0x02 主動信息收集

查看端口掃描模塊

search portscan

Matching Modules
================

   Name                                              Disclosure Date  Rank    Description
   ----                                              ---------------  ----    -----------
   auxiliary/scanner/http/wordpress_pingback_access                   normal  Wordpress Pingback Locator
   auxiliary/scanner/natpmp/natpmp_portscan                           normal  NAT-PMP External Port Scanner
   auxiliary/scanner/portscan/ack                                     normal  TCP ACK Firewall Scanner
   auxiliary/scanner/portscan/ftpbounce                               normal  FTP Bounce Port Scanner
   auxiliary/scanner/portscan/syn                                     normal  TCP SYN Port Scanner
   auxiliary/scanner/portscan/tcp                                     normal  TCP Port Scanner
   auxiliary/scanner/portscan/xmas                                    normal  TCP "XMas" Port Scanner
   auxiliary/scanner/sap/sap_router_portscanner                       normal  SAPRouter Port Scanner

tcp端口掃描

use auxiliary/scanner/portscan/tcp                             
msf > use auxiliary/scanner/portscan/tcp
msf auxiliary(scanner/portscan/tcp) > show options 

Module options (auxiliary/scanner/portscan/tcp):

   Name         Current Setting  Required  Description
   ----         ---------------  --------  -----------
   CONCURRENCY  10               yes       The number of concurrent ports to check per host
   DELAY        0                yes       The delay between connections, per thread, in milliseconds
   JITTER       0                yes       The delay jitter factor (maximum value by which to +/- DELAY) in milliseconds.
   PORTS        1-10000          yes       Ports to scan (e.g. 22-25,80,110-900)
   RHOSTS                        yes       The target address range or CIDR identifier
   THREADS      1                yes       The number of concurrent threads
   TIMEOUT      1000             yes       The socket connect timeout in milliseconds

msf auxiliary(scanner/portscan/tcp) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/portscan/tcp) > set threads 100
threads => 100
msf auxiliary(scanner/portscan/tcp) > run

tcp協(xié)議同步SYN掃描

msf > use auxiliary/scanner/portscan/syn 
msf auxiliary(scanner/portscan/syn) > show options 

Module options (auxiliary/scanner/portscan/syn):

   Name       Current Setting  Required  Description
   ----       ---------------  --------  -----------
   BATCHSIZE  256              yes       The number of hosts to scan per set
   DELAY      0                yes       The delay between connections, per thread, in milliseconds
   INTERFACE                   no        The name of the interface
   JITTER     0                yes       The delay jitter factor (maximum value by which to +/- DELAY) in milliseconds.
   PORTS      1-10000          yes       Ports to scan (e.g. 22-25,80,110-900)
   RHOSTS                      yes       The target address range or CIDR identifier
   SNAPLEN    65535            yes       The number of bytes to capture
   THREADS    1                yes       The number of concurrent threads
   TIMEOUT    500              yes       The reply read timeout in milliseconds

msf auxiliary(scanner/portscan/syn) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/portscan/syn) > set threads 10
threads => 10
msf auxiliary(scanner/portscan/syn) > run

nmap掃描

arp sweep

msf > use auxiliary/scanner/discovery/arp_sweep 
msf auxiliary(scanner/discovery/arp_sweep) > show options 

Module options (auxiliary/scanner/discovery/arp_sweep):

   Name       Current Setting  Required  Description
   ----       ---------------  --------  -----------
   INTERFACE                   no        The name of the interface
   RHOSTS                      yes       The target address range or CIDR identifier
   SHOST                       no        Source IP Address
   SMAC                        no        Source MAC Address
   THREADS    1                yes       The number of concurrent threads
   TIMEOUT    5                yes       The number of seconds to wait for new data

msf auxiliary(scanner/discovery/arp_sweep) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/discovery/arp_sweep) > set threads 100
threads => 100
msf auxiliary(scanner/discovery/arp_sweep) > run

udp sweeper

msf > use auxiliary/scanner/discovery/udp_sweep 
msf auxiliary(scanner/discovery/udp_sweep) > show options 

Module options (auxiliary/scanner/discovery/udp_sweep):

   Name       Current Setting  Required  Description
   ----       ---------------  --------  -----------
   BATCHSIZE  256              yes       The number of hosts to probe in each set
   RHOSTS                      yes       The target address range or CIDR identifier
   THREADS    10               yes       The number of concurrent threads

msf auxiliary(scanner/discovery/udp_sweep) > set threads 100
threads => 100
msf auxiliary(scanner/discovery/udp_sweep) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/discovery/udp_sweep) > run

smb共享目錄枚舉

msf > use auxiliary/scanner/smb/smb_enumshares 
msf auxiliary(scanner/smb/smb_enumshares) > show options 

Module options (auxiliary/scanner/smb/smb_enumshares):

   Name            Current Setting  Required  Description
   ----            ---------------  --------  -----------
   LogSpider       3                no        0 = disabled, 1 = CSV, 2 = table (txt), 3 = one liner (txt) (Accepted: 0, 1, 2, 3)
   MaxDepth        999              yes       Max number of subdirectories to spider
   RHOSTS                           yes       The target address range or CIDR identifier
   SMBDomain       .                no        The Windows domain to use for authentication
   SMBPass                          no        The password for the specified username
   SMBUser                          no        The username to authenticate as
   ShowFiles       false            yes       Show detailed information when spidering
   SpiderProfiles  true             no        Spider only user profiles when share = C$
   SpiderShares    false            no        Spider shares recursively
   THREADS         1                yes       The number of concurrent threads

msf auxiliary(scanner/smb/smb_enumshares) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/smb/smb_enumshares) > set threads 100
threads => 100
msf auxiliary(scanner/smb/smb_enumshares) > run

# 結果
[*] Scanned 101 of 256 hosts (39% complete)
[-] 192.168.10.122:139    - Login Failed: Unable to Negotiate with remote host
[-] 192.168.10.128:139    - Login Failed: Unable to Negotiate with remote host
[*] Scanned 105 of 256 hosts (41% complete)
[*] 192.168.10.122:445    - Windows 2003  (Unknown)
[+] 192.168.10.122:445    - IPC$ - (I) Remote IPC
[+] 192.168.10.122:445    - ADMIN$ - (DS) Remote Admin
[+] 192.168.10.122:445    - C$ - (DS) Default share
[*] Scanned 108 of 256 hosts (42% complete)
[*] Scanned 199 of 256 hosts (77% complete)
[*] Scanned 256 of 256 hosts (100% complete)
[*] Auxiliary module execution completed

smb版本掃描

msf > use auxiliary/scanner/smb/smb_version 
msf auxiliary(scanner/smb/smb_version) > show options 

Module options (auxiliary/scanner/smb/smb_version):

   Name       Current Setting  Required  Description
   ----       ---------------  --------  -----------
   RHOSTS                      yes       The target address range or CIDR identifier
   SMBDomain  .                no        The Windows domain to use for authentication
   SMBPass                     no        The password for the specified username
   SMBUser                     no        The username to authenticate as
   THREADS    1                yes       The number of concurrent threads

msf auxiliary(scanner/smb/smb_version) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/smb/smb_version) > set threads 100
threads => 100
msf auxiliary(scanner/smb/smb_version) > run

# 結果

[*] Scanned 101 of 256 hosts (39% complete)
[*] Scanned 104 of 256 hosts (40% complete)
[+] 192.168.10.122:445    - Host is running Windows 2003 (build:3790) (name:ROOT-TVI862UBEH) (workgroup:WORKGROUP )
[+] 192.168.10.128:445    - Host is running Windows XP SP3 (language:English) (name:DH-CA8822AB9589) (workgroup:WORKGROUP )
[*] Scanned 204 of 256 hosts (79% complete)
[*] 192.168.10.254:445    - Host could not be identified: Unix (Samba 3.0.20-Debian)
[*] Scanned 247 of 256 hosts (96% complete)
[*] Scanned 248 of 256 hosts (96% complete)
[*] Scanned 254 of 256 hosts (99% complete)
[*] Scanned 255 of 256 hosts (99% complete)
[*] Scanned 256 of 256 hosts (100% complete)
[*] Auxiliary module execution completed

smb用戶枚舉

msf > use auxiliary/scanner/smb/smb_enumusers
msf auxiliary(scanner/smb/smb_enumusers) > show options 

Module options (auxiliary/scanner/smb/smb_enumusers):

   Name       Current Setting  Required  Description
   ----       ---------------  --------  -----------
   RHOSTS                      yes       The target address range or CIDR identifier
   SMBDomain  .                no        The Windows domain to use for authentication
   SMBPass                     no        The password for the specified username
   SMBUser                     no        The username to authenticate as
   THREADS    1                yes       The number of concurrent threads

msf auxiliary(scanner/smb/smb_enumusers) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/smb/smb_enumusers) > set threads 100
threads => 100
msf auxiliary(scanner/smb/smb_enumusers) > run

# 結果
[*] Scanned 101 of 256 hosts (39% complete)
[*] Scanned 104 of 256 hosts (40% complete)
[*] Scanned 203 of 256 hosts (79% complete)
[*] Scanned 204 of 256 hosts (79% complete)
[+] 192.168.10.254:139    - METASPLOITABLE [ games, nobody, bind, proxy, syslog, user, www-data, root, news, postgres, bin, mail, distccd, proftpd, dhcp, daemon, sshd, man, lp, mysql, gnats, libuuid, backup, msfadmin, telnetd, sys, klog, postfix, service, list, irc, ftp, tomcat55, sync, uucp ] ( LockoutTries=0 PasswordMin=5 )
[*] Scanned 229 of 256 hosts (89% complete)
[*] Scanned 246 of 256 hosts (96% complete)
[*] Scanned 248 of 256 hosts (96% complete)
[*] Scanned 249 of 256 hosts (97% complete)
[*] Scanned 250 of 256 hosts (97% complete)
[*] Scanned 256 of 256 hosts (100% complete)
[*] Auxiliary module execution completed

smb嘗試登陸

msf > use auxiliary/scanner/smb/smb_login 
msf auxiliary(scanner/smb/smb_login) > show options 

Module options (auxiliary/scanner/smb/smb_login):

   Name               Current Setting  Required  Description
   ----               ---------------  --------  -----------
   ABORT_ON_LOCKOUT   false            yes       Abort the run when an account lockout is detected
   BLANK_PASSWORDS    false            no        Try blank passwords for all users
   BRUTEFORCE_SPEED   5                yes       How fast to bruteforce, from 0 to 5
   DB_ALL_CREDS       false            no        Try each user/password couple stored in the current database
   DB_ALL_PASS        false            no        Add all passwords in the current database to the list
   DB_ALL_USERS       false            no        Add all users in the current database to the list
   DETECT_ANY_AUTH    false            no        Enable detection of systems accepting any authentication
   DETECT_ANY_DOMAIN  false            no        Detect if domain is required for the specified user
   PASS_FILE                           no        File containing passwords, one per line
   PRESERVE_DOMAINS   true             no        Respect a username that contains a domain name.
   Proxies                             no        A proxy chain of format type:host:port[,type:host:port][...]
   RECORD_GUEST       false            no        Record guest-privileged random logins to the database
   RHOSTS                              yes       The target address range or CIDR identifier
   RPORT              445              yes       The SMB service port (TCP)
   SMBDomain          .                no        The Windows domain to use for authentication
   SMBPass                             no        The password for the specified username
   SMBUser                             no        The username to authenticate as
   STOP_ON_SUCCESS    false            yes       Stop guessing when a credential works for a host
   THREADS            1                yes       The number of concurrent threads
   USERPASS_FILE                       no        File containing users and passwords separated by space, one pair per line
   USER_AS_PASS       false            no        Try the username as the password for all users
   USER_FILE                           no        File containing usernames, one per line
   VERBOSE            true             yes       Whether to print output for all attempts

msf auxiliary(scanner/smb/smb_login) > show missing 

Module options (auxiliary/scanner/smb/smb_login):

   Name    Current Setting  Required  Description
   ----    ---------------  --------  -----------
   RHOSTS                   yes       The target address range or CIDR identifier

msf auxiliary(scanner/smb/smb_login) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/smb/smb_login) > set threads 100
threads => 100
msf auxiliary(scanner/smb/smb_login) > run

smb漏洞 ms17-010

msf > use auxiliary/scanner/smb/smb_ms17_010 
msf auxiliary(scanner/smb/smb_ms17_010) > show options 

Module options (auxiliary/scanner/smb/smb_ms17_010):

   Name         Current Setting                                                 Required  Description
   ----         ---------------                                                 --------  -----------
   CHECK_ARCH   true                                                            no        Check for architecture on vulnerable hosts
   CHECK_DOPU   true                                                            no        Check for DOUBLEPULSAR on vulnerable hosts
   CHECK_PIPE   false                                                           no        Check for named pipe on vulnerable hosts
   NAMED_PIPES  /usr/share/metasploit-framework/data/wordlists/named_pipes.txt  yes       List of named pipes to check
   RHOSTS                                                                       yes       The target address range or CIDR identifier
   RPORT        445                                                             yes       The SMB service port (TCP)
   SMBDomain    .                                                               no        The Windows domain to use for authentication
   SMBPass                                                                      no        The password for the specified username
   SMBUser                                                                      no        The username to authenticate as
   THREADS      1                                                               yes       The number of concurrent threads

msf auxiliary(scanner/smb/smb_ms17_010) > show missing 

Module options (auxiliary/scanner/smb/smb_ms17_010):

   Name    Current Setting  Required  Description
   ----    ---------------  --------  -----------
   RHOSTS                   yes       The target address range or CIDR identifier

msf auxiliary(scanner/smb/smb_ms17_010) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/smb/smb_ms17_010) > set threads 100
threads => 100
msf auxiliary(scanner/smb/smb_ms17_010) > run

# 結果

[*] Scanned 101 of 256 hosts (39% complete)
[*] Scanned 104 of 256 hosts (40% complete)
[+] 192.168.10.122:445    - Host is likely VULNERABLE to MS17-010! - Windows Server 2003 3790 x86 (32-bit)
[+] 192.168.10.128:445    - Host is likely VULNERABLE to MS17-010! - Windows 5.1 x86 (32-bit)
[*] Scanned 163 of 256 hosts (63% complete)
[*] Scanned 178 of 256 hosts (69% complete)
[-] 192.168.10.254:445    - Host does NOT appear vulnerable.
[*] Scanned 256 of 256 hosts (100% complete)
[*] Auxiliary module execution completed

ssh版本掃描

msf > use auxiliary/scanner/ssh/ssh_version 
msf auxiliary(scanner/ssh/ssh_version) > show options 

Module options (auxiliary/scanner/ssh/ssh_version):

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   RHOSTS                    yes       The target address range or CIDR identifier
   RPORT    22               yes       The target port (TCP)
   THREADS  1                yes       The number of concurrent threads
   TIMEOUT  30               yes       Timeout for the SSH probe

msf auxiliary(scanner/ssh/ssh_version) > set threads 100
threads => 100
msf auxiliary(scanner/ssh/ssh_version) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/ssh/ssh_version) > run

# 結果
*] Scanned 101 of 256 hosts (39% complete)
[+] 192.168.10.115:22     - SSH server version: SSH-2.0-OpenSSH_7.8p1 Debian-1 ( service.version=7.8p1 openssh.comment=Debian-1 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.cpe23=cpe:/a:openbsd:openssh:7.8p1 os.vendor=Debian os.device=General os.family=Linux os.product=Linux os.cpe23=cpe:/o:debian:debian_linux:- service.protocol=ssh fingerprint_db=ssh.banner )
[+] 192.168.10.123:22     - SSH server version: SSH-2.0-OpenSSH_5.3p1 Debian-3ubuntu7 ( service.version=5.3p1 openssh.comment=Debian-3ubuntu7 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.cpe23=cpe:/a:openbsd:openssh:5.3p1 os.vendor=Ubuntu os.device=General os.family=Linux os.product=Linux os.version=10.04 os.cpe23=cpe:/o:canonical:ubuntu_linux:10.04 service.protocol=ssh fingerprint_db=ssh.banner )
[*] Scanned 102 of 256 hosts (39% complete)
[*] Scanned 156 of 256 hosts (60% complete)
[+] 192.168.10.254:22     - SSH server version: SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1 ( service.version=4.7p1 openssh.comment=Debian-8ubuntu1 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.cpe23=cpe:/a:openbsd:openssh:4.7p1 os.vendor=Ubuntu os.device=General os.family=Linux os.product=Linux os.version=8.04 os.cpe23=cpe:/o:canonical:ubuntu_linux:8.04 service.protocol=ssh fingerprint_db=ssh.banner )
[*] Scanned 256 of 256 hosts (100% complete)
[*] Auxiliary module execution completed

ssh登陸爆破

msf auxiliary(scanner/ssh/ssh_login) > show options 

Module options (auxiliary/scanner/ssh/ssh_login):

   Name              Current Setting  Required  Description
   ----              ---------------  --------  -----------
   BLANK_PASSWORDS   false            no        Try blank passwords for all users
   BRUTEFORCE_SPEED  5                yes       How fast to bruteforce, from 0 to 5
   DB_ALL_CREDS      false            no        Try each user/password couple stored in the current database
   DB_ALL_PASS       false            no        Add all passwords in the current database to the list
   DB_ALL_USERS      false            no        Add all users in the current database to the list
   PASSWORD                           no        A specific password to authenticate with
   PASS_FILE                          no        File containing passwords, one per line
   RHOSTS            192.168.10.0/24  yes       The target address range or CIDR identifier
   RPORT             22               yes       The target port
   STOP_ON_SUCCESS   false            yes       Stop guessing when a credential works for a host
   THREADS           100              yes       The number of concurrent threads
   USERNAME                           no        A specific username to authenticate as
   USERPASS_FILE                      no        File containing users and passwords separated by space, one pair per line
   USER_AS_PASS      false            no        Try the username as the password for all users
   USER_FILE                          no        File containing usernames, one per line
   VERBOSE           false            yes       Whether to print output for all attempts

msf auxiliary(scanner/ssh/ssh_login) > set user_file /root/user_list.txt
user_file => /root/user_list.txt
msf auxiliary(scanner/ssh/ssh_login) > set pass_file /roor/pass_list.txt
pass_file => /roor/pass_list.txt
msf auxiliary(scanner/ssh/ssh_login) > set threads 100
threads => 100
msf auxiliary(scanner/ssh/ssh_login) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/ssh/ssh_login) > run

ftp版本掃描

msf > use auxiliary/scanner/ftp/ftp_version 
msf auxiliary(scanner/ftp/ftp_version) > show options 

Module options (auxiliary/scanner/ftp/ftp_version):

   Name     Current Setting      Required  Description
   ----     ---------------      --------  -----------
   FTPPASS  mozilla@example.com  no        The password for the specified username
   FTPUSER  anonymous            no        The username to authenticate as
   RHOSTS                        yes       The target address range or CIDR identifier
   RPORT    21                   yes       The target port (TCP)
   THREADS  1                    yes       The number of concurrent threads

msf auxiliary(scanner/ftp/ftp_version) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/ftp/ftp_version) > set threads 100
threads => 100
msf auxiliary(scanner/ftp/ftp_version) > run

# 結果
[*] Scanned 101 of 256 hosts (39% complete)
[+] 192.168.10.122:21     - FTP Banner: '220 Microsoft FTP Service\x0d\x0a'
[*] Scanned 105 of 256 hosts (41% complete)
[*] Scanned 135 of 256 hosts (52% complete)
[*] Scanned 140 of 256 hosts (54% complete)
[*] Scanned 184 of 256 hosts (71% complete)
[*] Scanned 255 of 256 hosts (99% complete)
[+] 192.168.10.254:21     - FTP Banner: '220 ProFTPD 1.3.1 Server (Debian) [::ffff:192.168.10.254]\x0d\x0a'
[*] Scanned 256 of 256 hosts (100% complete)
[*] Auxiliary module execution completed

SMTP枚舉

msf > use auxiliary/scanner/smtp/smtp_enum 
msf auxiliary(scanner/smtp/smtp_enum) > show options 

Module options (auxiliary/scanner/smtp/smtp_enum):

   Name       Current Setting                                                Required  Description
   ----       ---------------                                                --------  -----------
   RHOSTS                                                                    yes       The target address range or CIDR identifier
   RPORT      25                                                             yes       The target port (TCP)
   THREADS    1                                                              yes       The number of concurrent threads
   UNIXONLY   true                                                           yes       Skip Microsoft bannered servers when testing unix users
   USER_FILE  /usr/share/metasploit-framework/data/wordlists/unix_users.txt  yes       The file that contains a list of probable users accounts.

msf auxiliary(scanner/smtp/smtp_enum) > set threads 100
threads => 100
msf auxiliary(scanner/smtp/smtp_enum) > set rhosts 192.168.10.0/24
rhosts => 192.168.10.0/24
msf auxiliary(scanner/smtp/smtp_enum) > run

SNMP

# snmp默認賬號登陸
use auxiliary/scanner/snmp/snmp_login
use auxiliary/scanner/snmp/snmp_enum

HTTP ssl證書掃描

use auxiliary/scanner/http/cert
set rhost 192.168.10.0/24
set rport 8383
run

http robots.txt文件內(nèi)容獲取

use auxiliary/scanner/http/robots_txt
set path /mutilidae
set rhost 192.168.10.10
run

http協(xié)議危險方法PUT/DELETE檢查

use auxiliary/scanner/http/http_put
set path /uploads
set rhost 192.168.10.10
set rport 8585
run

web服務jenkins枚舉

set rhost 192.168.10.10
set rport 8585
set targeturi /
run

windows遠程管理認證

use auxiliary/scanner/winrm/winrm_auth_methods
set rhost 192.168.10.10
run

windows遠程管理終端

user auxiliary/scanner/winrm/winrm_cmd
set cmd hostname
set rhosts 192.168.10.10
set username administrarot
set password 桑滩。钢拧。。
run
最后編輯于
?著作權歸作者所有,轉載或內(nèi)容合作請聯(lián)系作者
  • 序言:七十年代末盈咳,一起剝皮案震驚了整個濱河市蘑斧,隨后出現(xiàn)的幾起案子靖秩,更是在濱河造成了極大的恐慌,老刑警劉巖竖瘾,帶你破解...
    沈念sama閱讀 222,104評論 6 515
  • 序言:濱河連續(xù)發(fā)生了三起死亡事件盆偿,死亡現(xiàn)場離奇詭異,居然都是意外死亡准浴,警方通過查閱死者的電腦和手機,發(fā)現(xiàn)死者居然都...
    沈念sama閱讀 94,816評論 3 399
  • 文/潘曉璐 我一進店門捎稚,熙熙樓的掌柜王于貴愁眉苦臉地迎上來乐横,“玉大人,你說我怎么就攤上這事今野∑瞎” “怎么了?”我有些...
    開封第一講書人閱讀 168,697評論 0 360
  • 文/不壞的土叔 我叫張陵条霜,是天一觀的道長催什。 經(jīng)常有香客問我,道長宰睡,這世上最難降的妖魔是什么蒲凶? 我笑而不...
    開封第一講書人閱讀 59,836評論 1 298
  • 正文 為了忘掉前任气筋,我火速辦了婚禮,結果婚禮上旋圆,老公的妹妹穿的比我還像新娘宠默。我一直安慰自己,他們只是感情好灵巧,可當我...
    茶點故事閱讀 68,851評論 6 397
  • 文/花漫 我一把揭開白布搀矫。 她就那樣靜靜地躺著,像睡著了一般刻肄。 火紅的嫁衣襯著肌膚如雪瓤球。 梳的紋絲不亂的頭發(fā)上,一...
    開封第一講書人閱讀 52,441評論 1 310
  • 那天敏弃,我揣著相機與錄音卦羡,去河邊找鬼。 笑死权她,一個胖子當著我的面吹牛虹茶,可吹牛的內(nèi)容都是我干的。 我是一名探鬼主播隅要,決...
    沈念sama閱讀 40,992評論 3 421
  • 文/蒼蘭香墨 我猛地睜開眼蝴罪,長吁一口氣:“原來是場噩夢啊……” “哼!你這毒婦竟也來了步清?” 一聲冷哼從身側響起要门,我...
    開封第一講書人閱讀 39,899評論 0 276
  • 序言:老撾萬榮一對情侶失蹤,失蹤者是張志新(化名)和其女友劉穎廓啊,沒想到半個月后欢搜,有當?shù)厝嗽跇淞掷锇l(fā)現(xiàn)了一具尸體,經(jīng)...
    沈念sama閱讀 46,457評論 1 318
  • 正文 獨居荒郊野嶺守林人離奇死亡谴轮,尸身上長有42處帶血的膿包…… 初始之章·張勛 以下內(nèi)容為張勛視角 年9月15日...
    茶點故事閱讀 38,529評論 3 341
  • 正文 我和宋清朗相戀三年炒瘟,在試婚紗的時候發(fā)現(xiàn)自己被綠了。 大學時的朋友給我發(fā)了我未婚夫和他白月光在一起吃飯的照片第步。...
    茶點故事閱讀 40,664評論 1 352
  • 序言:一個原本活蹦亂跳的男人離奇死亡疮装,死狀恐怖,靈堂內(nèi)的尸體忽然破棺而出粘都,到底是詐尸還是另有隱情廓推,我是刑警寧澤,帶...
    沈念sama閱讀 36,346評論 5 350
  • 正文 年R本政府宣布翩隧,位于F島的核電站樊展,受9級特大地震影響,放射性物質(zhì)發(fā)生泄漏。R本人自食惡果不足惜专缠,卻給世界環(huán)境...
    茶點故事閱讀 42,025評論 3 334
  • 文/蒙蒙 一雷酪、第九天 我趴在偏房一處隱蔽的房頂上張望。 院中可真熱鬧藤肢,春花似錦太闺、人聲如沸。這莊子的主人今日做“春日...
    開封第一講書人閱讀 32,511評論 0 24
  • 文/蒼蘭香墨 我抬頭看了看天上的太陽。三九已至最住,卻和暖如春钞澳,著一層夾襖步出監(jiān)牢的瞬間,已是汗流浹背涨缚。 一陣腳步聲響...
    開封第一講書人閱讀 33,611評論 1 272
  • 我被黑心中介騙來泰國打工轧粟, 沒想到剛下飛機就差點兒被人妖公主榨干…… 1. 我叫王不留,地道東北人脓魏。 一個月前我還...
    沈念sama閱讀 49,081評論 3 377
  • 正文 我出身青樓兰吟,卻偏偏與公主長得像,于是被迫代替她去往敵國和親茂翔。 傳聞我的和親對象是個殘疾皇子混蔼,可洞房花燭夜當晚...
    茶點故事閱讀 45,675評論 2 359