<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" version="2.0"><channel><title>Halo</title><link>https://halo.hetao.lol</link><atom:link href="https://halo.hetao.lol/rss.xml" rel="self" type="application/rss+xml"/><description>Halo</description><generator>Halo v2.22.14</generator><language>zh-cn</language><image><url>https://halo.hetao.lol/upload/ScreenShot_2026-02-27_224844_929.png</url><title>Halo</title><link>https://halo.hetao.lol</link></image><lastBuildDate>Tue, 5 May 2026 08:42:36 GMT</lastBuildDate><item><title><![CDATA[奇安信防火墙 + Hillstone WAF 联合部署实操指南]]></title><link>https://halo.hetao.lol/archives/qi-an-xin-fang-huo-qiang-hillstone-waf-lian-he-bu-shu-shi-cao-zhi-nan</link><description><![CDATA[<img src="https://halo.hetao.lol/plugins/feed/assets/telemetry.gif?title=%E5%A5%87%E5%AE%89%E4%BF%A1%E9%98%B2%E7%81%AB%E5%A2%99%20%2B%20Hillstone%20WAF%20%E8%81%94%E5%90%88%E9%83%A8%E7%BD%B2%E5%AE%9E%E6%93%8D%E6%8C%87%E5%8D%97&amp;url=/archives/qi-an-xin-fang-huo-qiang-hillstone-waf-lian-he-bu-shu-shi-cao-zhi-nan" width="1" height="1" alt="" style="opacity:0;">本文针对内网Web应用安全对外发布需求，提供奇安信智慧防火墙与Hillstone WAF联合部署完整实操步骤，实现网络层+应用层双重防护，同时说明部署过程中可能出现的访问报错及初步排查方向，适用于技术运维人员参考实施。 一、部署目标 通过奇安信防火墙与Hillstone WAF联合部署，达成以下目标]]></description><guid isPermaLink="false">/archives/qi-an-xin-fang-huo-qiang-hillstone-waf-lian-he-bu-shu-shi-cao-zhi-nan</guid><dc:creator>halo</dc:creator><pubDate>Tue, 14 Apr 2026 15:35:34 GMT</pubDate></item><item><title><![CDATA[target-b渗透思路]]></title><link>https://halo.hetao.lol/archives/target-bshen-tou-si-lu</link><description><![CDATA[<img src="https://halo.hetao.lol/plugins/feed/assets/telemetry.gif?title=target-b%E6%B8%97%E9%80%8F%E6%80%9D%E8%B7%AF&amp;url=/archives/target-bshen-tou-si-lu" width="1" height="1" alt="" style="opacity:0;">信息收集 → 敏感文件泄露 → SQL注入绕过登录 → 文件上传+.htaccess解析绕过 → Webshell获取 → 数据库凭据泄露获取flag1 → 容器环境识别 → MySQL UDF提权 → 系统级flag获取 → Docker Socket逃逸 → 宿主机flag获取 一、信息收集 网]]></description><guid isPermaLink="false">/archives/target-bshen-tou-si-lu</guid><dc:creator>halo</dc:creator><pubDate>Fri, 27 Mar 2026 03:53:07 GMT</pubDate></item><item><title><![CDATA[target-a渗透思路]]></title><link>https://halo.hetao.lol/archives/san-jie-duan-kao-shi-webshen-tou-ce-shi</link><description><![CDATA[<img src="https://halo.hetao.lol/plugins/feed/assets/telemetry.gif?title=target-a%E6%B8%97%E9%80%8F%E6%80%9D%E8%B7%AF&amp;url=/archives/san-jie-duan-kao-shi-webshen-tou-ce-shi" width="1" height="1" alt="" style="opacity:0;">一、信息收集 1. 网段扫描 使用 nmap 进行存活主机探测： 对目标进行端口扫描]]></description><guid isPermaLink="false">/archives/san-jie-duan-kao-shi-webshen-tou-ce-shi</guid><dc:creator>halo</dc:creator><pubDate>Fri, 27 Mar 2026 02:27:04 GMT</pubDate></item><item><title><![CDATA[JumpServer 堡垒机使用指南：添加资产、用户、授权一步到位]]></title><link>https://halo.hetao.lol/archives/jumpserver-bao-lei-ji-shi-yong-zhi-nan-tian-jia-zi-chan-yong-hu-shou-quan-yi-bu-dao-wei</link><description><![CDATA[<img src="https://halo.hetao.lol/plugins/feed/assets/telemetry.gif?title=JumpServer%20%E5%A0%A1%E5%9E%92%E6%9C%BA%E4%BD%BF%E7%94%A8%E6%8C%87%E5%8D%97%EF%BC%9A%E6%B7%BB%E5%8A%A0%E8%B5%84%E4%BA%A7%E3%80%81%E7%94%A8%E6%88%B7%E3%80%81%E6%8E%88%E6%9D%83%E4%B8%80%E6%AD%A5%E5%88%B0%E4%BD%8D&amp;url=/archives/jumpserver-bao-lei-ji-shi-yong-zhi-nan-tian-jia-zi-chan-yong-hu-shou-quan-yi-bu-dao-wei" width="1" height="1" alt="" style="opacity:0;">一、JumpServer 堡垒机是什么？可以干什么？ JumpServer 是一款开源、企业级、无插件的堡垒机系统，用于统一管理服务器、网络设备、数据库、云主机等资产。 它的核心作用： 统一入口：所有设备通过堡垒机登录，不再暴露公网 IP。 账号托管：密码由堡垒机保管，不直接交给运维人员。 权限控制]]></description><guid isPermaLink="false">/archives/jumpserver-bao-lei-ji-shi-yong-zhi-nan-tian-jia-zi-chan-yong-hu-shou-quan-yi-bu-dao-wei</guid><dc:creator>halo</dc:creator><pubDate>Thu, 19 Mar 2026 15:18:33 GMT</pubDate></item><item><title><![CDATA[Ubuntu 24.04 深度加固：全磁盘加密 (LUKS) + TPM 2.0 自动解密 + GRUB 锁定实战]]></title><link>https://halo.hetao.lol/archives/shen-du-jia-gu-ubuntu-24.04-ci-pan-quan-jia-mi-yu-tpm-2.0-zi-dong-hua-yin-dao-shi-zhan-vmware-pian</link><description><![CDATA[<img src="https://halo.hetao.lol/plugins/feed/assets/telemetry.gif?title=Ubuntu%2024.04%20%E6%B7%B1%E5%BA%A6%E5%8A%A0%E5%9B%BA%EF%BC%9A%E5%85%A8%E7%A3%81%E7%9B%98%E5%8A%A0%E5%AF%86%20%28LUKS%29%20%2B%20TPM%202.0%20%E8%87%AA%E5%8A%A8%E8%A7%A3%E5%AF%86%20%2B%20GRUB%20%E9%94%81%E5%AE%9A%E5%AE%9E%E6%88%98&amp;url=/archives/shen-du-jia-gu-ubuntu-24.04-ci-pan-quan-jia-mi-yu-tpm-2.0-zi-dong-hua-yin-dao-shi-zhan-vmware-pian" width="1" height="1" alt="" style="opacity:0;">在交付高安全性虚拟机时，我们面临一个矛盾：既要防止甲方通过控制台修改启动参数绕过登录，又要确保业务重启时能够自动进入系统。本文将演示如何利用 TPM 2.0 硬件信任根，在 VMware 环境下实现一套 “无感且强力” 的安全交付方案。 1. 方案设计与威胁模型 防护手段 全磁盘加密 (LUKS)：]]></description><guid isPermaLink="false">/archives/shen-du-jia-gu-ubuntu-24.04-ci-pan-quan-jia-mi-yu-tpm-2.0-zi-dong-hua-yin-dao-shi-zhan-vmware-pian</guid><dc:creator>halo</dc:creator><pubDate>Tue, 10 Mar 2026 09:17:33 GMT</pubDate></item><item><title><![CDATA[web渗透实验3]]></title><link>https://halo.hetao.lol/archives/webshen-tou-nei-wang-heng-xiang-yi-dong</link><description><![CDATA[<img src="https://halo.hetao.lol/plugins/feed/assets/telemetry.gif?title=web%E6%B8%97%E9%80%8F%E5%AE%9E%E9%AA%8C3&amp;url=/archives/webshen-tou-nei-wang-heng-xiang-yi-dong" width="1" height="1" alt="" style="opacity:0;">环境准备]]></description><guid isPermaLink="false">/archives/webshen-tou-nei-wang-heng-xiang-yi-dong</guid><dc:creator>halo</dc:creator><category>web渗透</category><pubDate>Thu, 5 Mar 2026 15:02:44 GMT</pubDate></item><item><title><![CDATA[web靶机渗透实验2]]></title><link>https://halo.hetao.lol/archives/webba-ji-shen-tou-shi-yan-2</link><description><![CDATA[<img src="https://halo.hetao.lol/plugins/feed/assets/telemetry.gif?title=web%E9%9D%B6%E6%9C%BA%E6%B8%97%E9%80%8F%E5%AE%9E%E9%AA%8C2&amp;url=/archives/webba-ji-shen-tou-shi-yan-2" width="1" height="1" alt="" style="opacity:0;">]]></description><guid isPermaLink="false">/archives/webba-ji-shen-tou-shi-yan-2</guid><dc:creator>halo</dc:creator><category>web渗透</category><pubDate>Tue, 3 Mar 2026 13:19:30 GMT</pubDate></item><item><title><![CDATA[Ubuntu 系统一键部署 Docker + Docker Compose 完整教程]]></title><link>https://halo.hetao.lol/archives/ubuntu-xi-tong-yi-jian-bu-shu-docker-docker-compose-wan-zheng-jiao-cheng</link><description><![CDATA[<img src="https://halo.hetao.lol/plugins/feed/assets/telemetry.gif?title=Ubuntu%20%E7%B3%BB%E7%BB%9F%E4%B8%80%E9%94%AE%E9%83%A8%E7%BD%B2%20Docker%20%2B%20Docker%20Compose%20%E5%AE%8C%E6%95%B4%E6%95%99%E7%A8%8B&amp;url=/archives/ubuntu-xi-tong-yi-jian-bu-shu-docker-docker-compose-wan-zheng-jiao-cheng" width="1" height="1" alt="" style="opacity:0;">]]></description><guid isPermaLink="false">/archives/ubuntu-xi-tong-yi-jian-bu-shu-docker-docker-compose-wan-zheng-jiao-cheng</guid><dc:creator>halo</dc:creator><category>web渗透</category><pubDate>Sun, 1 Mar 2026 12:55:41 GMT</pubDate></item></channel></rss>