<!DOCTYPE html>



  


<html class="theme-next muse use-motion" lang="zh-Hans">
<head><meta name="generator" content="Hexo 3.9.0">
  <meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1">
<meta name="theme-color" content="#222">









<meta http-equiv="Cache-Control" content="no-transform">
<meta http-equiv="Cache-Control" content="no-siteapp">
















  
  
  <link href="/blog/lib/fancybox/source/jquery.fancybox.css?v=2.1.5" rel="stylesheet" type="text/css">







<link href="/blog/lib/font-awesome/css/font-awesome.min.css?v=4.6.2" rel="stylesheet" type="text/css">

<link href="/blog/css/main.css?v=5.1.4" rel="stylesheet" type="text/css">


  <link rel="apple-touch-icon" sizes="180x180" href="/blog/images/apple-touch-icon-next.png?v=5.1.4">


  <link rel="icon" type="image/png" sizes="32x32" href="/blog/images/favicon-32x32-next.png?v=5.1.4">


  <link rel="icon" type="image/png" sizes="16x16" href="/blog/images/favicon-16x16-next.png?v=5.1.4">


  <link rel="mask-icon" href="/blog/images/logo.svg?v=5.1.4" color="#222">





  <meta name="keywords" content="读写文件,系统表,show,hashcat,">










<meta name="description" content="目的 如何利用数据库的功能读写文件，需要什么样的条件才可以读写 学习数据库系统表的功能，如何利用SQL语句查询库名、表名、字段名、内容以及当前用户等基本信息。 尝试查询出用户的hash，并使用hashcat来对获取的hash进行暴力破解  MySQL读写文件读文件：背景知识MySQL有2种读取文件的方法：load_file()、load data infile（在对文件进行读写的时候需要相对应的操">
<meta name="keywords" content="读写文件,系统表,show,hashcat">
<meta property="og:type" content="article">
<meta property="og:title" content="数据库系统表相关学习">
<meta property="og:url" content="https://gitee.com/blghost/blog.git/2019/10/07/数据库系统表相关学习/index.html">
<meta property="og:site_name" content="Hexo">
<meta property="og:description" content="目的 如何利用数据库的功能读写文件，需要什么样的条件才可以读写 学习数据库系统表的功能，如何利用SQL语句查询库名、表名、字段名、内容以及当前用户等基本信息。 尝试查询出用户的hash，并使用hashcat来对获取的hash进行暴力破解  MySQL读写文件读文件：背景知识MySQL有2种读取文件的方法：load_file()、load data infile（在对文件进行读写的时候需要相对应的操">
<meta property="og:locale" content="zh-Hans">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570512801339.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570513200148.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570513882262.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570514897058.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570516699258.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570874177412.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571035759430.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571036670357.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571036961521.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571037454088.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571037550503.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571038702803.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571038802519.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571038906567.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571039029776.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571384854383.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571384886260.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571386115712.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571386127521.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571386339462.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571387130517.png">
<meta property="og:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571465471087.png">
<meta property="og:updated_time" content="2019-10-20T06:45:59.706Z">
<meta name="twitter:card" content="summary">
<meta name="twitter:title" content="数据库系统表相关学习">
<meta name="twitter:description" content="目的 如何利用数据库的功能读写文件，需要什么样的条件才可以读写 学习数据库系统表的功能，如何利用SQL语句查询库名、表名、字段名、内容以及当前用户等基本信息。 尝试查询出用户的hash，并使用hashcat来对获取的hash进行暴力破解  MySQL读写文件读文件：背景知识MySQL有2种读取文件的方法：load_file()、load data infile（在对文件进行读写的时候需要相对应的操">
<meta name="twitter:image" content="c:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570512801339.png">



<script type="text/javascript" id="hexo.configurations">
  var NexT = window.NexT || {};
  var CONFIG = {
    root: '/blog/',
    scheme: 'Muse',
    version: '5.1.4',
    sidebar: {"position":"left","display":"post","offset":12,"b2t":false,"scrollpercent":false,"onmobile":false},
    fancybox: true,
    tabs: true,
    motion: {"enable":true,"async":false,"transition":{"post_block":"fadeIn","post_header":"slideDownIn","post_body":"slideDownIn","coll_header":"slideLeftIn","sidebar":"slideUpIn"}},
    duoshuo: {
      userId: '0',
      author: '博主'
    },
    algolia: {
      applicationID: '',
      apiKey: '',
      indexName: '',
      hits: {"per_page":10},
      labels: {"input_placeholder":"Search for Posts","hits_empty":"We didn't find any results for the search: ${query}","hits_stats":"${hits} results found in ${time} ms"}
    }
  };
</script>



  <link rel="canonical" href="https://gitee.com/blghost/blog.git/2019/10/07/数据库系统表相关学习/">





  <title>数据库系统表相关学习 | Hexo</title>
  








</head>

<body itemscope itemtype="http://schema.org/WebPage" lang="zh-Hans">

  
  
    
  

  <div class="container sidebar-position-left page-post-detail">
    <div class="headband"></div>

    <header id="header" class="header" itemscope itemtype="http://schema.org/WPHeader">
      <div class="header-inner"><div class="site-brand-wrapper">
  <div class="site-meta ">
    

    <div class="custom-logo-site-title">
      <a href="/blog/" class="brand" rel="start">
        <span class="logo-line-before"><i></i></span>
        <span class="site-title">Hexo</span>
        <span class="logo-line-after"><i></i></span>
      </a>
    </div>
      
        <p class="site-subtitle"></p>
      
  </div>

  <div class="site-nav-toggle">
    <button>
      <span class="btn-bar"></span>
      <span class="btn-bar"></span>
      <span class="btn-bar"></span>
    </button>
  </div>
</div>

<nav class="site-nav">
  

  
    <ul id="menu" class="menu">
      
        
        <li class="menu-item menu-item-home">
          <a href="/blog/" rel="section">
            
              <i class="menu-item-icon fa fa-fw fa-home"></i> <br>
            
            首页
          </a>
        </li>
      
        
        <li class="menu-item menu-item-archives">
          <a href="/blog/archives/" rel="section">
            
              <i class="menu-item-icon fa fa-fw fa-archive"></i> <br>
            
            归档
          </a>
        </li>
      

      
    </ul>
  

  
</nav>



 </div>
    </header>

    <main id="main" class="main">
      <div class="main-inner">
        <div class="content-wrap">
          <div id="content" class="content">
            

  <div id="posts" class="posts-expand">
    

  

  
  
  

  <article class="post post-type-normal" itemscope itemtype="http://schema.org/Article">
  
  
  
  <div class="post-block">
    <link itemprop="mainEntityOfPage" href="https://gitee.com/blghost/blog.git/blog/2019/10/07/数据库系统表相关学习/">

    <span hidden itemprop="author" itemscope itemtype="http://schema.org/Person">
      <meta itemprop="name" content="Blackghost">
      <meta itemprop="description" content>
      <meta itemprop="image" content="/blog/images/avatar.gif">
    </span>

    <span hidden itemprop="publisher" itemscope itemtype="http://schema.org/Organization">
      <meta itemprop="name" content="Hexo">
    </span>

    
      <header class="post-header">

        
        
          <h1 class="post-title" itemprop="name headline">数据库系统表相关学习</h1>
        

        <div class="post-meta">
          <span class="post-time">
            
              <span class="post-meta-item-icon">
                <i class="fa fa-calendar-o"></i>
              </span>
              
                <span class="post-meta-item-text">发表于</span>
              
              <time title="创建于" itemprop="dateCreated datePublished" datetime="2019-10-07T13:12:00+08:00">
                2019-10-07
              </time>
            

            

            
          </span>

          

          
            
          

          
          

          

          

          

        </div>
      </header>
    

    
    
    
    <div class="post-body" itemprop="articleBody">

      
      

      
        <h2 id="目的"><a href="#目的" class="headerlink" title="目的"></a>目的</h2><ol>
<li>如何利用数据库的功能读写文件，需要什么样的条件才可以读写</li>
<li>学习数据库系统表的功能，如何利用SQL语句查询库名、表名、字段名、内容以及当前用户等基本信息。</li>
<li>尝试查询出用户的hash，并使用hashcat来对获取的hash进行暴力破解</li>
</ol>
<h2 id="MySQL读写文件"><a href="#MySQL读写文件" class="headerlink" title="MySQL读写文件"></a>MySQL读写文件</h2><h3 id="读文件："><a href="#读文件：" class="headerlink" title="读文件："></a>读文件：</h3><h4 id="背景知识"><a href="#背景知识" class="headerlink" title="背景知识"></a>背景知识</h4><p>MySQL有2种读取文件的方法：load_file()、load data infile（在对文件进行读写的时候需要相对应的操作权限，否则无法对文件进行读写，load_file和load data infile，<strong>需要设置 secure_file_priv不为NULL</strong>）</p>
<p>可以使用show 命令来查看secure_file_priv是否为NULL，具体命令如下：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">show variables like ‘%secure%’;</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570512801339.png" alt="1570512801339"></p>
<p>可以通过mysql.ini文件中修改其属性，修改完成后需要重启MySQL；</p>
<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570513200148.png" alt="1570513200148"></p>
<h4 id="Load-file函数读取文件"><a href="#Load-file函数读取文件" class="headerlink" title="Load_file函数读取文件"></a>Load_file函数读取文件</h4><p>用法：load_file(path+file_name[地址+文件名])。</p>
<p>解析：读取文件并返回文件内容为字符串。如果该文件不存在或无法读取，函数返回NULL。</p>
<p>实例：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">select load_file(&apos;c:\\test.txt&apos;);</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570513882262.png" alt="1570513882262"></p>
<p>读取文件成功！</p>
<h4 id="Select-load-data-infile读取文件"><a href="#Select-load-data-infile读取文件" class="headerlink" title="Select load data infile读取文件"></a>Select load data infile读取文件</h4><p>用法：load data infile path+file[地址+文件名] into table table_name[表名]。</p>
<p>解析：首先需要一个跟文件想对应的表，然后才能读取文件并返回文件内容为字符串到指定的表中。如果该文件不存在或无法读取。</p>
<p>实例：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">load data infile &apos;c:\\test.txt&apos; into table text;</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570514897058.png" alt="1570514897058"></p>
<p>补充：</p>
<ul>
<li>FIELDS TERMINATED BY ‘，’这里指以逗号为分割符来分割导入数据。</li>
<li>IGNORE  1 LINES  这里指忽略第一行。</li>
</ul>
<h3 id="写文件："><a href="#写文件：" class="headerlink" title="写文件："></a>写文件：</h3><p>MySQL提供了一个into outfile函数可以将一条select语句的结果写到MySQL进程所有者拥有的完全读写文件中。</p>
<h4 id="select-into-outfile函数"><a href="#select-into-outfile函数" class="headerlink" title="select into outfile函数"></a>select into outfile函数</h4><p>用法：SELECT ‘文件内容’  into outfile ‘文件地址+文件名’;</p>
<p>解析：返回一条查询结果，在目标地址生成一个文件。</p>
<p>实例：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">select &apos;&lt;?php phpinfo();?&gt;&apos; into outfile &apos;c:\\1.txt&apos;;</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570516699258.png" alt="1570516699258"></p>
<h2 id="MySQL5-7系统库"><a href="#MySQL5-7系统库" class="headerlink" title="MySQL5.7系统库"></a>MySQL5.7系统库</h2><table>
<thead>
<tr>
<th>库名</th>
<th>表数量</th>
</tr>
</thead>
<tbody><tr>
<td>information_schema</td>
<td>61</td>
</tr>
<tr>
<td>MySQL</td>
<td>32</td>
</tr>
<tr>
<td>performance_schema</td>
<td>87</td>
</tr>
<tr>
<td>sys</td>
<td>101</td>
</tr>
</tbody></table>
<h3 id="information-schema数据库"><a href="#information-schema数据库" class="headerlink" title="information_schema数据库"></a>information_schema数据库</h3><p>information_schema数据库是MySQL自带的，它提供了访问数据库元数据的方式。</p>
<p><strong>什么是元数据呢？</strong></p>
<p>元数据是关于数据的数据，如数据库名或表名，列的数据类型，或访问权限等，有时候用于表述该信息的其他术语包括“数据词典”和“系统目录”。</p>
<p>在MySQL中把information_schema看作是一个数据库，确切说是信息数据库。其中保存着关于MySQL服务器所维护的所有其他数据库的信息。如数据库名，数据库的表，表栏的数据类型与访问权限等。在INFORMATION_SCHEMA中，有数个只读表。它们实际上是视图，而不是基本表，因此，你将无法看到与之相关的任何文件。</p>
<p><strong>information_schema数据库部分表说明</strong></p>
<table>
<thead>
<tr>
<th>表名</th>
<th>注释</th>
</tr>
</thead>
<tbody><tr>
<td>SCHEMATA</td>
<td>提供了当前MySQL实例中所有数据库的信息。是show databases的结果取之此表</td>
</tr>
<tr>
<td>TABLES</td>
<td>提供了关于数据库中的表的信息（包括视图）。详细表述了某个表属于哪个SCHEMAT、表类型、表引擎、创建时间等信息。是show tables from schemaname的结果取之此表</td>
</tr>
<tr>
<td>COLUMNS</td>
<td>提供了表中的列信息。详细表述了某张表的所有列以及每个列的信息。是show columns from schemananme.tablename的结果取之此表</td>
</tr>
<tr>
<td>STATISTICS</td>
<td>提供关于表索引的信息。是show index from schemaname.tablename的结果取之此表</td>
</tr>
<tr>
<td>USER_PRIVILEGES</td>
<td>用户权限表，给出了关于全称权限的信息。该信息源自mysql.user授权表。是非标准表</td>
</tr>
<tr>
<td>SCHEMA_PRIVILEGS</td>
<td>方案权限表，给出了关于方案（数据库）权限的信息。该信息来自MySQL.db授权表。是非标准表</td>
</tr>
<tr>
<td>TABLE_PRIVILEGS</td>
<td>表权限表，给出了关于表权限的信息。该信息源自MySQL.tables_priv授权表。是非标准表</td>
</tr>
<tr>
<td>COLUMN_PRIVILEGES</td>
<td>列权限表，给出了关于列权限的信息。该信息源自mysql.columns_priv授权表。是非标准表</td>
</tr>
<tr>
<td>CHARACTER_SETS</td>
<td>字符集表，提供了mysql实例可用字符集的信息。是show character set结果集取之此表</td>
</tr>
<tr>
<td>COLLATIONS</td>
<td>提供了关于个字符集的对照信息</td>
</tr>
<tr>
<td>COLLATION_CHARACTER_SET_APPLICABILITY</td>
<td>指明了可用于校对的字符集。这些列等效于SHOW COLLATION的前两个显示字段。</td>
</tr>
<tr>
<td>TABLE_CONSTRAINTS</td>
<td>描述了存在约束的表。以及表的约束类型</td>
</tr>
<tr>
<td>KEY_COLUM_USAGE</td>
<td>描述了具有约束的键值</td>
</tr>
<tr>
<td>ROUTINES</td>
<td>提供了关于存储子程序（存储程序和函数）的信息。此时，ROUTINES表不包含自定义函数（UDF）。名为“mysql.proc name”的列指明了对应于INFORMATION_SCHEMA ROUTINES表的mysql.proc表列</td>
</tr>
<tr>
<td>VIEWS</td>
<td>给出了关于数据库中的视图的信息。需要有show views权限，否则无法查看视图信息</td>
</tr>
<tr>
<td>TRIGGERS</td>
<td>提供了关于触发程序的信息。必须有super权限才能查看该表</td>
</tr>
</tbody></table>
<h3 id="performance-schema数据库"><a href="#performance-schema数据库" class="headerlink" title="performance_schema数据库"></a>performance_schema数据库</h3><p>PERFORMANCE_SCHEMA这个功能默认是关闭的。需要设置参数：performance_schema才可以启动该功能，这个参数是静态参数，只能写在my.cnf中不能动态修改。<strong>（主要存储数据库服务器性能参数）</strong></p>
<p><strong>performance_schema数据库部分表说明</strong></p>
<table>
<thead>
<tr>
<th>表名</th>
<th>注释</th>
</tr>
</thead>
<tbody><tr>
<td>setup_table</td>
<td>设置表，配置监控选项</td>
</tr>
<tr>
<td>current_event_table</td>
<td>记录当前那些thread正在发生什么事情</td>
</tr>
<tr>
<td>history_table</td>
<td>发生的各种事件的历史记录表</td>
</tr>
<tr>
<td>summary_table</td>
<td>对各种事件的统计表</td>
</tr>
<tr>
<td>setup_consumers\setup_instruments</td>
<td>描述各个事件，设置哪些事件能够被收集</td>
</tr>
<tr>
<td>setup_instruments</td>
<td>描述这个数据库下的表名以及是否开启监控</td>
</tr>
<tr>
<td>setup_timers</td>
<td>描述监控选项已经采样频率的时间间隔</td>
</tr>
<tr>
<td>threads</td>
<td>监控服务器所有连接</td>
</tr>
<tr>
<td>performance_timers</td>
<td>设置一些监控信息、指定mysql服务可用的监控周期，CYCLE表示按每秒检测2603393034次，目前performance-schema只支持’wait’时间监控，代码树上’wait/‘下的函数都可以监控到</td>
</tr>
</tbody></table>
<h3 id="mysql数据库"><a href="#mysql数据库" class="headerlink" title="mysql数据库"></a>mysql数据库</h3><p>在mysql数据库中，有mysql_install_db脚本初始化权限表，存储权限的表</p>
<table>
<thead>
<tr>
<th>表名</th>
<th>注释</th>
</tr>
</thead>
<tbody><tr>
<td>user</td>
<td>用户列、权限列、安全列、资源控制列</td>
</tr>
<tr>
<td>db</td>
<td>用户列、权限列</td>
</tr>
<tr>
<td></td>
<td></td>
</tr>
</tbody></table>
<h3 id="sys数据库"><a href="#sys数据库" class="headerlink" title="sys数据库"></a>sys数据库</h3><p>sys_config：这是在这个系统库上存在的唯一一个表。</p>
<h2 id="SQL查询系统信息命令"><a href="#SQL查询系统信息命令" class="headerlink" title="SQL查询系统信息命令"></a>SQL查询系统信息命令</h2><p>查询数据库名：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">show databases;</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1570874177412.png" alt="1570874177412"></p>
<p>查询表名：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">show tables;</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571035759430.png" alt="1571035759430"></p>
<p>查询字段名：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">desc user;</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571036670357.png" alt="1571036670357"></p>
<p>查询用户表的内容：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">select host,user from user;</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571036961521.png" alt="1571036961521"></p>
<p>查看当前用户：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">select user();</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571037454088.png" alt="1571037454088"></p>
<p>查看当前版本：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">select version();</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571037550503.png" alt="1571037550503"></p>
<h4 id="附加："><a href="#附加：" class="headerlink" title="附加："></a>附加：</h4><p>显示一个用户的权限，显示结果类似于grant命令</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">show grants for &apos;root&apos;@&apos;localhost&apos;;</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571038702803.png" alt="1571038702803"></p>
<p>显示系统中正在运行的所有进程，就是当前正在执行的查询。</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">show processlist;</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571038802519.png" alt="1571038802519"></p>
<p>显示表的索引：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">show index from user;</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571038906567.png" alt="1571038906567"></p>
<p>显示最后一个执行的语句所产生的错误、警告和通知</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">show warnings</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571039029776.png" alt="1571039029776"></p>
<p>更多查询请看：<a href="https://cloud.tencent.com/developer/article/1340819" target="_blank" rel="noopener">mysql常用表汇总</a></p>
<h2 id="hashcat工具"><a href="#hashcat工具" class="headerlink" title="hashcat工具"></a>hashcat工具</h2><h3 id="背景知识-1"><a href="#背景知识-1" class="headerlink" title="背景知识"></a>背景知识</h3><p>hashcat 是一款世界上最快，最先进的密码恢复实用程序（官网这样写的）。支持不同的平台系统，而且支持GPU来执行破解。</p>
<p>工具的下载地址：<a href="https://hashcat.net/hashcat/" target="_blank" rel="noopener">hashcat</a></p>
<h3 id="使用方法"><a href="#使用方法" class="headerlink" title="使用方法"></a>使用方法</h3><h4 id="常用选项"><a href="#常用选项" class="headerlink" title="常用选项"></a>常用选项</h4><p>在使用hashcat工具中的一些常用的基础选项。</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br></pre></td><td class="code"><pre><span class="line">1. -a 指定要使用的破解模式。</span><br><span class="line">2. -m 指定要破解的hash类型所对应的id[下面有一份完整的hash id对照表]，几乎存在市面上常用的一些散列类型它都支持，而且每个版本更新都会增加一些新的算法。</span><br><span class="line">3. -o 指定破解成功后的hash及所对应的明文密码的存放位置。</span><br><span class="line">4. --force 忽略破解过程中的警告信息，跑单条hash可能需要加上此选项</span><br><span class="line">5. --show 显示已经破解的hash及该hash所对应的明文</span><br><span class="line">6. --increment 启用增量破解模式，你可以利用此模式让hashcat在指定的密码长度范围内执行破解，其实并不建议这么用，因为时间可能会比较长。</span><br><span class="line">7. --increment-min 密码最小长度，后面直接等于一个整数即可，配置increment模式一起使用</span><br><span class="line">8. --increment-max 密码最大长度，同上</span><br><span class="line">9. --outfile-format 指定破解结果的输出格式id，一般默认就可以了，除非有特殊需求。</span><br><span class="line">10. --username 忽略hash文件中的指定的用户名，在破解win和linux系统用户密码hash可能会用到。</span><br><span class="line">11. --remove 删除已被破解成功的hash</span><br><span class="line">12. -r 使用自定义破解规则，比较复杂后期在说。</span><br></pre></td></tr></table></figure>

<h4 id="破解模式"><a href="#破解模式" class="headerlink" title="破解模式"></a>破解模式</h4><p>字典爆破，后面可以连续跟上多个字典文件。</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">0 | straight（字典模式）</span><br></pre></td></tr></table></figure>

<p>一种相对智能高效的爆破模式，它的意思是这样的，如果你事先已经明确知道密码中可能包含哪些字符串，你可以把那些字符串事先写到文件中，每行对应一个字符串，然后hashcat会自动根据你所提供的这些字符串，尝试所有可能的组合进行猜解。</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">1 | Combination（智能高效爆破）</span><br></pre></td></tr></table></figure>

<p>纯掩码的爆破方式，如果你有需求要大批量爆破hash，可能会用到。这里需要稍微注意的是，你给定的掩码是多少位它就只破解多少位，例如，你给的是7位的掩码，它就只跑7位这么长，而不会从第1位跑到第7位，如果想要自动变长跑，那么就启用increment模式，并且指定密码的最小和最大长度即可。</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">3 | Brue-force（掩码模式）</span><br></pre></td></tr></table></figure>

<p>基于字典和掩码配合的爆破模式，它的破解过程其实也比较简单，就是每次从前面的字典取出一个字符串然后和后面的掩码的所有组合进行拼接，直到撞到对应的明文</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">6 | Hybrid Worldlist + Mask（字典+掩码）</span><br></pre></td></tr></table></figure>

<p>基于掩码和字典配合的爆破模式，跟6的过程正好相反，只不过这次它是从前面进行拼接</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">7 | Hybrid Mask + Wordlist（掩码+字典）</span><br></pre></td></tr></table></figure>

<h4 id="掩码样式"><a href="#掩码样式" class="headerlink" title="掩码样式"></a>掩码样式</h4><p>hashcat不同的掩码所表示的具体字符及掩码字符集规则使用样式，掩码是个非常灵活的东西，你可以把它放在任何你想放的位置上，甚至也可以把自己想跑的一些掩码规则都事先放到一个文件中，然后以.hcmask命名，加载就可以让hashcat自动跑了，这样用起来比较方便，省的后期经常需要人为干预。</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br></pre></td><td class="code"><pre><span class="line">l | a-z 纯小写字母</span><br><span class="line">u | A-Z 纯大写字母</span><br><span class="line">d | 0-9 纯数字</span><br><span class="line">h | 0-f 常见小写字母和数字</span><br><span class="line">H | 0-F 常见大写字母和数字</span><br><span class="line">s | !-~ 特殊字符</span><br><span class="line">a | ?l?u?d?s 以上所有字符</span><br><span class="line">b | 0x00-0xff 可能是用来匹配像空格这种密码的</span><br></pre></td></tr></table></figure>

<p>比如，下面的例子：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br></pre></td><td class="code"><pre><span class="line">1 ?l?l?l?l?l?l?d?d?d 表示6位小写字母组成的密码，注意这里的位置全部都是一一对应的</span><br><span class="line">2 de?l?d?s56pos  表示由de加一位小写字母加一位数字加一位特殊字符后面跟上56pos组成的密码</span><br></pre></td></tr></table></figure>

<p>当然，你也可以自定义字符集规则，注意，可以连续指定多个不同的规则集</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br></pre></td><td class="code"><pre><span class="line">1 -1， --custom-charset1 | cs| User-defined charset ?1 | -1 ?l?d?u</span><br><span class="line">2 -2， --custom-charset2 | cs| User-defined charset ?2 | -2 ?l?d?s</span><br><span class="line">3 -3， --custom-charset3 | cs| User-defined charset ?3</span><br><span class="line">4 -4， --custom-charset4 | cs| User-defined charset ?4</span><br></pre></td></tr></table></figure>

<p>比如，下面的例子：</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br></pre></td><td class="code"><pre><span class="line">1  -1 ?l?s ?1?1?1?1?1 表示五位由特殊字符和小写字母组成的密码</span><br><span class="line">2  -1 ?d?l -2 ?d?l?u -3 ?l?u ?1?2?3 表示密码的第一位可能是小写字母或者数字，第二位可能是大小写</span><br></pre></td></tr></table></figure>

<h4 id="不同破解模式下的具体应用场景"><a href="#不同破解模式下的具体应用场景" class="headerlink" title="不同破解模式下的具体应用场景"></a>不同破解模式下的具体应用场景</h4><p>用的时候需要稍微注意下语句格式（暂以破解最普通的md5hash为例）</p>
<h5 id="纯字典模式（Straight）"><a href="#纯字典模式（Straight）" class="headerlink" title="纯字典模式（Straight）"></a>纯字典模式（Straight）</h5><figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">hashcat64 -o res.txt -a 0 -m 0 mima.txt cain.txt</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571384854383.png" alt="1571384854383"></p>
<p>破解成功！查看密码</p>
<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571384886260.png" alt="1571384886260"></p>
<h5 id="智能字典爆破（Combination）"><a href="#智能字典爆破（Combination）" class="headerlink" title="智能字典爆破（Combination）"></a>智能字典爆破（Combination）</h5><p>需要事前把密码中有可能包含到的单词都放到字典中，比如，我有两个这样的字典，字典包含如下字符串，而我实际的密码是adminpass[字典文件可同时有很多个，不过那也意味你的组合也会特别多，速度就会慢]，实际破解就可以像下面就这样写</p>
<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571386115712.png" alt="1571386115712"></p>
<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571386127521.png" alt="1571386127521"></p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">hashcat64 -a 1 -m 0 hash.txt dict1.txt dict2.txt</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571386339462.png" alt="1571386339462"></p>
<h5 id="纯掩码爆破（Brute-force）"><a href="#纯掩码爆破（Brute-force）" class="headerlink" title="纯掩码爆破（Brute-force）"></a>纯掩码爆破（Brute-force）</h5><p>纯掩码的爆破模式，其实就是尝试逐个位破解，一般人的密码设置习惯大都是基于大小写字母数字这种形式，如果hash实在比较多，可以尝试从指定的位数开始一位位的将大小写特殊字符轮询，这跑，可以节省一些时间；密码为roottoor，8位小写字母</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">hashcat64 -a 3 -m 0 hash.txt ?l?l?l?l?l?l?L?l</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571387130517.png" alt="1571387130517"></p>
<p>破解成功，获得hash值</p>
<h5 id="字典-纯掩码配合（Hybrid-Wordlist-Mask）"><a href="#字典-纯掩码配合（Hybrid-Wordlist-Mask）" class="headerlink" title="字典+纯掩码配合（Hybrid Wordlist + Mask）"></a>字典+纯掩码配合（Hybrid Wordlist + Mask）</h5><p>把可能存在的字符串事先写到字典中，然后hashcat在破解的时候会把后面所有的掩码组合跟前面的字典每行中的字符串进行拼接，直到猜解出明文，下面（7）也是一样，只不过下面的是把掩码放在了前面，字典放在了后面</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br></pre></td><td class="code"><pre><span class="line">dict1.txt中的内容是这样的</span><br><span class="line">admin</span><br><span class="line">root</span><br><span class="line">....</span><br></pre></td></tr></table></figure>

<p>实际的明文密码是这样的</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">adminpass123</span><br></pre></td></tr></table></figure>

<p>实际破解的掩码，就可以这样写</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">hashcat64 -m 0 hash.txt -a 6 dict.txt -1 ?l ?l?1?1?1?d?d?d</span><br></pre></td></tr></table></figure>

<p><img src="C:%5CUsers%5Cadmin%5CAppData%5CRoaming%5CTypora%5Ctypora-user-images%5C1571465471087.png" alt="1571465471087"></p>
<p>破解成功！</p>

      
    </div>
    
    
    

    

    

    

    <footer class="post-footer">
      
        <div class="post-tags">
          
            <a href="/blog/tags/读写文件/" rel="tag"># 读写文件</a>
          
            <a href="/blog/tags/系统表/" rel="tag"># 系统表</a>
          
            <a href="/blog/tags/show/" rel="tag"># show</a>
          
            <a href="/blog/tags/hashcat/" rel="tag"># hashcat</a>
          
        </div>
      

      
      
      

      
        <div class="post-nav">
          <div class="post-nav-next post-nav-item">
            
              <a href="/blog/2019/09/26/认识sql并学习数据库的基础操作/" rel="next" title="认识SQL并学习数据库的基础操作">
                <i class="fa fa-chevron-left"></i> 认识SQL并学习数据库的基础操作
              </a>
            
          </div>

          <span class="post-nav-divider"></span>

          <div class="post-nav-prev post-nav-item">
            
              <a href="/blog/2019/10/24/MySQL函数及其利用/" rel="prev" title="MySQL函数及其利用">
                MySQL函数及其利用 <i class="fa fa-chevron-right"></i>
              </a>
            
          </div>
        </div>
      

      
      
    </footer>
  </div>
  
  
  
  </article>



    <div class="post-spread">
      
    </div>
  </div>


          </div>
          


          

  



        </div>
        
          
  
  <div class="sidebar-toggle">
    <div class="sidebar-toggle-line-wrap">
      <span class="sidebar-toggle-line sidebar-toggle-line-first"></span>
      <span class="sidebar-toggle-line sidebar-toggle-line-middle"></span>
      <span class="sidebar-toggle-line sidebar-toggle-line-last"></span>
    </div>
  </div>

  <aside id="sidebar" class="sidebar">
    
    <div class="sidebar-inner">

      

      
        <ul class="sidebar-nav motion-element">
          <li class="sidebar-nav-toc sidebar-nav-active" data-target="post-toc-wrap">
            文章目录
          </li>
          <li class="sidebar-nav-overview" data-target="site-overview-wrap">
            站点概览
          </li>
        </ul>
      

      <section class="site-overview-wrap sidebar-panel">
        <div class="site-overview">
          <div class="site-author motion-element" itemprop="author" itemscope itemtype="http://schema.org/Person">
            
              <p class="site-author-name" itemprop="name">Blackghost</p>
              <p class="site-description motion-element" itemprop="description"></p>
          </div>

          <nav class="site-state motion-element">

            
              <div class="site-state-item site-state-posts">
              
                <a href="/blog/archives/">
              
                  <span class="site-state-item-count">6</span>
                  <span class="site-state-item-name">日志</span>
                </a>
              </div>
            

            

            
              
              
              <div class="site-state-item site-state-tags">
                
                  <span class="site-state-item-count">15</span>
                  <span class="site-state-item-name">标签</span>
                
              </div>
            

          </nav>

          

          

          
          

          
          

          

        </div>
      </section>

      
      <!--noindex-->
        <section class="post-toc-wrap motion-element sidebar-panel sidebar-panel-active">
          <div class="post-toc">

            
              
            

            
              <div class="post-toc-content"><ol class="nav"><li class="nav-item nav-level-2"><a class="nav-link" href="#目的"><span class="nav-number">1.</span> <span class="nav-text">目的</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#MySQL读写文件"><span class="nav-number">2.</span> <span class="nav-text">MySQL读写文件</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#读文件："><span class="nav-number">2.1.</span> <span class="nav-text">读文件：</span></a><ol class="nav-child"><li class="nav-item nav-level-4"><a class="nav-link" href="#背景知识"><span class="nav-number">2.1.1.</span> <span class="nav-text">背景知识</span></a></li><li class="nav-item nav-level-4"><a class="nav-link" href="#Load-file函数读取文件"><span class="nav-number">2.1.2.</span> <span class="nav-text">Load_file函数读取文件</span></a></li><li class="nav-item nav-level-4"><a class="nav-link" href="#Select-load-data-infile读取文件"><span class="nav-number">2.1.3.</span> <span class="nav-text">Select load data infile读取文件</span></a></li></ol></li><li class="nav-item nav-level-3"><a class="nav-link" href="#写文件："><span class="nav-number">2.2.</span> <span class="nav-text">写文件：</span></a><ol class="nav-child"><li class="nav-item nav-level-4"><a class="nav-link" href="#select-into-outfile函数"><span class="nav-number">2.2.1.</span> <span class="nav-text">select into outfile函数</span></a></li></ol></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#MySQL5-7系统库"><span class="nav-number">3.</span> <span class="nav-text">MySQL5.7系统库</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#information-schema数据库"><span class="nav-number">3.1.</span> <span class="nav-text">information_schema数据库</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#performance-schema数据库"><span class="nav-number">3.2.</span> <span class="nav-text">performance_schema数据库</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#mysql数据库"><span class="nav-number">3.3.</span> <span class="nav-text">mysql数据库</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#sys数据库"><span class="nav-number">3.4.</span> <span class="nav-text">sys数据库</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#SQL查询系统信息命令"><span class="nav-number">4.</span> <span class="nav-text">SQL查询系统信息命令</span></a><ol class="nav-child"><li class="nav-item nav-level-4"><a class="nav-link" href="#附加："><span class="nav-number">4.0.1.</span> <span class="nav-text">附加：</span></a></li></ol></li></ol><li class="nav-item nav-level-2"><a class="nav-link" href="#hashcat工具"><span class="nav-number">5.</span> <span class="nav-text">hashcat工具</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#背景知识-1"><span class="nav-number">5.1.</span> <span class="nav-text">背景知识</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#使用方法"><span class="nav-number">5.2.</span> <span class="nav-text">使用方法</span></a><ol class="nav-child"><li class="nav-item nav-level-4"><a class="nav-link" href="#常用选项"><span class="nav-number">5.2.1.</span> <span class="nav-text">常用选项</span></a></li><li class="nav-item nav-level-4"><a class="nav-link" href="#破解模式"><span class="nav-number">5.2.2.</span> <span class="nav-text">破解模式</span></a></li><li class="nav-item nav-level-4"><a class="nav-link" href="#掩码样式"><span class="nav-number">5.2.3.</span> <span class="nav-text">掩码样式</span></a></li><li class="nav-item nav-level-4"><a class="nav-link" href="#不同破解模式下的具体应用场景"><span class="nav-number">5.2.4.</span> <span class="nav-text">不同破解模式下的具体应用场景</span></a><ol class="nav-child"><li class="nav-item nav-level-5"><a class="nav-link" href="#纯字典模式（Straight）"><span class="nav-number">5.2.4.1.</span> <span class="nav-text">纯字典模式（Straight）</span></a></li><li class="nav-item nav-level-5"><a class="nav-link" href="#智能字典爆破（Combination）"><span class="nav-number">5.2.4.2.</span> <span class="nav-text">智能字典爆破（Combination）</span></a></li><li class="nav-item nav-level-5"><a class="nav-link" href="#纯掩码爆破（Brute-force）"><span class="nav-number">5.2.4.3.</span> <span class="nav-text">纯掩码爆破（Brute-force）</span></a></li><li class="nav-item nav-level-5"><a class="nav-link" href="#字典-纯掩码配合（Hybrid-Wordlist-Mask）"><span class="nav-number">5.2.4.4.</span> <span class="nav-text">字典+纯掩码配合（Hybrid Wordlist + Mask）</span></a></li></ol></li></ol></li></ol></li></div>
            

          </div>
        </section>
      <!--/noindex-->
      

      

    </div>
  </aside>


        
      </div>
    </main>

    <footer id="footer" class="footer">
      <div class="footer-inner">
        <div class="copyright">&copy; <span itemprop="copyrightYear">2019</span>
  <span class="with-love">
    <i class="fa fa-user"></i>
  </span>
  <span class="author" itemprop="copyrightHolder">Blackghost</span>

  
</div>


  <div class="powered-by">由 <a class="theme-link" target="_blank" href="https://hexo.io">Hexo</a> 强力驱动</div>



  <span class="post-meta-divider">|</span>



  <div class="theme-info">主题 &mdash; <a class="theme-link" target="_blank" href="https://github.com/iissnan/hexo-theme-next">NexT.Muse</a> v5.1.4</div>




        







        
      </div>
    </footer>

    
      <div class="back-to-top">
        <i class="fa fa-arrow-up"></i>
        
      </div>
    

    

  </div>

  

<script type="text/javascript">
  if (Object.prototype.toString.call(window.Promise) !== '[object Function]') {
    window.Promise = null;
  }
</script>









  












  
  
    <script type="text/javascript" src="/blog/lib/jquery/index.js?v=2.1.3"></script>
  

  
  
    <script type="text/javascript" src="/blog/lib/fastclick/lib/fastclick.min.js?v=1.0.6"></script>
  

  
  
    <script type="text/javascript" src="/blog/lib/jquery_lazyload/jquery.lazyload.js?v=1.9.7"></script>
  

  
  
    <script type="text/javascript" src="/blog/lib/velocity/velocity.min.js?v=1.2.1"></script>
  

  
  
    <script type="text/javascript" src="/blog/lib/velocity/velocity.ui.min.js?v=1.2.1"></script>
  

  
  
    <script type="text/javascript" src="/blog/lib/fancybox/source/jquery.fancybox.pack.js?v=2.1.5"></script>
  


  


  <script type="text/javascript" src="/blog/js/src/utils.js?v=5.1.4"></script>

  <script type="text/javascript" src="/blog/js/src/motion.js?v=5.1.4"></script>



  
  

  
  <script type="text/javascript" src="/blog/js/src/scrollspy.js?v=5.1.4"></script>
<script type="text/javascript" src="/blog/js/src/post-details.js?v=5.1.4"></script>



  


  <script type="text/javascript" src="/blog/js/src/bootstrap.js?v=5.1.4"></script>



  


  




	





  





  












  





  

  

  

  
  

  

  

  

</body>
</html>
