<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">


    
  <url>
    <loc>http://blog.hac425.top/2018/06/03/Pwn-Heap-With-Tcache.html</loc>
    <lastmod>2018-06-03T02:41:18.758Z</lastmod>
    <data>
        <display>
        <title>Pwn Heap With Tcache</title>
        <pubTime>2018-06-03T02:40:00.000Z</pubTime>
        
        <tag>tcache</tag>
         
        <tag>pwn heap</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/06/03/fuzz_with_honggfuzz.html</loc>
    <lastmod>2018-06-03T01:51:39.492Z</lastmod>
    <data>
        <display>
        <title>fuzz实战之honggfuzz</title>
        <pubTime>2018-06-03T01:50:00.000Z</pubTime>
        
        <tag>honggfuzz</tag>
         
         
           
             
              <breadCrumb title="fuzz" url="http://blog.hac425.top/categories/fuzz/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/06/03/fuzz_with_afl.html</loc>
    <lastmod>2018-06-03T01:49:40.875Z</lastmod>
    <data>
        <display>
        <title>fuzz系列之afl</title>
        <pubTime>2018-06-03T01:45:00.000Z</pubTime>
        
        <tag>afl</tag>
         
         
           
             
              <breadCrumb title="fuzz" url="http://blog.hac425.top/categories/fuzz/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/05/18/learn_fuzz_libfuzzer.html</loc>
    <lastmod>2018-05-18T14:56:02.437Z</lastmod>
    <data>
        <display>
        <title>fuzz系列之libfuzzer</title>
        <pubTime>2018-05-18T14:40:00.000Z</pubTime>
        
        <tag>libfuzzer</tag>
         
         
           
             
              <breadCrumb title="fuzz" url="http://blog.hac425.top/categories/fuzz/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/05/18/openwrt_rpcd_misconfig.html</loc>
    <lastmod>2018-05-18T14:34:21.379Z</lastmod>
    <data>
        <display>
        <title>openwrt-rpcd服务ACL配置错误风险分析</title>
        <pubTime>2018-05-18T13:01:00.000Z</pubTime>
        
        <tag>CVE-2017-11361</tag>
         
        <tag>CVE-2018-10123</tag>
         
         
           
             
              <breadCrumb title="路由器安全" url="http://blog.hac425.top/categories/%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/05/16/openwrt_rpcd_acl_fail.html</loc>
    <lastmod>2018-05-18T13:06:59.873Z</lastmod>
    <data>
        <display>
        <title>【CVE-2018-11116】openwrt rpcd 配置文件错误导致访问控制失效</title>
        <pubTime>2018-05-16T01:09:00.000Z</pubTime>
        
        <tag>CVE-2018-11116</tag>
         
         
           
             
              <breadCrumb title="vulnerability_report" url="http://blog.hac425.top/categories/vulnerability-report/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/05/16/CVE-2018-10945-mongoose.html</loc>
    <lastmod>2018-05-16T01:25:09.465Z</lastmod>
    <data>
        <display>
        <title>CVE-2018-10945 mongoose越界访问</title>
        <pubTime>2018-05-16T01:19:00.000Z</pubTime>
        
        <tag>CVE-2018-10945</tag>
         
         
           
             
              <breadCrumb title="vulnerability_report" url="http://blog.hac425.top/categories/vulnerability-report/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/05/13/vexpress_a9_qemu_uboot_linux.html</loc>
    <lastmod>2018-05-13T15:24:30.327Z</lastmod>
    <data>
        <display>
        <title>qemu模拟vexpress-a9及u-boot引导 linux</title>
        <pubTime>2018-05-13T15:22:00.000Z</pubTime>
        
        <tag>u-boot</tag>
         
        <tag>qemu</tag>
         
         
           
             
              <breadCrumb title="embedded_development" url="http://blog.hac425.top/categories/embedded-development/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/05/08/house_of_roman.html</loc>
    <lastmod>2018-05-08T06:24:11.015Z</lastmod>
    <data>
        <display>
        <title>House of Roman 实战</title>
        <pubTime>2018-05-08T06:23:00.000Z</pubTime>
        
        <tag>hourse of roamn</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/04/30/pwn_with_file_rop_by_vtable.html</loc>
    <lastmod>2018-05-08T06:23:27.894Z</lastmod>
    <data>
        <display>
        <title>Pwn with File结构体之利用 vtable 进行 ROP</title>
        <pubTime>2018-04-30T05:58:00.000Z</pubTime>
        
        <tag>ctf</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/05/01/ciscn2018-pwn-wp.html</loc>
    <lastmod>2018-05-01T07:35:33.206Z</lastmod>
    <data>
        <display>
        <title>ciscn2018-pwn-wp</title>
        <pubTime>2018-05-01T07:34:00.000Z</pubTime>
        
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/04/23/pwn-with-glbc-heap.html</loc>
    <lastmod>2018-04-30T06:10:27.373Z</lastmod>
    <data>
        <display>
        <title>pwn with glbc heap</title>
        <pubTime>2018-04-23T12:40:00.000Z</pubTime>
        
        <tag>off by one</tag>
         
        <tag>ctf heap</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/04/29/linux_kernel_pwn_notes.html</loc>
    <lastmod>2018-04-30T05:58:13.352Z</lastmod>
    <data>
        <display>
        <title>linux kernel pwn notes</title>
        <pubTime>2018-04-29T11:33:00.000Z</pubTime>
        
        <tag>ctf</tag>
         
        <tag>kernel</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/04/02/qiangwangbei2018_pwn.html</loc>
    <lastmod>2018-04-03T07:26:28.673Z</lastmod>
    <data>
        <display>
        <title>强网杯2018 pwn复现</title>
        <pubTime>2018-04-02T13:31:00.000Z</pubTime>
        
        <tag>fastbin attack</tag>
         
        <tag>off by null</tag>
         
        <tag>unlink</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/04/03/0ctf2018_pwn.html</loc>
    <lastmod>2018-04-03T06:17:09.650Z</lastmod>
    <data>
        <display>
        <title>0ctf2018 pwn</title>
        <pubTime>2018-04-03T06:04:00.000Z</pubTime>
        
        <tag>ret to dl_resolve</tag>
         
        <tag>off by one</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/14/exim_CVE_2017_16943_uaf_pwn.html</loc>
    <lastmod>2018-03-23T11:42:26.750Z</lastmod>
    <data>
        <display>
        <title>exim CVE-2017-16943 uaf漏洞分析</title>
        <pubTime>2017-12-14T13:01:00.000Z</pubTime>
        
        <tag>CVE-2017-16943</tag>
         
        <tag>exim_uaf</tag>
         
         
           
             
              <breadCrumb title="Vulnerability analysis" url="http://blog.hac425.top/categories/Vulnerability-analysis/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/11/21/cve_2015_3864_google_exploit.html</loc>
    <lastmod>2018-03-23T11:39:35.828Z</lastmod>
    <data>
        <display>
        <title>CVE-2015-3864漏洞利用分析(exploit_from_google)</title>
        <pubTime>2017-11-21T15:17:00.000Z</pubTime>
        
        <tag>CVE-2015-3864</tag>
         
        <tag>文件格式漏洞</tag>
         
         
           
             
              <breadCrumb title="安卓安全" url="http://blog.hac425.top/categories/%E5%AE%89%E5%8D%93%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/21/tack_top_chunk_bcloud.html</loc>
    <lastmod>2018-03-21T11:13:00.184Z</lastmod>
    <data>
        <display>
        <title>Attack Top Chunk之 bcloud</title>
        <pubTime>2018-03-21T08:44:00.000Z</pubTime>
        
        <tag>house of force</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/20/pwn_with_longjmp.html</loc>
    <lastmod>2018-03-20T13:48:53.446Z</lastmod>
    <data>
        <display>
        <title>Pwn With longjmp</title>
        <pubTime>2018-03-20T08:39:00.000Z</pubTime>
        
        <tag>off-by-one</tag>
         
        <tag>longjmp to shell</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/17/command_inject.html</loc>
    <lastmod>2018-03-18T13:24:14.377Z</lastmod>
    <data>
        <display>
        <title>命令注入漏洞总结</title>
        <pubTime>2018-03-17T12:56:00.000Z</pubTime>
        
        <tag>命令注入</tag>
         
         
           
             
              <breadCrumb title="渗透测试" url="http://blog.hac425.top/categories/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/16/learn_xss.html</loc>
    <lastmod>2018-03-17T08:13:43.258Z</lastmod>
    <data>
        <display>
        <title>XSS学习(未完..)</title>
        <pubTime>2018-03-16T11:40:00.000Z</pubTime>
        
        <tag>xss</tag>
         
         
           
             
              <breadCrumb title="渗透测试" url="http://blog.hac425.top/categories/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/16/learn_ssrf.html</loc>
    <lastmod>2018-03-16T11:15:03.868Z</lastmod>
    <data>
        <display>
        <title>SSRF学习</title>
        <pubTime>2018-03-16T02:28:00.000Z</pubTime>
        
        <tag>ssrf</tag>
         
         
           
             
              <breadCrumb title="渗透测试" url="http://blog.hac425.top/categories/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/15/play_xxe_vuln.html</loc>
    <lastmod>2018-03-16T01:39:24.781Z</lastmod>
    <data>
        <display>
        <title>xxe漏洞实战</title>
        <pubTime>2018-03-15T10:47:00.000Z</pubTime>
        
        <tag>xxe</tag>
         
         
           
             
              <breadCrumb title="渗透测试" url="http://blog.hac425.top/categories/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/15/jiakao_rev.html</loc>
    <lastmod>2018-03-15T16:26:31.829Z</lastmod>
    <data>
        <display>
        <title>xxxx签名算法逆向&&python脚本实现</title>
        <pubTime>2018-03-15T12:15:00.000Z</pubTime>
        
        <tag>协议分析</tag>
         
         
           
             
              <breadCrumb title="安卓安全" url="http://blog.hac425.top/categories/%E5%AE%89%E5%8D%93%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/13/windows_hack_domain.html</loc>
    <lastmod>2018-03-15T15:10:37.804Z</lastmod>
    <data>
        <display>
        <title>windows域渗透实战</title>
        <pubTime>2018-03-13T14:08:00.000Z</pubTime>
        
        <tag>windows域</tag>
         
         
           
             
              <breadCrumb title="渗透测试" url="http://blog.hac425.top/categories/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/13/ranzhi_oa_641_exp.html</loc>
    <lastmod>2018-03-15T14:58:38.815Z</lastmod>
    <data>
        <display>
        <title>然之协同系统6.4.1 SQL注入之exp编写</title>
        <pubTime>2018-03-13T05:02:00.000Z</pubTime>
        
        <tag>sqli</tag>
         
         
           
             
              <breadCrumb title="渗透测试" url="http://blog.hac425.top/categories/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/12/ranzhi_oa_6_4_1_sqli_to_getshell.html</loc>
    <lastmod>2018-03-15T14:56:32.631Z</lastmod>
    <data>
        <display>
        <title>然之协同系统6.4.1 SQL注入导致getshell</title>
        <pubTime>2018-03-12T09:01:00.000Z</pubTime>
        
        <tag>sql注入</tag>
         
         
           
             
              <breadCrumb title="代码审计" url="http://blog.hac425.top/categories/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/11/csv_inject.html</loc>
    <lastmod>2018-03-15T14:39:45.251Z</lastmod>
    <data>
        <display>
        <title>csv注入漏洞原理&&实战</title>
        <pubTime>2018-03-11T10:21:00.000Z</pubTime>
        
        <tag>csv注入</tag>
         
         
           
             
              <breadCrumb title="渗透测试" url="http://blog.hac425.top/categories/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/"/>
          
        </display>
    </data>
    </url>

    
    
  <url>
    <loc>http://blog.hac425.top/2018/03/07/zzcms_8_2_rest_user_passwd.html</loc>
    <lastmod>2018-03-07T10:53:31.153Z</lastmod>
    <data>
        <display>
        <title>ZZCMS8.2 用户密码重置漏洞</title>
        <pubTime>2018-03-07T08:31:00.000Z</pubTime>
        
        <tag>逻辑漏洞</tag>
         
         
           
             
              <breadCrumb title="代码审计" url="http://blog.hac425.top/categories/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/10/22/aijiami_unpacker.html</loc>
    <lastmod>2018-03-07T08:32:47.654Z</lastmod>
    <data>
        <display>
        <title>【天翼杯安卓题二】 爱加密脱壳实战</title>
        <pubTime>2017-10-22T11:33:00.000Z</pubTime>
        
        <tag>安卓脱壳</tag>
         
         
           
             
              <breadCrumb title="安卓安全" url="http://blog.hac425.top/categories/%E5%AE%89%E5%8D%93%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/06/seacms_6_45_rce.html</loc>
    <lastmod>2018-03-06T02:36:14.843Z</lastmod>
    <data>
        <display>
        <title>seacms 6.45 命令执行漏洞分析</title>
        <pubTime>2018-03-06T01:15:00.000Z</pubTime>
        
        <tag>变量覆盖</tag>
         
        <tag>seacms</tag>
         
        <tag>命令执行</tag>
         
         
           
             
              <breadCrumb title="代码审计" url="http://blog.hac425.top/categories/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/03/05/metinfo_5x_reset_admin_passwd.html</loc>
    <lastmod>2018-03-05T11:54:45.105Z</lastmod>
    <data>
        <display>
        <title>Metinfo 5.x 管理员密码重置漏洞</title>
        <pubTime>2018-03-05T11:36:00.000Z</pubTime>
        
        <tag>变量覆盖</tag>
         
        <tag>逻辑漏洞</tag>
         
         
           
             
              <breadCrumb title="代码审计" url="http://blog.hac425.top/categories/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/02/03/crack_PDFelement.html</loc>
    <lastmod>2018-02-03T08:41:50.251Z</lastmod>
    <data>
        <display>
        <title>c#应用破解实战之PDFelement</title>
        <pubTime>2018-02-03T07:22:00.000Z</pubTime>
        
        <tag>c#破解</tag>
         
        <tag>dnSpy</tag>
         
         
           
             
              <breadCrumb title="破解" url="http://blog.hac425.top/categories/%E7%A0%B4%E8%A7%A3/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/01/29/dns_tunnel_and_cobaltstrike.html</loc>
    <lastmod>2018-01-29T09:00:39.977Z</lastmod>
    <data>
        <display>
        <title>DNS隧道实战&&cobaltstrike利用dns隧道</title>
        <pubTime>2018-01-29T08:31:00.000Z</pubTime>
        
        <tag>DNS隧道</tag>
         
         
           
             
              <breadCrumb title="渗透测试" url="http://blog.hac425.top/categories/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/01/28/ssh_to_msf.html</loc>
    <lastmod>2018-01-29T07:58:56.568Z</lastmod>
    <data>
        <display>
        <title>SSH反向代理转发至内网msf</title>
        <pubTime>2018-01-28T08:34:00.000Z</pubTime>
        
        <tag>ssh端口转发</tag>
         
         
           
             
              <breadCrumb title="渗透测试" url="http://blog.hac425.top/categories/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/01/29/ew_use.html</loc>
    <lastmod>2018-01-29T07:33:43.932Z</lastmod>
    <data>
        <display>
        <title>ew代理实战</title>
        <pubTime>2018-01-29T06:38:00.000Z</pubTime>
        
        <tag>端口转发</tag>
         
        <tag>ew</tag>
         
        <tag>代理</tag>
         
         
           
             
              <breadCrumb title="渗透测试" url="http://blog.hac425.top/categories/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/01/17/learn_unicorn.html</loc>
    <lastmod>2018-01-17T01:41:52.948Z</lastmod>
    <data>
        <display>
        <title>unicorn模拟执行学习</title>
        <pubTime>2018-01-17T00:59:00.000Z</pubTime>
        
        <tag>unicorn</tag>
         
         
           
             
              <breadCrumb title="reverse" url="http://blog.hac425.top/categories/reverse/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/01/13/pwn_with_file_part4.html</loc>
    <lastmod>2018-01-17T00:59:02.372Z</lastmod>
    <data>
        <display>
        <title>Pwn with File结构体（四）</title>
        <pubTime>2018-01-13T14:25:00.000Z</pubTime>
        
        <tag>ctf</tag>
         
        <tag>file struct</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/10/28/step_by_step_pwn_router_part4.html</loc>
    <lastmod>2018-01-13T07:46:32.248Z</lastmod>
    <data>
        <display>
        <title>一步一步pwn路由器之rop技术实战</title>
        <pubTime>2017-10-28T03:47:00.000Z</pubTime>
        
        <tag>mips rop</tag>
         
        <tag>栈溢出</tag>
         
         
           
             
              <breadCrumb title="路由器安全" url="http://blog.hac425.top/categories/%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/15/legu_android_readboy_burp.html</loc>
    <lastmod>2018-01-13T07:46:26.156Z</lastmod>
    <data>
        <display>
        <title>安卓脱壳&&协议分析&&burp辅助分析插件编写</title>
        <pubTime>2017-12-15T10:47:00.000Z</pubTime>
        
        <tag>protocol analysis</tag>
         
         
           
             
              <breadCrumb title="安卓安全" url="http://blog.hac425.top/categories/%E5%AE%89%E5%8D%93%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/01/06/pwn_router_os_step_exp.html</loc>
    <lastmod>2018-01-13T07:46:25.444Z</lastmod>
    <data>
        <display>
        <title>一步一步 Pwn RouterOS之exploit构造</title>
        <pubTime>2018-01-05T16:48:00.000Z</pubTime>
        
        <tag>rop by dlsym</tag>
         
        <tag>rop by strncpy</tag>
         
         
           
             
              <breadCrumb title="pwn_router_os" url="http://blog.hac425.top/categories/pwn-router-os/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/01/05/pwn_routeros_step_2_poc.html</loc>
    <lastmod>2018-01-13T07:46:24.860Z</lastmod>
    <data>
        <display>
        <title>一步一步 Pwn RouterOS之调试环境搭建&&漏洞分析&&poc</title>
        <pubTime>2018-01-05T15:13:00.000Z</pubTime>
        
        <tag>diff</tag>
         
        <tag>setup env</tag>
         
         
           
             
              <breadCrumb title="pwn_router_os" url="http://blog.hac425.top/categories/pwn-router-os/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/07/pwn_with_file_part1.html</loc>
    <lastmod>2018-01-13T07:46:24.277Z</lastmod>
    <data>
        <display>
        <title>Pwn with File结构体（一）</title>
        <pubTime>2017-12-07T08:33:00.000Z</pubTime>
        
        <tag>file struct</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/07/pwn_with_file_part2.html</loc>
    <lastmod>2018-01-13T07:46:23.638Z</lastmod>
    <data>
        <display>
        <title>Pwn with File结构体（二）</title>
        <pubTime>2017-12-07T13:36:00.000Z</pubTime>
        
        <tag>file struct</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/12/pwn_with_file_part3.html</loc>
    <lastmod>2018-01-13T07:46:22.834Z</lastmod>
    <data>
        <display>
        <title>Pwn with File结构体（三）</title>
        <pubTime>2017-12-12T04:12:00.000Z</pubTime>
        
        <tag>file struct</tag>
         
        <tag>off-by-null</tag>
         
        <tag>heap learning</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2018/01/05/pwn_with_routeros_ctf.html</loc>
    <lastmod>2018-01-13T07:46:22.196Z</lastmod>
    <data>
        <display>
        <title>一步一步 Pwn RouterOS之ctf题练手</title>
        <pubTime>2018-01-05T13:38:00.000Z</pubTime>
        
        <tag>ctf</tag>
         
        <tag>alloca</tag>
         
         
           
             
              <breadCrumb title="pwn_router_os" url="http://blog.hac425.top/categories/pwn-router-os/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/10/26/step_by_step_pwn_router_part1.html</loc>
    <lastmod>2018-01-13T07:46:21.612Z</lastmod>
    <data>
        <display>
        <title>一步一步pwn路由器之环境搭建</title>
        <pubTime>2017-10-26T12:12:00.000Z</pubTime>
        
        <tag>mips rop</tag>
         
        <tag>路由器安全</tag>
         
         
           
             
              <breadCrumb title="路由器安全" url="http://blog.hac425.top/categories/%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/10/26/step_by_step_pwn_router_part2.html</loc>
    <lastmod>2018-01-13T07:46:21.018Z</lastmod>
    <data>
        <display>
        <title>一步一步pwn路由器之路由器环境修复&&rop技术分析</title>
        <pubTime>2017-10-26T15:05:00.000Z</pubTime>
        
        <tag>mips rop</tag>
         
        <tag>路由器安全</tag>
         
        <tag>路由器环境修复</tag>
         
         
           
             
              <breadCrumb title="路由器安全" url="http://blog.hac425.top/categories/%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/10/27/step_by_step_pwn_router_part3.html</loc>
    <lastmod>2018-01-13T07:46:20.385Z</lastmod>
    <data>
        <display>
        <title>一步一步pwn路由器之栈溢出实战</title>
        <pubTime>2017-10-27T06:01:00.000Z</pubTime>
        
        <tag>mips rop</tag>
         
        <tag>栈溢出</tag>
         
         
           
             
              <breadCrumb title="路由器安全" url="http://blog.hac425.top/categories/%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/10/29/step_by_step_pwn_router_part5.html</loc>
    <lastmod>2018-01-13T07:46:19.779Z</lastmod>
    <data>
        <display>
        <title>一步一步pwn路由器之wr940栈溢出漏洞分析与利用</title>
        <pubTime>2017-10-29T14:20:00.000Z</pubTime>
        
        <tag>CVE-2017-13772</tag>
         
        <tag>路由器实战</tag>
         
         
           
             
              <breadCrumb title="路由器安全" url="http://blog.hac425.top/categories/%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/10/28/step_by_step_pwn_router_part6.html</loc>
    <lastmod>2018-01-13T07:46:19.082Z</lastmod>
    <data>
        <display>
        <title>一步一步pwn路由器之uClibc中malloc&&free分析</title>
        <pubTime>2017-10-28T04:21:00.000Z</pubTime>
        
        <tag>uclibc源码分析</tag>
         
        <tag>malloc &amp;&amp; free</tag>
         
         
           
             
              <breadCrumb title="路由器安全" url="http://blog.hac425.top/categories/%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/10/31/step_by_step_pwn_router_part7.html</loc>
    <lastmod>2018-01-13T07:46:18.106Z</lastmod>
    <data>
        <display>
        <title>一步一步pwn路由器之radare2使用全解</title>
        <pubTime>2017-10-31T07:12:00.000Z</pubTime>
        
        <tag>radare2</tag>
         
         
           
             
              <breadCrumb title="路由器安全" url="http://blog.hac425.top/categories/%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/11/01/step_by_step_pwn_router_part8.html</loc>
    <lastmod>2018-01-13T07:45:58.053Z</lastmod>
    <data>
        <display>
        <title>一步一步pwn路由器之radare2使用实战</title>
        <pubTime>2017-11-01T11:33:00.000Z</pubTime>
        
        <tag>radare2</tag>
         
         
           
             
              <breadCrumb title="路由器安全" url="http://blog.hac425.top/categories/%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
    
  <url>
    <loc>http://blog.hac425.top/2017/12/28/cve_2017_17215_hg532.html</loc>
    <lastmod>2017-12-28T13:30:40.299Z</lastmod>
    <data>
        <display>
        <title>CVE-2017-17215 - 华为HG532命令注入漏洞分析</title>
        <pubTime>2017-12-28T12:09:00.000Z</pubTime>
        
        <tag>pwn</tag>
         
        <tag>CVE-2017-17215</tag>
         
         
           
             
              <breadCrumb title="路由器安全" url="http://blog.hac425.top/categories/%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/23/defense_pwn_with_ld_preload.html</loc>
    <lastmod>2017-12-23T06:22:16.896Z</lastmod>
    <data>
        <display>
        <title>使用LD_PRELOAD防御pwn</title>
        <pubTime>2017-12-23T03:31:00.000Z</pubTime>
        
        <tag>awd</tag>
         
        <tag>pwn_defense</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/18/0ctf2017_babyheap.html</loc>
    <lastmod>2017-12-18T13:19:07.918Z</lastmod>
    <data>
        <display>
        <title>0ctf2017-babyheap</title>
        <pubTime>2017-12-18T11:46:00.000Z</pubTime>
        
        <tag>fastbin attack</tag>
         
        <tag>uaf</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/18/linux_kernel_uaf_exploit.html</loc>
    <lastmod>2017-12-18T05:36:57.738Z</lastmod>
    <data>
        <display>
        <title>linux_kernel_uaf漏洞利用实战</title>
        <pubTime>2017-12-18T03:41:00.000Z</pubTime>
        
        <tag>modify cred</tag>
         
        <tag>kernel rop</tag>
         
         
           
             
              <breadCrumb title="kernel" url="http://blog.hac425.top/categories/kernel/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/17/pwn_with_format_0ctf_easyprintf.html</loc>
    <lastmod>2017-12-17T10:28:40.796Z</lastmod>
    <data>
        <display>
        <title>格式化字符串漏洞利用实战之 0ctf-easyprintf</title>
        <pubTime>2017-12-17T10:20:00.000Z</pubTime>
        
        <tag>format string</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/17/pwn_with_format_decoder.html</loc>
    <lastmod>2017-12-17T10:20:02.292Z</lastmod>
    <data>
        <display>
        <title>格式化字符串漏洞利用实战之 njctf-decoder</title>
        <pubTime>2017-12-17T01:51:00.000Z</pubTime>
        
        <tag>format string</tag>
         
        <tag>exploit</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/16/pwn_with_srop.html</loc>
    <lastmod>2017-12-16T10:20:37.097Z</lastmod>
    <data>
        <display>
        <title>srop实战</title>
        <pubTime>2017-12-16T09:36:00.000Z</pubTime>
        
        <tag>srop</tag>
         
        <tag>rop</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/12/16/syscall_to_rop.html</loc>
    <lastmod>2017-12-16T06:40:19.853Z</lastmod>
    <data>
        <display>
        <title>syscall to rop</title>
        <pubTime>2017-12-16T06:22:00.000Z</pubTime>
        
        <tag>rop</tag>
         
        <tag>syscall</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/11/27/have_fun_with_chrome_part1.html</loc>
    <lastmod>2017-12-14T13:00:09.709Z</lastmod>
    <data>
        <display>
        <title>Play-with-chrome之环境搭建</title>
        <pubTime>2017-11-27T14:49:00.000Z</pubTime>
        
        <tag>pwn chrome</tag>
         
         
           
             
              <breadCrumb title="chrome" url="http://blog.hac425.top/categories/chrome/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/08/14/android_kernel_explit_part1.html</loc>
    <lastmod>2017-11-30T15:50:24.928Z</lastmod>
    <data>
        <display>
        <title>Android内核漏洞利用技术实战：环境搭建&栈溢出实战</title>
        <pubTime>2017-08-14T15:31:00.000Z</pubTime>
        
        <tag>kernel_exploit</tag>
         
        <tag>android_kernel</tag>
         
         
           
             
              <breadCrumb title="安卓安全" url="http://blog.hac425.top/categories/%E5%AE%89%E5%8D%93%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/11/23/CVE_2017_11882_Phishing_sample.html</loc>
    <lastmod>2017-11-23T01:41:00.199Z</lastmod>
    <data>
        <display>
        <title>CVE-2017-11882钓鱼样本构造</title>
        <pubTime>2017-11-23T01:03:00.000Z</pubTime>
        
        <tag>office漏洞</tag>
         
        <tag>CVE-2017-11882</tag>
         
         
           
             
              <breadCrumb title="渗透测试" url="http://blog.hac425.top/categories/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/11/19/android_studio_use_openssl.html</loc>
    <lastmod>2017-11-20T07:19:43.507Z</lastmod>
    <data>
        <display>
        <title>android studio使用openssl</title>
        <pubTime>2017-11-19T06:30:00.000Z</pubTime>
        
        <tag>openssl</tag>
         
        <tag>开发</tag>
         
         
           
             
              <breadCrumb title="安卓安全" url="http://blog.hac425.top/categories/%E5%AE%89%E5%8D%93%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/11/17/use_sa_jdi_jar_dump_class.html</loc>
    <lastmod>2017-11-20T07:19:30.334Z</lastmod>
    <data>
        <display>
        <title>使用sa-jdi.jar dump 内存中的class</title>
        <pubTime>2017-11-17T11:01:00.000Z</pubTime>
        
        <tag>dump class</tag>
         
        <tag>sa-jdi.jar</tag>
         
         
           
             
              <breadCrumb title="java应用破解思路" url="http://blog.hac425.top/categories/java%E5%BA%94%E7%94%A8%E7%A0%B4%E8%A7%A3%E6%80%9D%E8%B7%AF/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/11/07/patch_file_methods.html</loc>
    <lastmod>2017-11-20T07:18:51.345Z</lastmod>
    <data>
        <display>
        <title>可执行文件patch技术&&持续更新</title>
        <pubTime>2017-11-07T13:51:00.000Z</pubTime>
        
        <tag>patch</tag>
         
        <tag>elf patch</tag>
         
        <tag>pe patch</tag>
         
        <tag>mach-o patch</tag>
         
        <tag>ctf</tag>
         
         
           
             
              <breadCrumb title="文件patch" url="http://blog.hac425.top/categories/%E6%96%87%E4%BB%B6patch/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/11/05/shctf2017_pwn100_pwn200.html</loc>
    <lastmod>2017-11-20T07:18:31.288Z</lastmod>
    <data>
        <display>
        <title>上海ctf2017 pwn100 && pwn200</title>
        <pubTime>2017-11-05T15:32:00.000Z</pubTime>
        
        <tag>heap</tag>
         
         
           
             
              <breadCrumb title="ctf" url="http://blog.hac425.top/categories/ctf/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/10/27/MIPS_rop_gadgets_collects.html</loc>
    <lastmod>2017-11-20T07:18:10.474Z</lastmod>
    <data>
        <display>
        <title>MIPS rop gadgets记录贴&&持续更新</title>
        <pubTime>2017-10-27T07:01:00.000Z</pubTime>
        
        <tag>mips rop</tag>
         
         
           
             
              <breadCrumb title="路由器安全" url="http://blog.hac425.top/categories/%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AE%89%E5%85%A8/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/10/27/crack_jeb_mips_2_3_7.html</loc>
    <lastmod>2017-11-20T07:17:27.173Z</lastmod>
    <data>
        <display>
        <title>破解 jeb  2.3.7 demo</title>
        <pubTime>2017-10-27T02:15:00.000Z</pubTime>
        
        <tag>jeb 2.3.7</tag>
         
         
           
             
              <breadCrumb title="jeb破解" url="http://blog.hac425.top/categories/jeb%E7%A0%B4%E8%A7%A3/"/>
          
        </display>
    </data>
    </url>

    
  <url>
    <loc>http://blog.hac425.top/2017/10/23/crack_jeb_mips_2_3_3.html</loc>
    <lastmod>2017-11-20T07:14:42.289Z</lastmod>
    <data>
        <display>
        <title>java应用破解之破解 jeb mips 2.3.3 </title>
        <pubTime>2017-10-23T14:25:00.000Z</pubTime>
        
        <tag>jeb</tag>
         
        <tag>破解</tag>
         
        <tag>jar包调试</tag>
         
         
           
             
              <breadCrumb title="jeb破解" url="http://blog.hac425.top/categories/jeb%E7%A0%B4%E8%A7%A3/"/>
          
        </display>
    </data>
    </url>

    
    
    
</urlset>