对于如何学习 tvm 源代码,我参考蓝大的在知乎上对有关问题的回复,从前端开始阅读,这篇文章记录的是 relay 层次导入 onnx 模型的笔记。
You can find the machine there > Investigator
This is my first time to hack a Android box. Actually , i have no experience in Android development , but this is a beginner Vuln target machine, i say to myself, it’s a great way to learn something new!
This vuln target have an interesting Description: This VM tells us that there are a couple of lovers namely Alice and Bob, where the couple was originally very romantic, but since Alice worked at a private company, “Ceban Corp”, something has changed from Alice’s attitude towards Bob like something is “hidden”, And Bob asks for your help to get what Alice is hiding and get full access to the company!
靶机地址:https://www.vulnhub.com/entry/me-and-my-girlfriend-1,409/
Often one of the most useful (and to the beginner underrated) abilities of Metasploit is the msfpayload module. Multiple payloads can be created with this module and it helps something that can give you a shell in almost any situation. For each of these payloads you can go into msfconsole and select exploit/multi/handler. Run ‘set payload’ for the relevant payload used and configure all necessary options (LHOST, LPORT, etc). Execute and wait for the payload to be run. For the examples below it’s pretty self explanatory but LHOST should be filled in with your IP address (LAN IP if attacking within the network, WAN IP if attacking across the internet), and LPORT should be the port you wish to be connected back on.
List payloads
msfvenom -l
靶机地址:https://www.vulnhub.com/entry/kevgir-1,137/
盯上这个靶机是因为最近在看一些未授权访问漏洞总结,主要是针对 Redis、Jenkins 等 Web 服务的未授权访问,于是盯上了这个靶机。
本文是使用 Nmap 的一些小笔记,省的用的时候再去网络上查找。
Update your browser to view this website correctly. Update my browser now