2014-11-10

2014-11-10  终于把《C++程序设计原理与实践》看完做完了  其实也还有很多东西不懂  也很多东西不会  但怎么说感觉看完  整个人上了一个档次  即使微不足道

但也算一次小小的提升 这学期看了《啊哈算法》  用MFC做了一个简易计算器  时间过得真快  半学期了= =

接下来得来看数据结构了  然后c++ primer  和windows编程设计   当然还得搞好课内学习    得提高英语能力  六级算放弃了  还是学实用英语吧

11月了 到2月10  三个月   恩又是一个阶段  下次再升一个档次吧至少  加油!

转载于:https://www.cnblogs.com/yueba/p/4088546.html

root@zzz-virtual-machine:/home/11/Chapter4/实战12 Shell shock 漏洞(CVE-2014-6271)# docker-compose down [+] Running 0/1 [+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 1/2shellshockcve-2014-6271-web-1 Stopping1 ✔ Container 12shellshockcve-2014-6271-web-1 Removed10[+] Running 1/2 ✔ Container 12shellshockcve-2014-6271-web-1 Removed10[+] Running 2/2 ✔ Container 12shellshockcve-2014-6271-web-1 Removed10.2s ✔ Network 12shellshockcve-2014-6271_default Removed0.1s root@zzz-virtual-machine:/home/11/Chapter4/实战12 Shell shock 漏洞(CVE-2014-6271)# docker-compose up -d [+] Running 1/2 ✔ Network 12shellshockcve-2014-6271_default Created0.[+] Running 1/2 ✔ Network 12shellshockcve-2014-6271_default Created0.[+] Running 1/2 ✔ Network 12shellshockcve-2014-6271_default Created0.[+] Running 2/2 ✔ Network 12shellshockcve-2014-6271_default Created0.1s ✔ Container 12shellshockcve-2014-6271-web-1 Started0.3s root@zzz-virtual-machine:/home/11/Chapter4/实战12 Shell shock 漏洞(CVE-2014-6271)# docker exec -it 12shellshockcve-2014-6271-web-1 ps aux | grep apache root@zzz-virtual-machine:/home/11/Chapter4/实战12 Shell shock 漏洞(CVE-2014-6271)# \curl --noproxy '*' -v http://127.0.0.1/cgi-bin/victim.cgi * Trying 127.0.0.1:80... * Connected to 127.0.0.1 (127.0.0.1) port 80 (#0) > GET /cgi-bin/victim.cgi HTTP/1.1 > Host: 127.0.0.1 > User-Agent: curl/7.81.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 404 Not Found < Date: Mon, 01 Dec 2025 06:45:33 GMT < Server: Apache/2.4.10 (Debian) < Content-Length: 291 < Content-Type: text/html; charset=iso-8859-1 < <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /cgi-bin/victim.cgi was not found on this server.</p> <hr> <address>Apache/2.4.10 (Debian) Server at 127.0.0.1 Port 80</address> </body></html> * Connection #0 to host 127.0.0.1 left intact root@zzz-virtual-machine:/home/11/Chapter4/实战12 Shell shock 漏洞(CVE-2014-6271)#
12-02
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值