亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? smtp.rules

?? This is the snapshot of Snot Latest Rules
?? RULES
?? 第 1 頁 / 共 3 頁
字號:
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP Content-Type overflow attempt"; flow:to_server,established; content:"Content-Type|3A|"; nocase; pcre:"/Content-Type\x3A[^\r\n]{300,}/i"; metadata:service smtp; reference:bugtraq,7419; reference:cve,2003-0113; reference:url,www.microsoft.com/technet/security/bulletin/MS03-015.mspx; classtype:attempted-admin; sid:3461; rev:3;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 465 (msg:"SMTP PCT Client_Hello overflow attempt"; flow:to_server,established; flowbits:isnotset,sslv2.server_hello.request; flowbits:isnotset,sslv3.server_hello.request; flowbits:isnotset,tlsv1.server_hello.request; content:"|01|"; depth:1; offset:2; byte_test:2,>,0,5; byte_test:2,!,0,7; byte_test:2,!,16,7; byte_test:2,>,20,9; content:"|8F|"; depth:1; offset:11; byte_test:2,>,32768,0,relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; reference:bugtraq,10116; reference:cve,2003-0719; reference:url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx; classtype:attempted-admin; sid:3511; rev:16;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP SEND overflow attempt"; flow:established,to_server; content:"SEND"; nocase; isdataat:246,relative; pcre:"/^\s*SEND\s+[^\n]{246}/smi"; metadata:service smtp; reference:bugtraq,11238; reference:cve,2004-1546; classtype:attempted-user; sid:3655; rev:4;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP SAML overflow attempt"; flow:established,to_server; content:"SAML"; nocase; isdataat:246,relative; pcre:"/^\s*SAML\s+[^\n]{246}/smi"; metadata:service smtp; reference:bugtraq,11238; reference:cve,2004-1546; classtype:attempted-user; sid:3653; rev:4;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP MAIL overflow attempt"; flow:established,to_server; content:"MAIL"; nocase; isdataat:246,relative; pcre:"/^\s*MAIL\s+[^\n]{246}/smi"; metadata:service smtp; reference:bugtraq,11238; reference:cve,2004-1546; classtype:attempted-user; sid:3656; rev:4;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP SOML overflow attempt"; flow:established,to_server; content:"SOML"; nocase; isdataat:246,relative; pcre:"/^\s*SOML\s+[^\n]{246}/smi"; metadata:service smtp; reference:bugtraq,11238; reference:cve,2004-1546; classtype:attempted-user; sid:3654; rev:4;)# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP spoofed MIME-Type auto-execution attempt"; flow:to_server,established; content:"Content-Type|3A|"; nocase; content:"audio/"; nocase; pcre:"/Content-Type\x3A\s+audio\/(x-wav|mpeg|x-midi).*filename=[\x22\x27]?.{1,221}\.(vbs|exe|scr|pif|bat)/smi"; metadata:service smtp; reference:bugtraq,2524; reference:cve,2001-0154; reference:url,www.microsoft.com/technet/security/bulletin/MS01-020.mspx; classtype:attempted-admin; sid:3682; rev:5;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP AUTH user overflow attempt"; flow:to_server,established; content:"AUTH"; nocase; isdataat:128,relative; pcre:"/^AUTH\s+\S+\s+[^\n]{128}/mi"; metadata:service smtp; reference:bugtraq,13772; reference:cve,2005-1781; reference:cve,2005-2223; classtype:attempted-admin; sid:3824; rev:4;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP eXchange POP3 mail server overflow attempt"; flow:to_server,established; content:"MAIL"; nocase; pcre:"/^\s*MAIL\s+[^\s\n][^\n]{1006,}/smi"; metadata:service smtp; reference:bugtraq,10180; reference:cve,2004-1945; classtype:misc-attack; sid:3815; rev:5;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP STARTTLS attempt"; flow:to_server,established; content:"STARTTLS"; pcre:"/^STARTTLS/smi"; flowbits:set,starttls.attempt; flowbits:noalert; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; classtype:protocol-command-decode; sid:2527; rev:8;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP SSLv3 Client_Hello request"; flow:to_server,established; flowbits:isnotset,sslv2.client_hello.request; flowbits:isnotset,sslv3.client_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|16 03 00|"; depth:3; content:"|01|"; depth:1; offset:5; flowbits:set,sslv3.client_hello.request; flowbits:noalert; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; classtype:protocol-command-decode; sid:5690; rev:4;)alert tcp $SMTP_SERVERS 25 -> $EXTERNAL_NET any (msg:"SMTP SSLv2 Server_Hello request"; flow:from_server,established; flowbits:isset,sslv2.client_hello.request; content:"|04|"; depth:1; offset:2; content:"|00 02|"; depth:2; offset:5; flowbits:set,sslv2.server_hello.request; flowbits:noalert; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; classtype:protocol-command-decode; sid:5691; rev:4;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP SSLv2 Client_Hello request"; flow:to_server,established; flowbits:isnotset,sslv2.client_hello.request; flowbits:isnotset,sslv3.client_hello.request; flowbits:isnotset,tlsv1.client_hello.request; byte_test:1,>,127,0; content:"|01|"; depth:1; offset:2; content:"|00 02|"; depth:2; offset:5; flowbits:set,sslv2.client_hello.request; flowbits:noalert; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; classtype:protocol-command-decode; sid:5687; rev:4;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP SSLv2 Client_Hello with pad request"; flow:to_server,established; flowbits:isnotset,sslv2.client_hello.request; flowbits:isnotset,sslv3.client_hello.request; flowbits:isnotset,tlsv1.client_hello.request; byte_test:1,<,128,0; content:"|01|"; depth:1; offset:3; content:"|00 02|"; depth:2; offset:6; flowbits:set,sslv2.client_hello.request; flowbits:noalert; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; classtype:protocol-command-decode; sid:5688; rev:4;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP TLSv1 Client_Hello request"; flow:to_server,established; flowbits:isnotset,sslv2.client_hello.request; flowbits:isnotset,sslv3.client_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|16 03 01|"; depth:3; content:"|01|"; depth:1; offset:5; flowbits:set,tlsv1.client_hello.request; flowbits:noalert; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; classtype:protocol-command-decode; sid:5689; rev:4;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP TLSv1 Client_Hello via SSLv2 handshake request"; flow:to_server,established; flowbits:isnotset,sslv2.client_hello.request; flowbits:isnotset,sslv3.client_hello.request; flowbits:isnotset,tlsv1.client_hello.request; byte_test:1,>,127,0; content:"|01|"; depth:1; offset:2; content:"|03 01|"; depth:2; offset:3; flowbits:set,tlsv1.client_hello.request; flowbits:noalert; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; classtype:protocol-command-decode; sid:5685; rev:4;)alert tcp $SMTP_SERVERS 25 -> $EXTERNAL_NET any (msg:"SMTP TLSv1 Server_Hello request"; flow:to_client,established; flowbits:isset,tlsv1.client_hello.request; content:"|16 03 01|"; depth:3; content:"|02|"; depth:1; offset:5; flowbits:set,tlsv1.server_hello.request; flowbits:noalert; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; classtype:protocol-command-decode; sid:5686; rev:4;)alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP x-unix-mode executable mail attachment"; flow:established,to_server; content:"x-unix-mode"; nocase; pcre:"/x-unix-mode\s*\x3D\s*(?(?=\d{4})[0-7]([1357][0-7]{2}|[0-7][1357][0-7]|[0-7]{2}[1357])|([1357][0-7]{2}|[0-7][1357][0-7]|[0-7]{2}[1357]))/smi"; metadata:service smtp; reference:bugtraq,16736; reference:cve,2006-0848; reference:url,www.heise.de/english/newsticker/news/69919; reference:url,www.kb.cert.org/vuls/id/999708; classtype:attempted-user; sid:5714; rev:3;)alert tcp $HOME_NET 25 -> $EXTERNAL_NET any (msg:"SMTP headers too long server response"; flow:to_client,established; content:"552"; content:"Headers"; distance:0; nocase; pcre:"/^552[A-Z0-9\s\x5F\x2D\x2E\x28\x29\x22\x27]+Headers\s+too\s+large/smi"; metadata:service smtp; reference:bugtraq,17192; reference:cve,2006-0058; classtype:bad-unknown; sid:5739; rev:2;)# alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP Windows Address Book attachment detected"; flow:to_server,established; content:"|9C CB CB 8D 13|u|D2 11 91|X|00 C0|OyV|A4|"; metadata:service smtp; reference:bugtraq,17459; reference:cve,2006-0014; reference:cve,2006-2386; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-016.mspx; reference:url,www.microsoft.com/technet/security/bulletin/ms06-076.mspx; classtype:misc-activity; sid:6412; rev:3;)# alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP Base64 encoded Windows Address Book attachment detected"; flow:to_server,established; content:"Content-Transfer-Encoding"; nocase; content:"base64"; distance:0; nocase; content:"nMvLjRN10hGRWADAT3lWpA"; distance:0; pcre:"/^Content-Transfer-Encoding\s*\x3A\s*base64/smi"; metadata:service smtp; reference:bugtraq,17459; reference:cve,2006-0014; reference:cve,2006-2386; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-016.mspx; reference:url,www.microsoft.com/technet/security/bulletin/ms06-076.mspx; classtype:misc-activity; sid:6413; rev:3;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 465 (msg:"SMTP SSLv3 openssl get shared ciphers overflow attempt"; flow:to_server,established; flowbits:isnotset,sslv3.server_hello.request; flowbits:isnotset,sslv2.client_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|16 03 00|"; depth:3; content:"|01|"; within:1; distance:2; content:"|03 00|"; within:2; distance:3; content:"|00|"; within:1; distance:32; byte_test:2, >, 256, 0, relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; reference:bugtraq,20249; reference:cve,2006-3738; reference:cve,2007-5135; reference:url,www.openssl.org/news/secadv_20060928.txt; classtype:attempted-admin; sid:8434; rev:8;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP SSLv3 openssl get shared ciphers overflow attempt"; flow:to_server,established; flowbits:isnotset,sslv3.server_hello.request; flowbits:isnotset,sslv2.client_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|16 03 00|"; depth:3; content:"|01|"; within:1; distance:2; content:"|03 00|"; within:2; distance:3; content:"|00|"; within:1; distance:32; byte_test:2, >, 256, 0, relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; reference:bugtraq,20249; reference:cve,2006-3738; reference:cve,2007-5135; reference:url,www.openssl.org/news/secadv_20060928.txt; classtype:attempted-admin; sid:8435; rev:8;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 465 (msg:"SMTP SSLv2 openssl get shared ciphers overflow attempt"; flow:to_server,established; flowbits:isnotset,sslv2.server_hello.request; flowbits:isnotset,sslv3.client_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|01 00 02|"; depth:3; offset:2; byte_test:2, >, 256, 0, relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; reference:bugtraq,20249; reference:cve,2006-3738; reference:cve,2007-5135; reference:url,www.openssl.org/news/secadv_20060928.txt; classtype:attempted-admin; sid:8432; rev:7;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP SSLv2 openssl get shared ciphers overflow attempt"; flow:to_server,established; flowbits:isnotset,sslv2.server_hello.request; flowbits:isnotset,sslv3.client_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|01 00 02|"; depth:3; offset:2; byte_test:2, >, 256, 0, relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; reference:bugtraq,20249; reference:cve,2006-3738; reference:cve,2007-5135; reference:url,www.openssl.org/news/secadv_20060928.txt; classtype:attempted-admin; sid:8433; rev:7;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP SSLv2 openssl get shared ciphers overflow attempt"; flow:to_server,established; flowbits:isnotset,sslv3.server_hello.request; flowbits:isnotset,sslv2.client_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|01 03|"; depth:2; offset:2; byte_test:2, >, 256, 1, relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; reference:bugtraq,20249; reference:cve,2006-3738; reference:cve,2007-5135; reference:url,www.openssl.org/news/secadv_20060928.txt; classtype:attempted-admin; sid:8437; rev:7;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 465 (msg:"SMTP SSLv2 openssl get shared ciphers overflow attempt"; flow:to_server,established; flowbits:isnotset,sslv3.server_hello.request; flowbits:isnotset,sslv2.client_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|01 03|"; depth:2; offset:2; byte_test:2, >, 256, 1, relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; reference:bugtraq,20249; reference:cve,2006-3738; reference:cve,2007-5135; reference:url,www.openssl.org/news/secadv_20060928.txt; classtype:attempted-admin; sid:8436; rev:7;)# alert tcp $HOME_NET 25 -> $EXTERNAL_NET any (msg:"SMTP YPOPS Banner"; flow:established,to_client; content:"220 YahooPOPs!"; flowbits:set,ypops.banner; flowbits:noalert; metadata:service smtp; classtype:not-suspicious; sid:8704; rev:2;)# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP YPOPS buffer overflow attempt"; flow:established,to_server; flowbits:isset,ypops.banner; flowbits:unset,ypops.banner; pcre:"/[^\x0d\x00\x0a]{509}/"; metadata:service smtp; reference:bugtraq,11256; reference:cve,2004-1558; classtype:attempted-admin; sid:8705; rev:4;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP Microsoft Outlook VEVENT overflow attempt"; flow:to_server,established; content:"VEVENT"; nocase; content:"DTSTART|3B|TZID"; nocase; pcre:"/DTSTART\x3BTZID(?![=\x22])/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; reference:bugtraq,21931; reference:cve,2007-0033; reference:url,www.microsoft.com/technet/security/Bulletin/MS07-003.mspx; classtype:attempted-user; sid:9841; rev:6;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP Microsoft Outlook VEVENT non-TZID overflow attempt"; flow:to_server,established; content:"DTSTART|3B|"; nocase; content:!"value"; within:5; nocase; content:!"TZID"; within:4; nocase; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service smtp; reference:bugtraq,21931; reference:cve,2007-0033; reference:url,www.microsoft.com/technet/security/Bulletin/MS07-003.mspx; classtype:attempted-user; sid:10012; rev:4;)alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP ClamAV mime parsing directory traversal"; flow:to_server,established; content:"Message/Partial"; nocase; pcre:"/Content-Type\s*\x3a\s*Message\x2fPartial/smi"; pcre:"/id\s*=\s*[\x22\x27]?[^\x22\x27\n]*..[\x2f\x5c]/smi"; metadata:service smtp; reference:bugtraq,22581; reference:cve,2007-0898; reference:url,labs.idefense.com/intelligence/vulnerabilities/display.php?id=476; classtype:attempted-user; sid:10186; rev:2;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP Exchange MODPROPS denial of service attempt"; flow:to_server,established; content:"content-classescalendarmessage"; nocase; pcre:"/^X-MICROSOFT-CDO-MODPROPS\x3A[^\n]*(?P<prop>\w+),[^\n]*(?=prop)/mi"; metadata:service smtp; reference:bugtraq,23808; reference:cve,2007-0039; reference:url,www.microsoft.com/technet/security/Bulletin/MS07-026.mspx; classtype:attempted-dos; sid:11222; rev:3;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP possible BDAT DoS attempt"; flow:to_server,established; content:"BDAT"; nocase; pcre:"/^BDAT/smi"; byte_jump:2,1,relative,string,dec; content:!"|0D 0A|"; within:2; metadata:service smtp; reference:bugtraq,4204; reference:cve,2002-0055; reference:url,www.microsoft.com/technet/security/bulletin/ms02-012.mspx; classtype:denial-of-service; sid:10995; rev:3;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP Microsoft CDO long header name"; flow:to_server,established; content:"|0D 0A|DATA|0D 0A|"; pcre:"/\r\n\w{200,}\x3a.*\r\n/"; reference:bugtraq,15067; reference:cve,2005-1987; reference:url,www.microsoft.com/technet/security/bulletin/ms05-048.mspx; classtype:attempted-admin; sid:12423; rev:1;)alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP MS Windows Mail UNC navigation remote command execution"; flow:established, to_server; content:"Content-Type|3A| text/html"; nocase; pcre:"/.*<[^>]*href[^>]*(file\x3A|[cC]\x3A|\\\\).*>/"; reference:cve,2007-1658; reference:url,www.microsoft.com/technet/security/bulletin/MS07-034.mspx; classtype:attempted-user; sid:11837; rev:2;)alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP ClamAV recipient command injection attempt"; flow:to_server,established; content:"RCPT TO|3A|"; nocase; pcre:"/^RCPT TO\x3a[^\n]+[\x26\x3B\x7C]+/smi"; reference:bugtraq,25439; reference:cve,2007-4560; classtype:attempted-admin; sid:12592; rev:3;)alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP Lotus Notes MIF viewer statement data overflow"; flow:to_server, established; content:"MIFFile"; nocase; pcre:"/\x3C[^\s]+\s[^\x3c\x3E]{80}/si"; reference:bugtraq,26175; reference:cve,2007-5909; reference:cve,2007-5910; classtype:attempted-user; sid:12706; rev:2;)alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP Lotus Notes MIF viewer MIFFILE comment overflow"; flow:to_server, established; content:"<MIFFile"; nocase; content:"|23|"; isdataat:76,relative; content:!"|0A|"; within:76; reference:bugtraq,26175; reference:cve,2007-5909; reference:cve,2007-5910; classtype:attempted-user; sid:12704; rev:2;)alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP Lotus Notes MIF viewer statement overflow"; flow:to_server, established; content:"MIFFile"; nocase; pcre:"/\x3D[^\s\n]{88}/si"; reference:bugtraq,26175; reference:cve,2007-5909; reference:cve,2007-5910; classtype:attempted-user; sid:12705; rev:2;)alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP Lotus 123 file attachment"; flow:to_server,established; content:"Content-Disposition|3A|"; content:".123"; pcre:"/filename\s*=[^\n]*\.123/si"; metadata:policy security-ips drop, service smtp; reference:bugtraq,26200; reference:cve,2007-4222; reference:url,www-1.ibm.com/support/docview.wss?uid=swg21285600; reference:url,www.coresecurity.com/index.php5?action=item&id=2008; classtype:suspicious-filename-detect; sid:12807; rev:1;)# alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP Novell GroupWise client IMG SRC buffer overflow"; flow:to_server,established; content:"<IMG"; nocase; pcre:"/<img\s*src\s*\x3D[^>]{244}/i"; metadata:policy security-ips drop, service smtp; reference:bugtraq,26875; reference:cve,2007-6435; classtype:attempted-user; sid:13364; rev:2;)# alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP MailEnable SMTP HELO command denial of service attempt"; flow:to_server,established; content:"HELO "; pcre:"/^HELO\x20(\x00|.\x00)/smi"; metadata:policy security-ips drop, service smtp; reference:bugtraq,18630; classtype:attempted-dos; sid:13923; rev:1;)

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲欧洲日韩女同| 亚洲主播在线观看| 在线精品视频一区二区三四| 久久爱www久久做| 亚洲综合丝袜美腿| 国产欧美日韩精品一区| 欧美一级欧美三级在线观看| 91免费在线视频观看| 国产一区二区精品久久91| 亚洲一区av在线| 国产精品丝袜91| 日韩美女在线视频| 在线亚洲免费视频| 不卡的av网站| 欧美高清视频在线高清观看mv色露露十八 | 激情五月婷婷综合| 一级特黄大欧美久久久| 国产欧美一区二区精品秋霞影院| 欧美日韩一区成人| 91色婷婷久久久久合中文| 国产一区二区三区四区五区美女 | 91免费精品国自产拍在线不卡| 久久精品国产99| 天天色综合成人网| 亚洲综合成人网| 中文字幕一区二区三区乱码在线| 久久综合一区二区| 日韩三级.com| 精品污污网站免费看| 色综合久久综合网97色综合| 成人国产精品视频| 欧美日韩国产高清一区二区三区| 成人三级伦理片| 国产综合色产在线精品| 蜜臀av一区二区三区| 婷婷综合久久一区二区三区| 亚洲制服欧美中文字幕中文字幕| 中文字幕亚洲欧美在线不卡| 国产亚洲精久久久久久| 精品久久久久久久久久久久包黑料| 欧美精品三级在线观看| 欧美图区在线视频| 欧美亚洲一区二区在线| 日本韩国一区二区| 欧美伊人久久大香线蕉综合69| 91蝌蚪porny九色| 91丨porny丨国产入口| 99久久精品国产毛片| av电影一区二区| 91日韩一区二区三区| 91免费看`日韩一区二区| 91麻豆6部合集magnet| 91丨国产丨九色丨pron| 91麻豆.com| 欧美日韩一区在线观看| 欧美肥大bbwbbw高潮| 91精品国产一区二区三区| 日韩欧美亚洲一区二区| 久久久久久99久久久精品网站| 中日韩免费视频中文字幕| 中文字幕中文乱码欧美一区二区| 亚洲精选视频在线| 日韩av中文在线观看| 精品亚洲免费视频| 国产成人精品免费| 色吧成人激情小说| 日韩一级黄色大片| 日本一区二区在线不卡| 曰韩精品一区二区| 久久精品72免费观看| 成人亚洲精品久久久久软件| 91成人在线免费观看| 日韩小视频在线观看专区| 国产欧美一区在线| 亚洲一区二区三区四区的| 免费观看30秒视频久久| 国产成人在线视频播放| 欧美亚洲综合另类| 精品久久久久一区| 日韩伦理免费电影| 免费观看30秒视频久久| 99久久国产综合精品女不卡| 欧美群妇大交群的观看方式| 国产午夜精品理论片a级大结局| 亚洲免费观看高清| 美国av一区二区| av高清久久久| 欧美va亚洲va| 亚洲精选视频免费看| 国产一区高清在线| 在线亚洲高清视频| 久久精品无码一区二区三区| 亚洲一区av在线| 成人在线视频一区二区| 欧美一区二区三级| 国产精品成人在线观看| 久草这里只有精品视频| 日本久久电影网| 久久精品男人的天堂| 婷婷久久综合九色国产成人 | 色婷婷av一区二区三区gif| 精品国产一区二区三区久久影院| 亚洲精品成人天堂一二三| 国产传媒一区在线| 91精品国产91久久久久久一区二区| 中文字幕一区二区三区在线观看| 久久精品国产秦先生| 欧美最猛性xxxxx直播| 国产精品进线69影院| 国内精品久久久久影院色 | 中文字幕一区二区三区不卡 | 国产偷v国产偷v亚洲高清| 一区二区三区视频在线看| 国产精品911| 7777精品久久久大香线蕉| 国产精品伦一区| 国产麻豆成人传媒免费观看| 欧美久久一区二区| 夜夜嗨av一区二区三区| 成人av免费在线| 国产欧美一区二区三区在线看蜜臀 | 成人美女视频在线观看18| 精品国产成人系列| 美国毛片一区二区三区| 69堂国产成人免费视频| 亚洲影视资源网| 一本一道久久a久久精品| 国产精品无码永久免费888| 国产成人免费在线观看不卡| 久久久久久一级片| 国产真实乱对白精彩久久| 日韩女优av电影| 蜜桃精品视频在线观看| 欧美精品色一区二区三区| 亚洲va韩国va欧美va精品| 欧美综合久久久| 亚洲电影激情视频网站| 欧美激情一区在线| 国产一区福利在线| 久久精品综合网| 国产999精品久久久久久绿帽| 久久精品欧美一区二区三区麻豆| 国产精品一区三区| 国产婷婷色一区二区三区| 国产不卡一区视频| 中文字幕欧美激情一区| 99re成人在线| 亚洲精品国产成人久久av盗摄| 欧美制服丝袜第一页| 亚洲va欧美va国产va天堂影院| 欧美日韩一二区| 蜜桃视频在线观看一区| 久久综合久久鬼色中文字| 国产福利91精品一区二区三区| 日本一区二区视频在线| 97久久超碰国产精品| 一区二区三区四区av| 欧美美女视频在线观看| 麻豆久久一区二区| 国产亚洲精品资源在线26u| www.一区二区| 亚洲一区二区高清| 欧美一级一区二区| 国产黄色精品视频| 亚洲欧洲www| 欧美精品日韩一本| 国产一区二区美女诱惑| 亚洲欧美在线aaa| 欧美乱妇15p| 成人久久18免费网站麻豆| 91精品啪在线观看国产60岁| 蜜臀久久99精品久久久久宅男 | 国产精品久久久久9999吃药| 色诱视频网站一区| 蜜桃视频第一区免费观看| 久久伊99综合婷婷久久伊| 91色视频在线| 免费黄网站欧美| 中文字幕亚洲欧美在线不卡| 7777精品伊人久久久大香线蕉最新版 | 欧美成人精品福利| 99久久精品久久久久久清纯| 视频一区视频二区中文字幕| 国产日韩欧美精品综合| 欧日韩精品视频| 激情久久五月天| 亚洲一区在线观看免费观看电影高清| 亚洲精品一区二区三区影院| 91福利区一区二区三区| 国产乱码精品一区二区三区五月婷| 亚洲狠狠丁香婷婷综合久久久| 欧美精品一区二区三区蜜桃| 欧洲生活片亚洲生活在线观看| 国产一区视频在线看| 亚洲国产精品久久久男人的天堂| 久久久精品综合| 555www色欧美视频| 99久久精品国产毛片| 国产美女精品人人做人人爽| 亚洲不卡一区二区三区|