解决livedisplay不自动调节的问题。

刷了cyanogen OS ,很流畅,但是我发现了一个小问题,那就是我的livedisplay不自动调节了,Google一番后,找到了答案,原因是我在刷机后的系统引导中禁用了位置信息,而livedisplay需要位置信息来获取日出日落时间,所以我又傻缺了。

解决方法:开启位置信息(精度高),重启下就可以了。

原谅我放荡不羁像傻逼。

今天手机喜闻乐见的又黑砖了。

普通救砖工具,无法连接。
直接fastboot刷写recover,无法连接。
Msm8974DownloadTool,无反应。

心想,这是要跪,阴沟里翻船啊。

一低头,数据线没插。。

sqlmap -hh

为了方便阅读,输出并摘录如下:
Linux lilei 3.2.0-3-686-pae #1 SMP Mon Jul 23 03:50:34 UTC 2012 i686

The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.

Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
root@lilei:~# sqlmap

sqlmap/0.9 - automatic SQL injection and database takeover tool
http://sqlmap.sourceforge.net

Usage: python /root/sqlmap/sqlmap/sqlmap.py [options]

sqlmap.py: error: missing a mandatory parameter ('-d', '-u', '-l', '-r', '-g', '-c', '--wizard' or '--update'), -h for help
root@lilei:~# sqlmap -hh

sqlmap/0.9 - automatic SQL injection and database takeover tool
http://sqlmap.sourceforge.net

Usage: python /root/sqlmap/sqlmap/sqlmap.py [options]

Options:
--version show program's version number and exit
-h, --help show this help message and exit
-v VERBOSE Verbosity level: 0-6 (default 1)

Target:

At least one of these options has to be specified to set the source to
get target urls from.

-d DIRECT           Direct connection to the database
-u URL, --url=URL   Target url
-l LIST             Parse targets from Burp or WebScarab proxy logs
-r REQUESTFILE      Load HTTP request from a file
-g GOOGLEDORK       Process Google dork results as target urls
-c CONFIGFILE       Load options from a configuration INI file

Request:

These options can be used to specify how to connect to the target url.

--data=DATA         Data string to be sent through POST
--cookie=COOKIE     HTTP Cookie header
--cookie-urlencode  URL Encode generated cookie injections
--drop-set-cookie   Ignore Set-Cookie header from response
--user-agent=AGENT  HTTP User-Agent header
--random-agent      Use randomly selected HTTP User-Agent header
--referer=REFERER   HTTP Referer header
--headers=HEADERS   Extra HTTP headers newline separated    --auth-type=ATYPE   HTTP authentication type (Basic, Digest or NTLM)
--auth-cred=ACRED   HTTP authentication credentials (name:password)
--auth-cert=ACERT   HTTP authentication certificate (key_file,cert_file)
--proxy=PROXY       Use a HTTP proxy to connect to the target url
--proxy-cred=PCRED  HTTP proxy authentication credentials (name:password)
--ignore-proxy      Ignore system default HTTP proxy
--delay=DELAY       Delay in seconds between each HTTP request
--timeout=TIMEOUT   Seconds to wait before timeout connection (default 30)
--retries=RETRIES   Retries when the connection timeouts (default 3)
--scope=SCOPE       Regexp to filter targets from provided proxy log
--safe-url=SAFURL   Url address to visit frequently during testing
--safe-freq=SAFREQ  Test requests between two visits to a given safe url

Optimization:

These options can be used to optimize the performance of sqlmap.

-o                  Turn on all optimization switches
--predict-output    Predict common queries output
--keep-alive        Use persistent HTTP(s) connections
--null-connection   Retrieve page length without actual HTTP response body
--threads=THREADS   Max number of concurrent HTTP(s) requests (default 1)

Injection:

These options can be used to specify which parameters to test for,
provide custom injection payloads and optional tampering scripts.

-p TESTPARAMETER    Testable parameter(s)
--dbms=DBMS         Force back-end DBMS to this value
--os=OS             Force back-end DBMS operating system to this value
--prefix=PREFIX     Injection payload prefix string
--suffix=SUFFIX     Injection payload suffix string
--tamper=TAMPER     Use given script(s) for tampering injection data

Detection:

These options can be used to specify how to parse and compare page
content from HTTP responses when using blind SQL injection technique.

--level=LEVEL       Level of tests to perform (1-5, default 1)
--risk=RISK         Risk of tests to perform (0-3, default 1)
--string=STRING     String to match in page when the query is valid
--regexp=REGEXP     Regexp to match in page when the query is valid
--text-only         Compare pages based only on the textual content

Techniques:

These options can be used to tweak testing of specific SQL injection
techniques.

--technique=TECH    SQL injection techniques to test for (default BEUST)
--time-sec=TIMESEC  Seconds to delay the DBMS response (default 5)
--union-cols=UCOLS  Range of columns to test for UNION query SQL injection
--union-char=UCHAR  Character to use for bruteforcing number of columns

Fingerprint:

-f, --fingerprint   Perform an extensive DBMS version fingerprint

Enumeration:

These options can be used to enumerate the back-end database
management system information, structure and data contained in the
tables. Moreover you can run your own SQL statements.

-b, --banner        Retrieve DBMS banner
--current-user      Retrieve DBMS current user
--current-db        Retrieve DBMS current database
--is-dba            Detect if the DBMS current user is DBA
--users             Enumerate DBMS users
--passwords         Enumerate DBMS users password hashes    --privileges        Enumerate DBMS users privileges
--roles             Enumerate DBMS users roles
--dbs               Enumerate DBMS databases
--tables            Enumerate DBMS database tables
--columns           Enumerate DBMS database table columns
--dump              Dump DBMS database table entries
--dump-all          Dump all DBMS databases tables entries
--search            Search column(s), table(s) and/or database name(s)
-D DB               DBMS database to enumerate
-T TBL              DBMS database table to enumerate
-C COL              DBMS database table column to enumerate
-U USER             DBMS user to enumerate
--exclude-sysdbs    Exclude DBMS system databases when enumerating tables
--start=LIMITSTART  First query output entry to retrieve    --stop=LIMITSTOP    Last query output entry to retrieve
--first=FIRSTCHAR   First query output word character to retrieve
--last=LASTCHAR     Last query output word character to retrieve
--sql-query=QUERY   SQL statement to be executed
--sql-shell         Prompt for an interactive SQL shell

Brute force:

These options can be used to run brute force checks.

--common-tables     Check existence of common tables
--common-columns    Check existence of common columns

User-defined function injection:

These options can be used to create custom user-defined functions.

--udf-inject        Inject custom user-defined functions    --shared-lib=SHLIB  Local path of the shared library

File system access:

These options can be used to access the back-end database management
system underlying file system.

--file-read=RFILE   Read a file from the back-end DBMS file system
--file-write=WFILE  Write a local file on the back-end DBMS file system
--file-dest=DFILE   Back-end DBMS absolute filepath to write to

Operating system access:

These options can be used to access the back-end database management
system underlying operating system.

--os-cmd=OSCMD      Execute an operating system command
--os-shell          Prompt for an interactive operating system shell
--os-pwn            Prompt for an out-of-band shell, meterpreter or VNC
--os-smbrelay       One click prompt for an OOB shell, meterpreter or VNC
--os-bof            Stored procedure buffer overflow exploitation
--priv-esc          Database process' user privilege escalation
--msf-path=MSFPATH  Local path where Metasploit Framework 3 is installed
--tmp-path=TMPPATH  Remote absolute path of temporary files directory

Windows registry access:

These options can be used to access the back-end database management
system Windows registry.

--reg-read          Read a Windows registry key value
--reg-add           Write a Windows registry key value data
--reg-del           Delete a Windows registry key value
--reg-key=REGKEY    Windows registry key
--reg-value=REGVAL  Windows registry key value
--reg-data=REGDATA  Windows registry key value data
--reg-type=REGTYPE  Windows registry key value type

General:

These options can be used to set some general working parameters.

-t TRAFFICFILE      Log all HTTP traffic into a textual file
-s SESSIONFILE      Save and resume all data retrieved on a session file
--flush-session     Flush session file for current target
--fresh-queries     Ignores query results stored in session file
--eta               Display for each output the estimated time of arrival
--update            Update sqlmap
--save              Save options on a configuration INI file
--batch             Never ask for user input, use the default behaviour

Miscellaneous:

--beep              Alert when sql injection found
--check-payload     IDS detection testing of injection payloads
--cleanup           Clean up the DBMS by sqlmap specific UDF and tables
--forms             Parse and test forms on target url
--gpage=GOOGLEPAGE  Use Google dork results from specified page number
--page-rank         Display page rank (PR) for Google dork results
--parse-errors      Parse DBMS error messages from response pages
--replicate         Replicate dumped data into a sqlite3 database
--tor               Use default Tor (Vidalia/Privoxy/Polipo) proxy address
--wizard            Simple wizard interface for beginner users

root@lilei:~#

一起来做熊孩子———mcpe服务器搭建过程

好久没有更新过了,所以水一篇凑个数。。

1.以ROOT身份连接自己的vps,无需多说大家都会。
2.获取pocketmine,进入后点获取pocketmine,按照官网说明安装依赖:

安装编译需要的依赖项目, 你可能需要安装perl, gcc, make, automake, libtool, autoconf和m4. 如果你想在x86_64架构上编译你可能需要安装gcc-multilib.

然后执行以下代码:
wget -q -O install.sh http://get.pocketmine.net/
chmod 777 install.sh
./install.sh -r

然后是漫长的等待,直到你看见了这个
pocket1.png

[INFO] Cleaning up... done!

[PocketMine] You should start the server now using "./start.sh."
[PocketMine] If it doesn't work, please send the "install.log" file to the Bug Tracker.

然后执行
./start.sh

接下来会询问你所使用的语言,输入zh就可以,当然你其他语种好我也不拦你。
询问是否跳过向导时回答 N
接下来是服务器名称,写个自己喜欢的就可以了。
服务器端口,为避免不必要的麻烦,默认(19132)就可以了。
分配的内存,如果自己玩128足矣,如果你要分配高了我也不拦你。233
选择模式, 1是生存,2是创造,说的很明白。
询问是否保护出生点,一般选y,、再熊也要根据地啊。233
接下来设置op的名字,自己填。
白名单的设置,是开是关,你开心就好。
接下来是Query请求,看官方的口气不让禁用,那就N好了。
接下来是RCON类似远程控制台,启用也没多大坏处,反正需要密码,还方便管理,说着我禁用了它。
然后是内网ip和外网ip的检查,因为vps一般都带外部ip,直接回车就好。

这时候你可能发现还无法连接,关掉防火墙就好了。

3.打开mcpe,和基友们一块去浪吧。

最新文章

最近回复

  • 演员:不然呢!
  • 萌新:大佬
  • siyochen:我一直想养只猫。哎 也对自己说,,会有猫的
  • 姜辰:当利益产生,你就可以看到人的让人恶心的地方。
  • 姜辰:你在撸猫?
  • 姜辰:我的天,我被凝视了
  • 徐缓归:同 蹭腾讯的羊毛
  • 欣欣:不知该说什么 敬佩勇敢的人
  • 苏格:这是超大的局域网
  • BlogHome:亲,博客小屋新增博客评论了,快看看大家怎么评价您的博客吧~~

分类

归档

其它