内网优质文章汇总

PowerShell渗透--Empire
https://www.cnblogs.com/micr067/p/11729984.html

PowerShell攻击:nishang
https://www.cnblogs.com/micr067/p/11746225.html

利用计划任务进行权限维持的几种姿势
https://mp.weixin.qq.com/s?__biz=MzA3NzE2MjgwMg==&mid=2448904440&idx=1&sn=bc8fce87ee94dd507856230cdac398e8&chksm=8b55c0a5bc2249b39fcba143c536e9cf406175d8265065ab8d8995cf88f63d514ef7e02c878e&mpshare=1&scene=1&srcid=11066F8R2UsRfjtme9e81OrZ&sharer_sharetime=1573006815638&sharer_shareid=e1ab00ee89b981526515e9d989d1c498&key=730c73cf440e63efb74504e5b510c461a26d80855225033eae4d30459285625a9eeb4403fe185e852c4fdc4c1020792d307e040247be3930f84a29f095273fc42125b0d78886598c937f79f6eb8b80a0&ascene=1&uin=MjY5MDA0ODIwMA%3D%3D&devicetype=Windows+10&version=62060833&lang=zh_CN&pass_ticket=%2FUxS8CW5myqWWxR3TAEpTvXt77SqDjzW09x3H71GnqiCaMn4A8VtlGa2a9X4za8K

Linux服务器为什么被黑?
https://mp.weixin.qq.com/s?__biz=MzIyMDEzMTA2MQ==&mid=2651150862&idx=1&sn=b47c047d617882c1411c534e06fb31b5&chksm=8c214194bb56c882a157ff904acc6f88c1124b4d8e3feffb2faaba900783f7538d743f026d61&mpshare=1&scene=1&srcid=1107JP8riRwG4oX4C2hLc5kZ&sharer_sharetime=1573088241283&sharer_shareid=e1ab00ee89b981526515e9d989d1c498&key=9788e4e971fa1adc3ff0af0e2b9b40ff6c5e50ff81c74f303e51309a6efaae0abf63d37df5dd0e3b266a7c5d9ba27a7c98e2f50ca4c8f6fcfb75e2a382fb99b9dd42e41f4c57b62824be8a4398ea9e6f&ascene=1&uin=MjY5MDA0ODIwMA%3D%3D&devicetype=Windows+10&version=62060833&lang=zh_CN&pass_ticket=%2FUxS8CW5myqWWxR3TAEpTvXt77SqDjzW09x3H71GnqiCaMn4A8VtlGa2a9X4za8K

msf下域内渗透
http://mp.weixin.qq.com/s?__biz=MzI3Njc1MjcxMg==&mid=2247484380&idx=1&sn=f5376b89ba8f10a05bfc0f3603f3c251&chksm=eb71f3fbdc067aeddf6805ace2b867b6ab35cca1aae43e9484b21b90db0c0f59c50f9dbae30f&mpshare=1&scene=24&srcid=1113S6MZjd5cLFCRKIdgt9rf&sharer_sharetime=1573617089156&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

主机安全之linux本地提权
http://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247496080&idx=2&sn=9e10ad42c7eff2069ee8d41e27ce3b9b&chksm=e91521aade62a8bcbf1ab0ef219daf009b99e8eaf76e1eb189b59ca3eaffb93923cc5b8069f6&mpshare=1&scene=24&srcid=1108yul8lPR9H56WiKIwLdi9&sharer_sharetime=1573208758325&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

windows权限维持-注册表运行键
http://mp.weixin.qq.com/s?__biz=MzA3NzE2MjgwMg==&mid=2448904434&idx=1&sn=8865bc7a6e227b2e8a9446c8c23612f7&chksm=8b55c0afbc2249b98dd4255ae44a52439f7f73f4c60ddbe4b4e62af40b43616c0d6007f0e0a0&mpshare=1&scene=24&srcid=11052qq3PAOTUuEmfsmAuYvy&sharer_sharetime=1572961552526&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

后渗透之权限维护 整理
http://mp.weixin.qq.com/s?__biz=MzU2NzkxMDUyNg==&mid=2247485080&idx=3&sn=b1b05ac0acc632f7ab695bb48ff88748&chksm=fc974f89cbe0c69f00d85026f9a75385b907c4aa4cee91ec615b3e6d6c3b7de6f347f8371947&mpshare=1&scene=24&srcid=1029QSsdUigsCekr9EuKDyqd&sharer_sharetime=1572322649093&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

基于inetd后门的分析和利用
http://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650457817&idx=3&sn=370e7bc8093f8d9f4e43fca8a276a737&chksm=83bba33db4cc2a2ba7a29c7aaedd45b3aea3ce3b5ff2d0f7b4595407a3ded332ea5e9a12ad0e&mpshare=1&scene=24&srcid=10288bUjXxhSvbszENPkm2U3&sharer_sharetime=1572228553011&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

unlink漏洞简单分析
http://mp.weixin.qq.com/s?__biz=MzU2NzkxMDUyNg==&mid=2247485057&idx=1&sn=9ea1260a8e57b89398c1a2faf0dfff9c&chksm=fc974f90cbe0c6863c07ad34f92cfc3cfc09b599deb3aa5938520f166ea5d1e17d688246169c&mpshare=1&scene=24&srcid=10276c7Mls8vH0oPgzUWroud&sharer_sharetime=1572169478210&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

个人原创精华文章汇总
http://mp.weixin.qq.com/s?__biz=MzA3NzE2MjgwMg==&mid=2448904380&idx=1&sn=b2eaa572c88af154654fcb0e415acc1b&chksm=8b55c0e1bc2249f788faa1631f5a27710fce808dc1947cccd426f37aaef3c6e4a9d9e02d931f&mpshare=1&scene=24&srcid=1026MwAxb0kBbntBLXNwkL4a&sharer_sharetime=1572084027815&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

apache底层后门
http://mp.weixin.qq.com/s?__biz=MzU0MDcyNDI3MQ==&mid=2247483820&idx=1&sn=191a32c42f765cb3210ad2ae50ad9c7d&chksm=fb359ceccc4215fa5e32b839c5d9b4d277efbd5f0629aba4c7b8c50d120ba63219363d7f120b&mpshare=1&scene=24&srcid=1025RlREJCwHVWgt5eswAKUZ&sharer_sharetime=1571954488643&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

获取域内机器共享
http://mp.weixin.qq.com/s?__biz=MzUyMzczNzUyNQ==&mid=2247487765&idx=3&sn=6a09bbbf91db1f9094ac1d44d692f321&chksm=fa3951cfcd4ed8d934915984be6da6a548aa091de884b16a518aef4f0be2f025eff933f394f3&mpshare=1&scene=24&srcid=1023iyAvEffHfFIkD2Mp6TWv&sharer_sharetime=1571795908918&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

uac绕过初探
http://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651078329&idx=3&sn=94a40ce69cb468afc5c571b1f41f5d9c&chksm=bd1fac328a68252497294d148d280b562c4d2cd79bfd708a82f97cce9049d76b7a92e2f5be17&mpshare=1&scene=24&srcid=1022ZWFIV1baof50HYxwduWu&sharer_sharetime=1571785528290&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

SPN发现与使用
http://mp.weixin.qq.com/s?__biz=MzI0NzEwOTM0MA==&mid=2652471926&idx=1&sn=cce5287e2cae736d0b8859b2ed08c6da&chksm=f25821c5c52fa8d3cd497d3510fbb48c2a833a37acfd8b545dbe06025f76bf59e7c9e0e22a5a&mpshare=1&scene=24&srcid=1016Temll1c98U6DQZOUfDTQ&sharer_sharetime=1571219627166&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

滥用exchange:通过API调用获取域管理员权限
http://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247495757&idx=4&sn=267241ddec52c148c342032636b9245b&chksm=e9152077de62a9610cbb94f7149c33deea9589a7f293ca0673e74ba6623d29e940b66bac4ee5&mpshare=1&scene=24&srcid=1016A5XmOKl3BBDEq0xcnxPh&sharer_sharetime=1571181359468&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

后渗透凭证收集
http://mp.weixin.qq.com/s?__biz=MzU4ODU1MzAyNg==&mid=2247487286&idx=1&sn=8dcff44221e3c80c51b5072668d96127&chksm=fdda411bcaadc80d141f983d24400e9defa7f4a5beeff8a71ef1722b6dbb15cb6a769c6f3ee6&mpshare=1&scene=24&srcid=1014KsATgbWdNqYKbNtcoqez&sharer_sharetime=1571045592110&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

impackte套件只远程命令执行功能讲解
http://mp.weixin.qq.com/s?__biz=MzI0NzEwOTM0MA==&mid=2652471835&idx=1&sn=64ed79eda93eda80923d3797136b39b3&chksm=f25821a8c52fa8bed252a378dbcd04f54a5f21b697caf1a968145492168080c0108b4d61ee83&mpshare=1&scene=24&srcid=1010l9rX3KEmmkVVt806CF4G&sharer_sharetime=1570701146032&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

内网渗透知识基础及流程
http://mp.weixin.qq.com/s?__biz=MzU4ODU1MzAyNg==&mid=2247487256&idx=1&sn=42bdc47d89660a0f5e3ec4d40c4d129e&chksm=fdda4135caadc823862ca1b6adc4b5db8cfcfb9a7f738c4180b0123c8f9b51a0157c92fd24e6&mpshare=1&scene=24&srcid=1009rvUcTaVFuAj47bLIq0V9&sharer_sharetime=1570616142507&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

windows中常见后门持久化方法总结
http://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650457574&idx=1&sn=a8a03eb22c19f3106a676f0925ba8c24&chksm=83bba002b4cc291402466c0bb205ab3658d77fbaf78d187a89ebf99b56d300a8776882647703&mpshare=1&scene=24&srcid=100746IJU4dW3os408RjhDST&sharer_sharetime=1570414466393&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

kerberos中继攻击:滥用无约束委派(上)
http://mp.weixin.qq.com/s?__biz=MzU2MTQwMzMxNA&mid=2247487456&idx=3&sn=112e32245f55bcf31ad666fab3ec4e9d&chksm=fc780b3dcb0f822bcd31253e2394f387853d7380450ac76583208ee5a831e4de70e7e3be9a31&mpshare=1&scene=24&srcid=0927Y8nCE4yKxf61uAGe96Fm&sharer_sharetime=1569577187839&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd
kerberos中继攻击:滥用无约束委派(下)
http://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ
&mid=2247495576&idx=2&sn=abc7a4269d4549944ff9f1edd310927d&chksm=e9153fa2de62b6b4abb1a8229a7d144804cff4ff6b317b7383d056aa069631d9e19bd79936e5&mpshare=1&scene=24&srcid=1001Zhyd6Br50IMzeP8gA320&sharer_sharetime=1569924495137&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

从webshell到域控实战详解
http://mp.weixin.qq.com/s?__biz=MzU1NjgzOTAyMg==&mid=2247485289&idx=1&sn=5eb0086d0512c20142a7f9d3799149a4&chksm=fc3fbe68cb48377eda2856487d234d15b7ce2997f7dd82cd07453b1d8d946161e8d5f655655f&mpshare=1&scene=24&srcid=1001tacIghxpFhdOFknlu7QO&sharer_sharetime=1569891871795&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

三大渗透框架权限维持
http://mp.weixin.qq.com/s?__biz=MzA3NzE2MjgwMg==&mid=2448904307&idx=1&sn=2bc6e7d98b027ee1ec1d6ea84e559c8f&chksm=8b55c02ebc22493835408d3975801d62631c432bc21a3753fb3b1d5f87847e82f2a7aeccf55c&mpshare=1&scene=24&srcid=0928COw4aNNbve8caqS4pyrN&sharer_sharetime=1569680221024&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

域渗透-使用exchange服务器中的acl实现域提权
http://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247495524&idx=3&sn=566544032e847e8cba9404c1acb56b29&chksm=e9153f5ede62b648c6c6e347d5a24e41de975e9ccd8731946b2b0e519db2affd6dceecc545e7&mpshare=1&scene=24&srcid=0927SIJiFxju6DUQxv0rEPGt&sharer_sharetime=1569579471787&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

内网渗透测试定位技术总结
http://mp.weixin.qq.com/s?__biz=MzU4ODU1MzAyNg==&mid=2247487207&idx=1&sn=2b5aa3e571fc2d9bfa9b1ff44561baba&chksm=fdda40cacaadc9dc702311f63f87e3354bcfba60d5ca68d3e06dc9cbe2361d2e2b9791326389&mpshare=1&scene=24&srcid=0923k5EfKrfqgfyIDEvlC0m0&sharer_sharetime=1569194303319&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

内存转储-获取本地hash
http://mp.weixin.qq.com/s?__biz=MzI4MjA1MzkyNA==&mid=2655304323&idx=2&sn=2e6c354004bb9115eed71a27dfb74106&chksm=f02fc6c8c7584fde4f076bf3604917217813de99c4b766ff8e7e538368541452077e2b55b98e&mpshare=1&scene=24&srcid=09080Ypmfau1EpFAo90TucVs&sharer_sharetime=1567908139446&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

利用winrm实现内网无文件攻击反弹shell
http://mp.weixin.qq.com/s?__biz=MzI2OTMzNjg4OQ==&mid=2247484692&idx=1&sn=8a55ef2a1e0b03b350d11225b9fa8c73&chksm=eae0ad42dd972454fd1134bdca982c71827ad8a6ace8e9eb46f2d9db76bc5db7a00e6dba9a50&mpshare=1&scene=24&srcid=0827PWOv9UHaKdv2ascn3myD&sharer_sharetime=1566901058149&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

邮件服务的发现和密取手法
http://mp.weixin.qq.com/s?__biz=Mzg5MTA3NTg2MA==&mid=2247484247&idx=1&sn=055fcf32cc8a278ae42fbe49432ec48b&chksm=cfd3af2cf8a4263a56be82c94752d37323ed54b1b3496df9edb3d428ebb38be81409a48894c9&mpshare=1&scene=24&srcid=0827qqFb3C6aI5EiVBFsUT9T&sharer_sharetime=1566900846804&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

windows下的几种隐藏技术 - 权限维持
http://mp.weixin.qq.com/s?__biz=MzA3NzE2MjgwMg==&mid=2448904235&idx=1&sn=e08cd6925c695dfb4d3ecdfa7fea783f&chksm=8b55c076bc224960215c3104d7c1db4b6e77b9bf68f81dba331d04f656ff2c58da286ff2f3bf&mpshare=1&scene=24&srcid=08197gc45IBwRZ57WZD4lJuB&sharer_sharetime=1566208580651&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

通过可写入的etc/passwd文件实现linux提权
http://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA&mid=2651077066&idx=3&sn=ead84438e14c4925e34ca2137a43486d&chksm=bd1fab418a682257246a57a34ce679ae25c5cc698f6cf0c1595b5d984e0090153d86907797a8&mpshare=1&scene=24&srcid=0818xBMXTeaF5byz4itE466L&sharer_sharetime=1566130851528&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd
http://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA
&mid=2651077066&idx=3&sn=ead84438e14c4925e34ca2137a43486d&chksm=bd1fab418a682257246a57a34ce679ae25c5cc698f6cf0c1595b5d984e0090153d86907797a8&mpshare=1&scene=24&srcid=0818xBMXTeaF5byz4itE466L&sharer_sharetime=1566130812955&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

windows认证-白银票据,黄金票据分析及利用
http://mp.weixin.qq.com/s?__biz=Mzg4NzI0MDMwMQ==&mid=2247483811&idx=1&sn=28a07bad55f6cbd28162b2f8d77d8d99&chksm=cf8c22a1f8fbabb7d8a14b5450e53041f7500fb5fafa69c3fe456a51ff9fa4dd3da1f0303a2a&mpshare=1&scene=24&srcid=0817vsJXy8a3kqrTpGoNILaO&sharer_sharetime=1566013960826&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

域渗透-adminsdholder
http://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247494739&idx=4&sn=ce89f1aa5ecb315102ef9d298722e0c2&chksm=e9153c69de62b57fe79e55459f75794525af2aa0439e58af3b9bd7385834d24dad7d883a2e6c&mpshare=1&scene=24&srcid=0813uYVv4cG6PLU2vJBcjCjT&sharer_sharetime=1565692506020&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

域渗透-as-rep roasting
http://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247494721&idx=4&sn=be16c0c586f3d1a1b9d372553f45ee6c&chksm=e9153c7bde62b56df7db313bc230359cb25dd3f395091ba51f08edc6d43b62e197d1ca7c6bbf&mpshare=1&scene=24&srcid=0812sAH0AYpS1lLDEhyHV0tR&sharer_sharetime=1565605225020&sharer_shareid=e1ab00ee89b981526515e9d989d1c498#rd

Windows内网协议学习Kerberos篇之PAC
https://mp.weixin.qq.com/s?__biz=MzUyMzczNzUyNQ==&mid=2247487896&idx=3&sn=2caf1aac33c53395193f9414f6c7d7ea&chksm=fa395142cd4ed854f34cf33d29f84b7de0d908779361296b24cbef4f475207515ef8973dfb87&scene=0&xtrack=1&key=4f30461a8bd299cc9480a90e6eb2a08f24a2c13b86edf618037a927d2a33d961e4424001982b2d27c3eaea76e9da1d37fa6158704309c626f12fe2bf5cf1bae3d2af32ba69e4828a77a94cb53b89a622&ascene=1&uin=MjY5MDA0ODIwMA%3D%3D&devicetype=Windows+10&version=62060833&lang=zh_CN&pass_ticket=%2FUxS8CW5myqWWxR3TAEpTvXt77SqDjzW09x3H71GnqiCaMn4A8VtlGa2a9X4za8K

授人予渔:你必须知道的 SYSTEM 令牌窃取攻防技术细节
https://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247496125&idx=2&sn=8357a2ba8a9cd838575a466bcd5af49b&chksm=e9152187de62a891ed8c6d98609b2c5f31e0c7aa85deb8e77192d7f5a7fb9afc6c80a5d24719&mpshare=1&scene=1&srcid=11128qD82xFiBGORaSAzHrsv&sharer_sharetime=1573554529775&sharer_shareid=e1ab00ee89b981526515e9d989d1c498&key=4f30461a8bd299cca1b6c9d89de26414890e9151908c58f074a48b2db3a62f70a2d06b06a3542eee94d80e66e961bcf2ba24236120e6f4b39653612a47eca4c3c1208663efcb03f3a215de19c1009011&ascene=1&uin=MjY5MDA0ODIwMA%3D%3D&devicetype=Windows+10&version=62060833&lang=zh_CN&pass_ticket=%2FUxS8CW5myqWWxR3TAEpTvXt77SqDjzW09x3H71GnqiCaMn4A8VtlGa2a9X4za8K

工作组环境中进行内网渗透常见方法总结
https://mp.weixin.qq.com/s?__biz=MzU3MTU3NDk4Mw==&mid=2247483752&idx=1&sn=9f4377c6632d6ec37adf4ed7abba61bb&chksm=fcdf5ec0cba8d7d6717087acbf59ee0647ea1e4cba85898734338f78a3daa353a22666b79567&mpshare=1&scene=1&srcid=1117mB4w2GAB9AyfRyhTm7RE&sharer_sharetime=1573957860593&sharer_shareid=e1ab00ee89b981526515e9d989d1c498&key=9788e4e971fa1adca351a2fef50a594e05f9bfefcbb1fa4b50c57c6577829bab0b2c74cd142fd6ded1551b09a514896d16752d23baff1e35fbeec66b735295ac32af2264ccff5d048094882cba4bb431&ascene=1&uin=MjY5MDA0ODIwMA%3D%3D&devicetype=Windows+10&version=62070158&lang=zh_CN&pass_ticket=osdZPzGM%2BsmAgzyH9dzTpCKm2lvHOn7cw7nRj9KJN2K56dcTnvhbY6KYSNt5k8Yb

NTLM 中继攻击的几种非主流玩法
https://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247496190&idx=2&sn=8b0165c151b2145b089fa59b1f580efc&chksm=e91521c4de62a8d2e948a0dbcb4adbb79eadd93743b4596f9fbdbfbb52e1336562847b0c481a&mpshare=1&scene=1&srcid=11189iAlo6VRy8iOWERHoZlo&sharer_sharetime=1574032544033&sharer_shareid=e1ab00ee89b981526515e9d989d1c498&key=4f30461a8bd299cc660e913c32b0d8ef16d06ba73c0592492dde8d39fbdc83b4476dd069d30de31c7764b70d0f53b410ccec6806ee3b7f718119e9d1276b8a396b70225ec57b998acc49bc5fc50c28a3&ascene=1&uin=MjY5MDA0ODIwMA%3D%3D&devicetype=Windows+10&version=62070158&lang=zh_CN&pass_ticket=osdZPzGM%2BsmAgzyH9dzTpCKm2lvHOn7cw7nRj9KJN2K56dcTnvhbY6KYSNt5k8Yb

Window权限维持合集
链接: https://pan.baidu.com/s/1N82IY6Je-DoL5zg3P6Wt_w 提取码: pf8s

Windows内网协议学习NTLM篇之NTLM基础介绍
https://mp.weixin.qq.com/s?__biz=MzA5ODA0NDE2MA==&mid=2649719844&idx=3&sn=5b8e61f4a9db808c7334bb5b16fe6bfd&chksm=888cb44bbffb3d5d22380a1287db70ab4ce971ef68a5276720c13bdc606026eab577a6cbd3be&mpshare=1&scene=1&srcid=1119JU3AyJqpfWjJossB9Ny6&sharer_sharetime=1574157793126&sharer_shareid=e1ab00ee89b981526515e9d989d1c498&key=b0f65a082ed528f25106bb0c8f38b165f198842209816163a5197ec708289b972fb83bf0b9714ad112789c40b0f2c8c68c4ced5fc4b328f07bc78669576b77042074c551b86eb69a6463f664baad97a0&ascene=1&uin=MjY5MDA0ODIwMA%3D%3D&devicetype=Windows+10&version=62070158&lang=zh_CN&pass_ticket=osdZPzGM%2BsmAgzyH9dzTpCKm2lvHOn7cw7nRj9KJN2K56dcTnvhbY6KYSNt5k8Yb

技术干货 | Windows认证体系解读
https://mp.weixin.qq.com/s?__biz=MzU2MTQwMzMxNA==&mid=2247487977&idx=1&sn=d3fe6b1218157cebbdb1573edc6a735f&chksm=fc781534cb0f9c22cdf8b9bc273fa601d815e679e6c4884cb906ba583e1bd14b4cc0026b412a&mpshare=1&scene=1&srcid=1121JmhVNvzchii1bkPaL3JG&sharer_sharetime=1574293238211&sharer_shareid=e1ab00ee89b981526515e9d989d1c498&key=4f30461a8bd299cc06ee98d419982854a47ed21c065cbcdbf9f146059cbc24e3bd031cde121ac9f09ffd75a4fa9705d0e66a424f6c45f672dd16463b7711a1d807972101f9c695dd3e47acec686cc8a7&ascene=1&uin=MjY5MDA0ODIwMA%3D%3D&devicetype=Windows+10&version=62070158&lang=zh_CN&pass_ticket=osdZPzGM%2BsmAgzyH9dzTpCKm2lvHOn7cw7nRj9KJN2K56dcTnvhbY6KYSNt5k8Yb

posted @ 2019-11-21 09:16  mrhonest  阅读(308)  评论(0)    收藏  举报