻击</h1><p>利用找到的目标系统安全漏洞，入侵系统，获取系统权限。漏洞攻击主要通过构造bypass绕过安全限制来使针对漏洞的payload起作用，实现具体的打点，切入目标。</p>
<p>在这一过程中，系统一般都会有多种防御技术，例如IDS、IPS、WAF、防火墙、编码、加密、黑/白名单等等，在攻击过程中需要针对这些防御构造针对性的bypass。有些时候对于某些点在互联网上有通用的利用，但对于一些特殊情况需要攻击者根据实际情况来量身定制bypass</p>
<h1 id="后渗透"><a href="#后渗透" class="headerlink" title="后渗透"></a>后渗透</h1><p>后渗透的目的是为了保持对目标的控制权和利用被控制的目标对组织环境进一步进行渗透，就是权限维持和内网渗透，</p>
<p>权限维持就是提权及保持对系统的持续访问，很多时候漏洞攻击阶段拿到的可能是一个webshell，拥有一些基础的权限，此时以此为基础继续寻找并利用漏洞进行提权；持续访问也可以说是留后门，攻击者留下伪装的木马文件等内容，以便下次访问目标</p>
<p>内网渗透是指攻击者以获取到的服务器为基础，对其所在的内网环境进行渗透，获取目标组织更多的服务器和资产</p>
<p>最后攻击者通过清楚日志，隐藏文件等方式隐藏自己的行为</p>
<h1 id="报告"><a href="#报告" class="headerlink" title="报告"></a>报告</h1><p>渗透测试最终向客户组织提交报告，报告内容包括发现的问题、问题可能产生的影响、修补方案等等，主体为执行概要和技术报告</p>
<p>执行概要包括测试背景和测试结果，背景介绍测试目的，用到的技术，相关风险及对策等。测试结果主要是汇总发现的问题，对问题进行评分(CVSS等)并给出解决途径</p>
<p>技术报告主要包括测试的技术细节，描述发现的问题，攻击路径、影响和修复建议。帮助客户更好地理解问题所在，也方便之后进行漏洞复查，形成矩阵跟踪闭环。</p>
<h1 id="参考"><a href="#参考" class="headerlink" title="参考"></a>参考</h1><p><a target="_blank" rel="noopener" href="https://www.jianshu.com/p/92dfdbe8bb8a">https://www.jianshu.com/p/92dfdbe8bb8a</a></p>
<p><a target="_blank" rel="noopener" href="https://www.cnblogs.com/lsdb/p/7526414.html">https://www.cnblogs.com/lsdb/p/7526414.html</a></p>
<p><a target="_blank" rel="noopener" href="https://blog.csdn.net/kellyruan/article/details/51094599">https://blog.csdn.net/kellyruan/article/details/51094599</a></p>

    </div>

    
    
    

      <footer class="post-footer">
      <div>
     
       
<div class="my_post_copyright">
<div style="text-align:center;color: #ccc;font-size:14px;">
------ 版权信息 ------</div>
 <script src="//cdn.bootcss.com/clipboard.js/1.5.10/clipboard.min.js"></script>
 
 <p><span>本文标题:</span><a href="/2021/01/24/security/PTES%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E6%89%A7%E8%A1%8C%E6%A0%87%E5%87%86/">PTES渗透测试执行标准</a></p>
 <p><span>文章作者:</span><a href="/" title="访问  的个人博客"></a></p>
 <p><span>原始链接:</span><a href="/2021/01/24/security/PTES%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E6%89%A7%E8%A1%8C%E6%A0%87%E5%87%86/" title="PTES渗透测试执行标准">http://yoursite.com/2021/01/24/security/PTES%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E6%89%A7%E8%A1%8C%E6%A0%87%E5%87%86/</a>
    <span class="copy-path"  title="点击复制文章链接"><i class="fa fa-clipboard" data-clipboard-text="http://yoursite.com/2021/01/24/security/PTES%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E6%89%A7%E8%A1%8C%E6%A0%87%E5%87%86/"  aria-label="复制成功！"></i></span>
 </p>
 <p><span>许可协议:</span><a rel="license" href="https://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" title="Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)">本博客所有文章除特别声明外，均采用<i class="fa fa-creative-commons"></i>BY-NC-SA 许可协议。转载请注明出处！</a></p>  
</div>
<script> 
   var clipboard = new Clipboard('.fa-clipboard');
   $(".fa-clipboard").click(function(){
     clipboard.on('success', function(){
       swal({   
         title: "",   
         text: '复制成功',
         icon: "success", 
         showConfirmButton: true
         });
 	 });
   });  
</script>


     
</div>
          <div class="post-tags">
              <a href="/tags/%E6%B8%97%E9%80%8F%E6%89%A7%E8%A1%8C%E6%A0%87%E5%87%86/" rel="tag"># 渗透执行标准</a>
          </div>

        


        
    <div class="post-nav">
      <div class="post-nav-item">
    <a href="/2021/01/24/security/%E6%94%BB%E5%87%BB%E9%93%BE%E6%A8%A1%E5%9E%8B/" rel="prev" title="攻击链模型">
      <i class="fa fa-chevron-left"></i> 攻击链模型
    </a></div>
      <div class="post-nav-item">
    <a href="/2021/01/24/security/%E5%BA%8F%E5%88%97%E5%8C%96/" rel="next" title="序列化与反序列化">
      序列化与反序列化 <i class="fa fa-chevron-right"></i>
    </a></div>
    </div>
      </footer>
    
  </article>
  
  
  

  </div>


          </div>
          
    <div class="comments" id="valine-comments"></div>

<script>
  window.addEventListener('tabs:register', () => {
    let activeClass = CONFIG.comments.activeClass;
    if (CONFIG.comments.storage) {
      activeClass = localStorage.getItem('comments_active') || activeClass;
    }
    if (activeClass) {
      let activeTab = document.querySelector(`a[href="#comment-${activeClass}"]`);
      if (activeTab) {
        activeTab.click();
      }
    }
  });
  if (CONFIG.comments.storage) {
    window.addEventListener('tabs:click', event => {
      if (!event.target.matches('.tabs-comment .tab-content .tab-pane')) return;
      let commentClass = event.target.classList[1];
      localStorage.setItem('comments_active', commentClass);
    });
  }
</script>

        </div>
          
  
  <div class="toggle sidebar-toggle">
    <span class="toggle-line toggle-line-first"></span>
    <span class="toggle-line toggle-line-middle"></span>
    <span class="toggle-line toggle-line-last"></span>
  </div>

  <aside class="sidebar">
    <div class="sidebar-inner">

      <ul class="sidebar-nav motion-element">
        <li class="sidebar-nav-toc">
          文章目录
        </li>
        <li class="sidebar-nav-overview">
          站点概览
        </li>
      </ul>

      <!--noindex-->
      <div class="post-toc-wrap sidebar-panel">
          <div class="post-toc motion-element"><ol class="nav"><li class="nav-item nav-level-1"><a class="nav-link" href="#%E5%89%8D%E6%9C%9F%E4%BA%A4%E4%BA%92"><span class="nav-number">1.</span> <span class="nav-text">前期交互</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E6%83%85%E6%8A%A5%E6%94%B6%E9%9B%86"><span class="nav-number">2.</span> <span class="nav-text">情报收集</span></a><ol class="nav-child"><li class="nav-item nav-level-2"><a class="nav-link" href="#%E9%92%88%E5%AF%B9web%E6%9C%8D%E5%8A%A1%E7%9A%84%E4%BF%A1%E6%81%AF%E6%90%9C%E9%9B%86"><span class="nav-number">2.1.</span> <span class="nav-text">针对web服务的信息搜集</span></a></li></ol></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E5%A8%81%E8%83%81%E5%BB%BA%E6%A8%A1"><span class="nav-number">3.</span> <span class="nav-text">威胁建模</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90"><span class="nav-number">4.</span> <span class="nav-text">漏洞分析</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E6%BC%8F%E6%B4%9E%E6%94%BB%E5%87%BB"><span class="nav-number">5.</span> <span class="nav-text">漏洞攻击</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E5%90%8E%E6%B8%97%E9%80%8F"><span class="nav-number">6.</span> <span class="nav-text">后渗透</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E6%8A%A5%E5%91%8A"><span class="nav-number">7.</span> <span class="nav-text">报告</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E5%8F%82%E8%80%83"><span class="nav-number">8.</span> <span class="nav-text">参考</span></a></li></ol></div>
      </div>
      <!--/noindex-->

      <div class="site-overview-wrap sidebar-panel">
        <div class="site-author motion-element" itemprop="author" itemscope itemtype="http://schema.org/Person">
    <img class="site-author-image" itemprop="image" alt="shou quan"
      src="/images/avatar.jpg">
  <p class="site-author-name" itemprop="name">shou quan</p>
  <div class="site-description" itemprop="description"></div>
</div>
<div class="site-state-wrap motion-element">
  <nav class="site-state">
      <div class="site-state-item site-state-posts">
          <a href="/archives/">
        
          <span class="site-state-item-count">26</span>
          <span class="site-state-item-name">日志</span>
        </a>
      </div>
      <div class="site-state-item site-state-categories">
            <a href="/categories/">
          
        <span class="site-state-item-count">13</span>
        <span class="site-state-item-name">分类</span></a>
      </div>
      <div class="site-state-item site-state-tags">
            <a href="/tags/">
          
        <span class="site-state-item-count">22</span>
        <span class="site-state-item-name">标签</span></a>
      </div>
  </nav>
</div>


  <div class="links-of-blogroll motion-element">
    <div class="links-of-blogroll-title">
      <i class="fa fa-fw fa-link"></i>
      小伙伴们
    </div>
    <ul class="links-of-blogroll-list">
        <li class="links-of-blogroll-item">
          <a href="http://zkwanp.com/" title="http:&#x2F;&#x2F;zkwanp.com" rel="noopener" target="_blank">这款顽皮</a>
        </li>
        <li class="links-of-blogroll-item">
          <a href="http://www.xiaoludingding.top/" title="http:&#x2F;&#x2F;www.xiaoludingding.top" rel="noopener" target="_blank">小鹿叮叮纸尿裤</a>
        </li>
    </ul>
  </div>

      </div>

    </div>
  </aside>
  <div id="sidebar-dimmer"></div>


      </div>
    </main>

    <footer class="footer">
      <div class="footer-inner">
        

<div class="copyright">
  
  &copy; 
  <span itemprop="copyrightYear">2021</span>
  <span class="with-love">
    <i class="fa fa-user"></i>
  </span>
  <span class="author" itemprop="copyrightHolder">shou quan</span>
</div>
  <div class="powered-by">由 <a href="https://hexo.io/" class="theme-link" rel="noopener" target="_blank">Hexo</a> 强力驱动 v5.3.0
  </div>
  <span class="post-meta-divider">|</span>
  <div class="theme-info">主题 – <a href="https://mist.theme-next.org/" class="theme-link" rel="noopener" target="_blank">NexT.Mist</a> v7.7.2
  </div>

        








      </div>
    </footer>
  </div>

  
  <script src="/lib/anime.min.js"></script>
  <script src="/lib/velocity/velocity.min.js"></script>
  <script src="/lib/velocity/velocity.ui.min.js"></script>

<script src="/js/utils.js"></script>

<script src="/js/motion.js"></script>


<script src="/js/schemes/muse.js"></script>


<script src="/js/next-boot.js"></script>




  















  

  


<script>
NexT.utils.loadComments(document.querySelector('#valine-comments'), () => {
  NexT.utils.getScript('//unpkg.com/valine/dist/Valine.min.js', () => {
    var GUEST = ['nick', 'mail', 'link'];
    var guest = 'nick,mail,link';
    guest = guest.split(',').filter(item => {
      return GUEST.includes(item);
    });
    new Valine({
      el         : '#valine-comments',
      verify     : false,
      notify     : false,
      appId      : 'eTrO8AWvxgIw1eLbKw8iikkE-gzGzoHsz',
      appKey     : 'EcMtYpxCRefmUxWAVnp1NEn2',
      placeholder: "快来·~ ◑ω◐",
      avatar     : 'mm',
      meta       : guest,
      pageSize   : '10' || 10,
      visitor    : true,
      lang       : 'zh-cn' || 'zh-cn',
      path       : location.pathname,
      recordIP   : true,
      serverURLs : ''
    });
  }, window.Valine);
});
</script>

</body>
</html>
