Skip to content

Commit

Permalink
fix 56a5d1e
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Oct 23, 2024
1 parent 962d212 commit 9d1d6d4
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion archivers/2024-10-23/search-ip-via-rdap/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -238,7 +238,7 @@
</span></span><span style=display:flex><span> }
</span></span><span style=display:flex><span> ]
</span></span><span style=display:flex><span> ....
</span></span></code></pre></td></tr></table></div></div><p>看到这里我们就可以很清晰的解读了:</p><ul><li>IP地址段:223.0.0.0 - 223.1.255.255</li><li>企业公司:Beijing Beilong Yunhai Network Data Technology Corporation</li></ul><p>当然,我们可以查询到的信息不止这么多,使用whois查询工具也可以查询,基本上原理和我们刚刚手动完成的动作相同</p><div class=highlight><div style=color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4><table style=border-spacing:0;padding:0;margin:0;border:0><tr><td style=vertical-align:top;padding:0;margin:0;border:0><pre tabindex=0 style=color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4><code><span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:.4em;padding:0 .4em;color:#7f7f7f"> 1
</span></span></code></pre></td></tr></table></div></div><p>看到这里我们就可以很清晰的解读了:</p><ul><li>IP地址段:223.0.0.0 - 223.1.255.255</li><li>企业公司:Beijing Beilong Yunhai Network Data Technology Corporation</li></ul><p>当然,我们可以查询到的信息不止这么多,使用whois查询工具也可以查询,数据基本上我们刚刚手动完成查询的相同</p><div class=highlight><div style=color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4><table style=border-spacing:0;padding:0;margin:0;border:0><tr><td style=vertical-align:top;padding:0;margin:0;border:0><pre tabindex=0 style=color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4><code><span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:.4em;padding:0 .4em;color:#7f7f7f"> 1
</span><span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:.4em;padding:0 .4em;color:#7f7f7f"> 2
</span><span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:.4em;padding:0 .4em;color:#7f7f7f"> 3
</span><span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:.4em;padding:0 .4em;color:#7f7f7f"> 4
Expand Down
2 changes: 1 addition & 1 deletion index.html
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
<!doctype html><htmlclass="dark"><head><meta name=generator content="Hugo 0.136.4"><meta charset=utf-8><meta http-equiv=X-UA-Compatible content="IE=edge"><title>倾旋的博客 - 现阶段在进行有效性验证/攻击模拟相关的安全研究工作,我的博客会记录一些我的学习过程和部分安全技术研究成果。 </title><meta name=viewport content="width=device-width,initial-scale=1"><link rel=alternate type=application/rss+xml href=https://payloads.online/index.xml title=倾旋的博客><link rel=stylesheet type=text/css media=screen href=https://payloads.online/css/normalize.css><link rel=stylesheet type=text/css media=screen href=https://payloads.online/css/main.css><link rel=stylesheet type=text/css media=screen href=https://payloads.online/css/extra.css><link id=dark-scheme rel=stylesheet type=text/css href=https://payloads.online/css/dark.css><script src=https://payloads.online/js/feather.min.js></script><script src=https://payloads.online/js/main.js></script></head><body><div class="container wrapper"><div class=header><div class=avatar><a href=https://payloads.online/><img src=/avatar.jpeg alt=倾旋的博客></a></div><h1 class=site-title><a href=https://payloads.online/>倾旋的博客</a></h1><div class=site-description><p>现阶段在进行有效性验证/攻击模拟相关的安全研究工作,我的博客会记录一些我的学习过程和部分安全技术研究成果。</p><nav class="nav social"><ul class=flat><li><a href=https://github.com/rvn0xsy/ title=Github><i data-feather=github></i></a></li><li><a href=/index.xml title=RSS><i data-feather=rss></i></a></li><li><a href=/ title=Wechat><i data-feather=message-circle></i></a></li><span class=scheme-toggle><a href=# id=scheme-toggle></a></ul></nav></div><nav class=nav><ul class=flat><li><a href=/>首页</a></li><li><a href=/posts/>文章列表</a></li><li><a href=/tags>标签</a></li><li><a href=/projects>开源项目</a></li><li><a href=/about>关于我</a></li><li><a href=/links/>友情链接</a></li><li><a href=/message>留言</a></li><li><a href=/sponsor>赞助</a></li></ul></nav></div><div class="recent-posts section"><div class=posts><div class=post><div class=post-header><div class=meta><div class=date><span class=day>23</span>
<span class=rest>Oct 2024</span></div></div><div class=matter><h4 class="title small"><a href=/archivers/2024-10-23/search-ip-via-rdap/>利用RDAP数据确定资产边界</a></h4><h4 class="title small smaller">2,405 words, ~9 min read</h4><h4 class="title small smaller"></h4><span class=description>在传统的渗透测试初始阶段,我们通常依赖域名备案信息、企业工商信息和网络空间测绘数据来确定资产归属。然而,这些方法可能存在信息不完整或过时的问题。本文将介绍一种创新的方法来精确界定资产范围:利用注册数据访问协议(RDAP)。</span></div></div></div><div class=post><div class=post-header><div class=meta><div class=date><span class=day>08</span>
<span class=rest>Oct 2024</span></div></div><div class=matter><h4 class="title small"><a href=/archivers/2024-10-23/search-ip-via-rdap/>利用RDAP数据确定资产边界</a></h4><h4 class="title small smaller">2,404 words, ~9 min read</h4><h4 class="title small smaller"></h4><span class=description>在传统的渗透测试初始阶段,我们通常依赖域名备案信息、企业工商信息和网络空间测绘数据来确定资产归属。然而,这些方法可能存在信息不完整或过时的问题。本文将介绍一种创新的方法来精确界定资产范围:利用注册数据访问协议(RDAP)。</span></div></div></div><div class=post><div class=post-header><div class=meta><div class=date><span class=day>08</span>
<span class=rest>Sep 2024</span></div></div><div class=matter><h4 class="title small"><a href=/archivers/2024-09-08/extract-vuln-search-queries/>使用AI提取历年漏洞Fofa查询语句</a></h4><h4 class="title small smaller">839 words, ~3 min read</h4><h4 class="title small smaller"><ul class="tags flat"><li class=tag-li><a href=/tags/ai%E7%9B%B8%E5%85%B3>AI相关</a></li><li class=tag-li><a href=/tags/rust>Rust</a></li></ul></h4><span class=description>近期使用Rust开发了一个基于流水线的AI助手,名字叫Qpipe,本文将演示我如何使用它来提取历年所有漏洞相关资产的查询语句。</span></div></div></div><div class=post><div class=post-header><div class=meta><div class=date><span class=day>04</span>
<span class=rest>Jun 2024</span></div></div><div class=matter><h4 class="title small"><a href=/archivers/2024-06-04/coze-ai/>使用Coze平台对Github Star项目进行分析推送</a></h4><h4 class="title small smaller">2,582 words, ~10 min read</h4><h4 class="title small smaller"></h4><span class=description>在这篇文章中,我将介绍如何使用Coze平台开发一个Bot来读取Github Star项目,并输出分析结果推送到知识星球。</span></div></div></div><div class=post><div class=post-header><div class=meta><div class=date><span class=day>29</span>
<span class=rest>Dec 2023</span></div></div><div class=matter><h4 class="title small"><a href=/archivers/2023-12-29/year-end-summary/>2023年终总结 - 你好2024!</a></h4><h4 class="title small smaller">5,093 words, ~20 min read</h4><h4 class="title small smaller"></h4><span class=description>2023年转眼过去,好像2022年-2023年很少写一写总结了,心血来潮给博客装修了一下,为了迎接2024年的到来,认真写一篇年度总结,算是给这一年一个交代,我会介绍一下这两年以来自己做的一些事情和成长。</span></div></div></div><div class=post><div class=post-header><div class=meta><div class=date><span class=day>31</span>
Expand Down

0 comments on commit 9d1d6d4

Please sign in to comment.