Kuznetsov-2013-MSF-v735-p146(Superplasticity-AlCoCuFeNI-HEA)
- 格式:pdf
- 大小:728.45 KB
- 文档页数:6
msf基本常用命令MSF基本常用命令Metasploit(简称MSF)是一款功能强大的渗透测试工具,被广泛应用于网络安全领域。
它提供了一系列基本常用命令,帮助渗透测试人员进行攻击和防御。
本文将介绍MSF的一些基本常用命令,帮助读者更好地了解和使用这个工具。
1. 扫描命令MSF提供了多种扫描命令,用于探测目标主机的漏洞和服务。
其中,常用的命令包括:- `db_nmap`:使用Nmap扫描目标主机,并将结果保存到数据库中。
- `db_autopwn`:自动利用数据库中保存的漏洞信息对目标主机进行攻击。
- `db_import`:导入第三方工具(如Nessus)的扫描结果到MSF的数据库中。
2. 渗透命令渗透命令是MSF最核心的功能之一,它可以帮助用户利用已知的漏洞攻击目标主机。
常用的渗透命令包括:- `exploit`:根据目标主机的漏洞信息进行攻击。
- `set`:设置攻击载荷的参数,如目标主机、端口等。
- `show options`:查看当前攻击模块的参数配置。
- `run`:执行攻击模块。
3. 模块命令MSF以模块化的方式组织其功能,用户可以通过加载和使用不同的模块来完成特定的任务。
常用的模块命令包括:- `use`:加载指定的模块。
- `search`:搜索与关键词相关的模块。
- `info`:查看模块的详细信息。
- `reload_all`:重新加载所有模块。
4. 数据库命令MSF内置了一个数据库,用于存储扫描结果、漏洞信息等数据。
用户可以通过数据库命令对这些数据进行管理。
常用的数据库命令包括:- `db_connect`:连接到已存在的数据库。
- `db_create`:创建一个新的数据库。
- `db_destroy`:销毁当前的数据库。
- `db_export`:导出数据库中的数据。
5. 辅助命令除了上述的基本命令,MSF还提供了一些辅助命令,用于辅助渗透测试的工作。
常用的辅助命令包括:- `sessions`:查看当前已建立的会话。
全团队。
将安全置于他们手中,让他们对MFA行动承担更大的责任和目的。
保持简单明了最终,将MFA集成到的物联网应该尽可能地简化。
许多组织使用各种物联网设备,因此每天数百次记下代码和密码不利于正常的工作。
为了减轻这一负担,雇主可以要求像谷歌那样认证应用MFA。
面向未来的MFA物联网以多种方式连接世界,因此保护其完整性对于任何组织或用户的成功都至关重要。
黑客可以获得访问权,篡改操作和数据,但凭借物联网中多因素身份认证的识别能力,人们可以对未来物联网设备的安全性更有信心。
■家修勒索软件攻击者如今正在寻找新的方法,通过将老旧漏洞武器化以利用企业网络安全方面的弱点。
将长期存在的勒索软件攻击工具与最新的人工智能和机器学习技术相结合,一些有组织的犯罪团伙和先进的持续性威胁(APT)团伙在创新方面继续领先于企业。
多家漏洞和网络安全分析机构,包括CSW公司、Ivanti 公司、Cyware公司和Securin公司联合发布的一份新报告揭示了勒索软件在2022年为全球企业带来的巨大损失。
目前被勒索软件团伙利用的漏洞中,76%是在2010-2019年期间首次发现的。
勒索软件成为首席信息安全官的首要关注根据一份名为《从威胁和漏洞管理的角度看勒索软件报告》的2023年聚焦报告,2022年在全球发现了56个与勒索软件威胁相关的新漏洞,使漏洞总数达到344个,与2021年的288个漏洞相比增加了19%。
研究还发现,在264个旧漏洞中,有208个漏洞被公开利用。
美国国家漏洞数据库(NVD)列出了160344个漏洞,其中3.3%(5330个)属于最危险的利用类型———远程代码执行(RCE)和特权升级(PE)。
在5330个武器化漏洞中,344个与217个勒索病毒家族和50个高级持续性威胁(APT)团伙有关,因此非常危险。
智能IT管理和安全软件解决方案提供商Ivanti公司首席产品官Srinivas Mukkamala说:“勒索软件是每个企业最关心的问题,无论是私营部门还是公共部门。
大赛工具列表(V1.0版)一、扫描工具D.S.T-Scanhscan1.2-cnIPBook(超级网络邻居)IPC扫描器IPLookL-ScanPort2.0NTScanPortReadySuperScan4superscan3S扫描器GUI 版VNC扫描器X-Scan-v3.3啊D网络工具包V2.02 修正版多线程网站后台扫描工具1.3尖刀超级端口扫描器V2.0可视化+cmd S扫描器ASCScanMS06-040_ScanMS05039ScanWebDAVScan中华经典网络军刀NC二、入侵工具JavaScript变形金刚BBsXp 注入程序Discuz!7.X 0day漏洞利用工具ECShop漏洞利用工具FTBBS6.X 0day漏洞利用程序IPC$ 入侵工具Linux Kernel黑客本地提权MySQL 利用工具MySQL Hackermy动力+雷驰注入利用两用工具O-blog 4全自动利用工具phpcms 注入漏洞利用工具PJblog V3.0黑客漏洞利用工具RAR本地提升权限漏洞利用工具菜鸟零号KingCMS上传利用工具动网8.0sql最新漏洞利用工具l动网回收站暴库漏洞利用程序河马MySQL弱口令利用工具黑客上传漏洞利用程序CommUpFile 1.0黑客上传综合利用工具SuperUpFile 1.0局域网入侵工具科讯0DAY利用工具留言本通用入侵程序网络入侵机网蚁web入侵小助手新云Sql版漏洞利用工具新云漏洞攻击程序PeRL版织梦DEDECMS综合漏洞利用工具PHPX-CodeSQLTOOLIIS写权限漏洞DVBBS 漏洞利用工具GetWebshellOblog 4.X Exp漏洞利用工具Oblog 4.X Exp漏洞利用工具phpwind_5X_ExpGui动易Region.asp注入辅助工具Discuz物理路径暴破器DVBBS上传利用工具PHPCMS3.0上传漏洞利用工具DVBBS 漏洞利用工具FTP类漏洞利用工具TELNET类漏洞利用工具HTTP类漏洞利用工具3389类端口利用工具TFTP工具常用小工具集合(包括众多的DOS下使用的小工具,因为数量太多,不在例举工具名)三、远程控制Super远程控制Gh0st yeshack联盟专版Pcshare暗组dart远程控制大白鲨远程控制2010Beta1凤凰ABC黑防鸽子灰鸽子VIP2007纯本地完美破解第二版凌云远控VIP2.7破解版漫游专版灰鸽子2009上兴2010。
Frequency Converter with Trip ValuesKFD2-UFC-Ex1.D<1-channel isolated barrier<24 V DC supply (Power Rail)<Input for NAMUR sensors or dry contacts<Input frequency 1 mHz ... 5 kHz<Current output 0/4 mA ... 20 mA<Relay contact and transistor output<Start-up override<Line fault detection (LFD)<Up to SIL 2 acc. to IEC 61508/IEC 61511This isolated barrier is used for intrinsic safety applications.The device is a universal frequency converter that changes a digital input signal into a proportional free adjustable 0/4 mA ... 20 mA analog output signal and functions as a switch amplifier and a trip alarm.The functions of the switch outputs (2 relay outputs and 1 potential free transistor output) are easily adjustable [trip value display (min/max alarm), serially switched output, pulse divider output, error signal output].The device is easily configured by the use of keypad or with the PACTware configuration software.A fault is signalized by LEDs acc. to NAMUR NE44 and a separate collective error message output.For additional information, refer to the manual and .Zone 2Div. 23-1+161718101112III20-III13+14-8+7-IV24 V DC23+24-edate:221-11-25Dateofissue:221-11-25Filename:231194_eng.pdfe d a t e : 2021-11-25 D a t e of i s s u e : 2021-11-25 F i l e n a m e : 231194_e ng .p d fe d a t e : 2021-11-25 D a t e of i s s u e : 2021-11-25 F i l e n a m e : 231194_e ng .p d fe d a t e : 2021-11-25 D a t e of i s s u e : 2021-11-25 F i l e n a m e : 231194_e ng .p d fAccessoriese d a t e : 2021-11-25 D a t e of i s s u e : 2021-11-25 F i l e n a m e : 231194_e ng .p d fe d a t e : 2021-11-25 D a t e of i s s u e : 2021-11-25 F i l e n a m e : 231194_e ng .p d fKFD2-UFC-Ex1.DFrequency Converter with Trip Values Maximum Switching Power of Output ContactsResistive load DC Resistive load AC1max. 105 switching cycles0.110.220.330.440.5I (A)。
Hillstone S-SeriesNetwork Intrusion Prevention System (NIPS)S600 / S1060 / S1560 / S1900 / S2100 / S2160 / S2700 / S2660 / S3560 / S3500 /S3860 / S3900 / S5500 /S5560As the threat landscape continues to evolve aggressively, an increasing number of network pro-tection technologies have quickly emerged. Among these various technologies, Intrusion Preven-tion System (IPS) remains one of the most widely deployed solutions, regardless of platform or form factor.Hillstone Network-based IPS (NIPS) appliance operates in-line, and at wire speed, performing deep packet inspection, and assembling inspection of all network traffic. It also applies rules based on several methodologies, including protocol anomaly analysis and signature analysis to block threats. Hillstone NIPS can be deployed in the network to inspect traffic left undetected by perimeter solutions, and is an integral part of network security systems for its high-performance, no compromise, best-of-breed protection capability and broad and flexible deployment scenarios.Product HighlightsUnparalleled Threat Protection without Performance CompromiseThe Hillstone NIPS platform has the most comprehensive high performance inspection engine, combined with the best-of-breed signature partnering with leading technology part-ners, providing customers the highest threat detection rate with the lowest total cost of ownership (TCO). Hillstone IPS engine has 99.6% blocking rate of static exploits and 98.325% blocking rate of live exploits (reported by NSS Labs).The Hillstone NIPS platform provides high throughput, low latency and maximum availability to maintain efficient secu -rity operations without compromising network performance. NIPS combines protocol analysis, threat reputation and other features that deliver threat protection from Layer 2 to Layer 7, including ARP attack, Dos/DDoS attack, abnormal protocols, malicious URLs, malwares and web attacks.Granular Reporting with User Targeted ViewpointsHillstone NIPS provides comprehensive visibility based on protocol, application, user and content. It can identify more than 4,000 applications, including hundreds of mobile and cloud applications.Bringing multiple sources together, the system can identify contextual information to make proper blocking decisions. With a granular and robust reporting function, it offers visibil-ity across different views:• Unique templates, based on whether you are a business system administrator, a security administrator or the CIO or executive.• Organized Threat Content – whether a security, system risk, network threat or traffic view – in order to help you clearly understand the risk and make the right decision.Product Highlights (Continued) FeaturesIntrusion Prevention• 12,700+ signatures, protocol anomaly detection, rate-based detection, custom signatures, manual, automatic push or pull signature updates, integrated threat encyclopedia• IPS Actions: monitor, block, reset (attackers IP or victim IP, incoming interface) with expiry time• Packet logging option• Filter based selection and review: severity, target, OS, application or protocol • IP exemption from specific IPS signatures• IDS sniffer mode• IPv4 and IPv6 rate based DoS protection with threshold settings against TCP Syn flood, TCP/UDP/SCTP port scan, ICMP sweep, TCP/UDP/SCIP/ICMP session flooding (source/destination)• Active bypass with bypass interfaces• Predefined prevention configuration• Support web server protection, including CC attack, external link attack, iframe, cross-site request forgery (CSRF) attack, etc.• Support protection of brute force attack including FTP, MSRPC, POP3, SMTP, SUNRPC and telnet• Support weak password detection for FTP, MSRPC, POP3, SMTP, SUNRPC and telnet• Threat Details support URI and Attack Data Decoding• Support MPLS frame inspectionThreat Correlation Analytics• Correlation among unknown threats, abnormal behavior and application behavior to discover potential threat or attacks• Multi-dimension correlation rules, automatic daily update from the cloud Advanced Threat Detection• Behavior-based advanced malware detection• Detection of more than 2000 known and unknown malware families including Virus, Worm, Trojan, Spyware, Overflow etc• Real-time, online, malware behavior model database updateAbnormal Behavior Detection• Behavior modeling based on L3-L7 baseline traffic to reveal anomalous network behavior, such as HTTP scanning, Spider, SPAM, SSH/FTP weak password, and spyware• Detection of DDoS including Flood, Sockstress, zip of death, reflect, DNS query, SSL DDos and application DDoS• Supports inspection of encrypted tunneling traffic for unknown applications • Real-time, online, abnormal behavior model database updateAntivirus• Manual, automatic push or pull signature updates• Flow-based antivirus: protocols include HTTP/HTTPS, SMTP, POP3, IMAP, FTP/ SFTP, SMB• Compressed file virus scanning Attack Defense• Abnormal protocol attack defense• Anti-DoS/DDoS, including SYN Flood, DNS Query Flood defense• ARP attack defense• IP scanning and port scanningURL Filtering• Flow-based web filtering inspection• Manually defined web filtering based on URL, web content and MIME header• Dynamic web filtering with cloud-based real-time categorization database: over 140 million URLs with 64 categories (8 of which are security related)• Additional web filtering features:- Filter Java Applet, ActiveX or cookie- Block HTTP Post- Log search keywords- Exempt scanning encrypted connections on certain categories for privacy• Web filtering profile override: allows administrator to temporarily assign different profiles to user/group/IP• Web filter local categories and category rating override• Support allow/block list• Customizable alarmAnti-Spam• Real-time spam classification and prevention• Confirmed spam, suspected spam, bulk spam, valid bulk• Protection regardless of the language, format, or content of the message• Support both SMTP and POP3 email protocols• Inbound and outbound detection• Whitelists to allow emails from trusted domain/email addresses• User-defined blacklistsCloud-Sandbox• Upload malicious files to cloud sandbox for analysis• Support protocols including HTTP/HTTPS, POP3, IMAP, SMTP and FTP• Support file types including PE, ZIP, RAR, Office, PDF, APK, JAR and SWF• File transfer direction and file size control• Provide complete behavior analysis report for malicious files• Global threat intelligence sharing, real-time threat blocking• Support detection only mode without uploading filesData Security• Web content filtering and file content filtering• Support file filtering with over 100 file formats• Support network behavior recordingEase of Deployment and Centralized Management Deploying and managing the Hillstone NIPS is simple, with minimum overhead. It can be deployed in the following modes to meet security requirements and ensure optimal network connectivity:• Active protection (intrusion prevention mode), real time monitoring and blocking.• Passive detection (intrusion detection mode), real time monitoring and alert.The Hillstone NIPS can be managed by the Hillstone Security Management Platform (HSM). Administrators can centrally register, monitor, and upgrade NIPS devices deployed in differ-ent branches or locations, with a unified management policy across the network for maximum efficiency.Features (Continued)Botnet C&C Prevention• Discover intranet botnet host by monitoring C&C connections and block further advanced threats such as botnet and ransomware• Regularly update the botnet server addresses• Prevention for C&C IP and domain• Support TCP, HTTP, and DNS traffic detection• IP and domain whitelistsIP Reputation• Identify and filter traffic from risky IPs such as botnet hosts, spammers, Tor nodes, breached hosts, and brute force attacks• Logging, dropping packets, or blocking for different types of risky IP traffic• Regular IP reputation signature database upgradeApplication Control• Over 4,000 applications that can be filtered by name, category, subcategory, technology and risk• Each application contains a description, risk factors, dependencies, typical ports used, and URLs for additional reference• Actions: block, monitor• Provide multi-dimensional monitoring and statistics for applications running in the cloud, including risk category and characteristics• Support encrypted applicationQuality of Service (QoS)• Support encrypted application• Max/guaranteed bandwidth tunnels or IP/user basis• Tunnel allocation based on security domain, interface, address, user/user group, server/server group, application/app group, TOS, VLAN• Bandwidth allocated by time, priority, or equal bandwidth sharing• Type of Service (TOS) and Differentiated Services (DiffServ) support• Prioritized allocation of remaining bandwidth• Maximum concurrent connections per IP• Bandwidth allocation based on URL category• Bandwidth limit by delaying access for user or IPIPv6• Management over IPv6, IPv6 logging and HA• IPv6 tunneling, DNS64/NAT64 etc• IPv6 routing protocols, static routing, policy routing, ISIS, RIPng, OSPFv3 and BGP4+• IPS, Application identification, Antivirus, Access control, ND attack defense VSYS• System resource allocation to each VSYS• CPU virtualization• Non-root VSYS support IPS, URL filtering, Policy, QoS, etc.• VSYS monitoring and statistics• Support backup of all VSYS configurations at onceSSL Proxy• SSL offload: SSL traffic decryption• SSL require/ exempt: SSL traffic allowed or block based on the policy rules without decryptionFlexible Traffic Analysis and Control• Support 3 operation modes: Route/NAT (layer 3) , Transparent (layer 2) with optional bypass interface, and TAP mode (IDS Mode) with Hillstone Firewall Integration• Traffic analysis and control based on policy rules by source/destination zone, source/destination IP address, users, service or applications High Availability• Redundant heartbeat interfaces• AP and peer mode• Standalone session synchronization• HA reserved management interface• Failover:- Port, local & remote link monitoring- Stateful failover- Sub-second failover- Failure notification• Deployment Options:- HA with link aggregation- Full mesh HA- Geographically dispersed HAVisible Administration• Management access: HTTP/HTTPS, SSH, telnet, console• Central Management: Hillstone Security Manager (HSM), web service APIs • Two-factor authentication: username/password, HTTPS certificates file• System Integration: SNMP, syslog, alliance partnerships• Rapid deployment: USB auto-install, local and remote script execution• Dynamic real-time dashboard status and drill-in monitoring widgets• Storage device management: storage space threshold customization and alarm, old data overlay, stop recording.• Language support: EnglishLogs and Reporting• Logging facilities: local storage for up to 6 months, multiple syslog servers and multiple Hillstone Security Audit (HSA) platforms• Encrypted logging and log integrity with HSA scheduled batch log uploading • Reliable logging using TCP option (RFC 3195)• Detailed traffic logs: forwarded, violated sessions, local traffic, invalid packets • Comprehensive event logs: system and administrative activity audits, routing & networking, VPN, user authentications, WiFi related events• Log aggregation: support aggregation of AV and C&C logs• IP and service port name resolution option• Brief traffic log format option• Granular Reporting with User Targeted Viewpoints- HA Management/C-level View- Business System Owner View- Network Security Administrator ViewStatistics and Monitoring• Application, URL, threat events statistic and monitoring• Real-time traffic statistic and analytics• System information such as concurrent session, CPU, Memory and temperature• iQOS traffic statistic and monitoring, link status monitoring• Support traffic information collection and forwarding via Netflow (v9.0)• Cloud-based threat intelligence push service• Geographical distribution of external network attacksCloudView• Cloud-based security monitoring• 24/7 access from web or mobile application• Device status, traffic and threat monitoring• Cloud-based log retention and reporting500 GB (optional)Dimension (W×D×H, mm)16.9 × 11.8 × 1.7 in(430×300×44mm)17.1×12.6×1.7 in(436x 320x 44mm)16.9 x 14.8 x 1.7 in(430x375x44mm)Weight14.3 lb (6.5 kg)14.33 lb (6.5kg)22.0 lb (10 kg)Temperature32-104°F (0-40°C)32-104°F (0-40°C)32-104°F (0-40°C) Relative Humidity5-85% (no dew)10%~95% (no dew)5-85% (no dew)14 GbpsConsumption 1 + 1 1 + 1 1 + 1Dimension (W×D×H, mm)16.9 × 19.7 × 3.5 in(430×500×88mm)16.9 × 19.7 × 3.5 in(430×500×88mm)17.1×21.3×1.7 in(436x542x44mm)Weight35.3 lb (16 kg)35.3 lb (16 kg)32.6 lb (14.8kg)Temperature32-104°F (0-40°C)32-104°F (0-40°C)32-104°F (0-40°C) Relative Humidity5-85% (no dew)5-85% (no dew)10%~95% (no dew)ModuleIOC-S-4GE-B-LIOC-S-4SFP-LIOC-S-4GE-BIOC-S-4SFPIOC-S-8SFPIOC-S-4GE-4SFPI/O Ports 4 x SFP Ports4 × SFP Ports 4 × GE and 4 × SFP Ports Dimension slot)1U (Occupies 1 generic slot)slot)1U (Occupies 1 generic slot)generic slot) 1U (Occupies 1 generic slot)Weight0.22 lb (0.1 kg)0.22 lb (0.1 kg)0.33 lb (0.15 kg)0.33 lb (0.15 kg)0.55 lb (0.25 kg)0.55 lb (0.25 kg)ModuleIOC-S-2SFP+IOC-S-4SFP+IOC-S-4SFP-BIOC-S-2SFP+-BIOC-S-4SFP+-BIOC-S-4GE-B-HIOC-S-4GE-4SFP-HI/O Ports 2 × SFP+ Ports 4 × SFP+ Ports 4 × SFP Bypass Ports 2 × SFP+ Bypass Ports 4 × SFP+ Bypass Ports 4 × GE Bypass Ports 4 × GE and 4 × SFP Ports Dimension 1U (Occupies 1 generic slot)1U (Occupies 1 generic slot)1U (Occupies 1 generic slot) Weight0.44 lb (0.2 kg)0.88 lb (0.4 kg)0.33 lb (0.15 kg)ModuleIOC-S-8GE-B-HIOC-S-8SFP-HIOC-S-4SFP-HIOC-S-2SFP+-HIOC-S-4SFP+-HIOC-S-4SFP-B-HIOC-S-2SFP+-B-HI/O Ports 8 × GE Bypass Ports 8 × SFP Ports 4 × SFP Ports 2 × SFP+ Ports 4 × SFP+ Ports 4 × SFP Bypass Ports 2 × SFP+ Bypass Ports Dimension 1U (Occupies 1 generic slot)1U (Occupies 1 generic slot)1U (Occupies 1 generic slot) Weight0.55 lb (0.25 kg)0.33 lb (0.15 kg)0.88 lb (0.4 kg)Module OptionsNOTES:(1) IPS throughput data is obtained under HTTP traffic with all IPS rules being turned on;(2) Maximum concurrent connections are obtained under TCP traffic; and it can be upgraded with Additional Enhanced License (AEL);(3) New sessions are obtained under TCP traffic.Unless specified otherwise, all performance, capacity and functionality are based on StoneOS5.5R5. Results may vary based on StoneOS ® version and deployment.ModuleIOC-S-4SFP+-AIOC-S-2MM-BE-AIOC-S-2SM-BE-AIOC-S-2QSFP+-AI/O Ports 4 × SFP , MM bypass (2 pairs of bypass ports) 2 × QSFP+Dimension 1U1UWeight2.09 lb (0.96 kg)2.09 lb (0.96 kg)2.09 lb (0.96 kg)2.09 lb (0.96 kg)。
网站漏洞扫描工具[黑客——别黑自己国家的网站!!!(转)2009年01月12日星期一上午 09:15Shadow Security Scanner v 网络入侵机_V2.0 波尔远程控制V6.32 VIP破解版 <br>superscan4.0扫描器 HttpsMimTools nohackasp木马生成器 <br> 拿站和思路 Oracle_专用注射器远程控制软件ntshell v1.0(开源 <br>挖掘鸡4.02 Willcome急速批量抓鸡全能 PcShare远程控制软件<br>多功能S扫描器 php168漏洞利用工具中华经典网络军刀NC <br>小马上线及绑困和抓鸡 iebho攻击程序终极Rootkit <br>超详细讲解鸽子上线 QQEAMIL攻击器 PHP木马修改增强版 <br>金豹多顶下载者 framework-2.6-snapshot 提权工具集 <br>EditPlus v2.31 Buil <br>最新过XP2网马 <br>剑煞BetaV7.6.8 <br>扫描端口V2.0 <br>X-way扫描器 <br>SpyNet Sniffer <br>网站猎手2.0 <br>X-Scan-v3.3 <br>流光5.0黑客基地专用破解版 <br> NBSI网站漏洞检测工具 <br>明小子旁注工具3.5 <br>端口过滤扫描器 <br>mysql_pwd_crack <br>Advanced IP Scanner v1.5 <br>IPScanner <br>扫描软件THC-Amap v5.0 <br>php注入辅助工具:phpsend <br>PackInter,sniffer工具含源代码 <br>X-Scan-v3.2-cn <br>X-Scan-v3.2-beta版 <br>超级扫描工具:nmap-3.81-win32 <br>流光 5.0 时间限制破解 <br>Domain3.2正式版(5.2修正) <br>sql扫描加自动攻击工具:Sqlpoke <br>THC-Amap v4.8 <br>mysql字段扫描:numscan <br>第一款php漏洞扫描器:rpvs <br>Oscanner <br>端口扫描器红魂专用版 <br>atk-3.1 <br>金山毒霸可疑文件扫描工具 v2.01 <br>GUI界面的WED和WIS综合工具 <br> 超强adsl破解器 <br>俄罗斯专业扫描工具SSS6.67.58破解版 <br>Attack Toolkit 3.0 <br>Roman ADSL帐号扫描工具升级版 <br> 针对广东电信漏洞的扫描工具 <br> IPv4和IPv6通用扫描工具:scan6 <br>adsl帐号扫描工具+动画 <br>MS Webserver 漏洞扫描器 <br> 网络主机扫描(HostScan) <br>T-PsKit <br>Retina Network Security Scanner <br>WildPackets ProCovert <br>Angry IP Scanner <br>wlan无线网络诊断/WildPacketsAiroPe <br>APort <br>铁血扫描器 <br>无处藏身(Seekyou) <br>nScan <br>SQL Injection测试工具 <br>FloodScan <br>rpcscan信息扫描工具 <br>优秀的ShadowScan <br>经典扫描程序Amap <br>Superscan <br>漏洞扫描Nessus <br>ipc批处理扫描工具 <br>Angry IP Scanner 汉化版 <br> 强大的漏洞扫描NessusWX <br>WindowsNT/2000自动攻击探测机 <br> 网络黑客控制中心使用教程+工具 <br>扫描工具SuperScan4 <br>NMap最新版本:nmap-3.70-win32 <br> Retina DCOM Scanner <br>SQLScan <br>很好的扫描工具 NetScanTools <br>ipc扫描工具scanipc <br>非常有名的扫描工具X-way <br>流光 for win98/ME <br>最好的ipc$扫描essential nettools</p><p> </p><p> </p><p> </p><p><br>不错的扫描工具easyscan <br>鼎鼎大名的扫描工具流光 <br>大范围网段快速ipc$猜解机ipscan <br>N.E.W.T.网络扫描器 <br>端口扫描A Complete Subnet Scanner <br>自动攻击探测机 <br>扫描工具:Vsan <br>IIS漏洞扫描Easyscan <br>高速端口扫描Bluesportscanner <br>扫描工具X-port <br>最好的扫描器:X-SAN 3.0 beta <br>扫描工具:STAT Scanner Pro <br>阿拉丁扫描器 <br>小巧的黑客工具:NBTScan <br>非常优秀的扫描工具X-scan 2.3 <br>扫描工具IPScanner <br>扫描工具Dsns <br>著名的且功能强大的WEB扫描工具Wnikto32 <br>小巧的端口扫描NetBurn <br>扫描工具GFI LANguard Scanner <br>不错的扫描工具:Scan <br>中华经典网络军刀 <br>优秀的扫描工具Nmap命令行版本 <br>多线程扫描XPortScan <br>专业的扫描工具Shadow SecurityScanner <br>ASP漏洞集 <br>扫描工具Retina Network SecurityScann <br>快速端口扫描Shadowscan <br>优秀的WEB扫描工具Nikto <br>扫描Shadow Security Scannerv6.6.41 <br>SuperScan V4.0汉化版 <br>极为优秀的Shadow Security Scanner <br>基于命令行下的RPC扫描器 <br>多线程扫描SinScan <br>局域网扫描大师 V1.0 <br>推荐:免费短信发送工具 <br>IP端口扫描软件 <br>最新漏洞扫描器MS05051Scan <br>推荐:图形界面的NMAP扫描器 <br> dcomrpc漏洞X-Scan23插件 <br> 啊D网络工具包2.专用免杀版 <br>极速漏洞扫描攻击器[升级版] <br>猎手-旁注工具 <br>黑客基地专用极速漏洞扫描器 <br> X-Scan v3.3 <br>超强扫描器:NMAP 3.90 <br>IP地址扫描器 <br>地址分类搜索机 <br>多线程后台扫描器 <br>超强扫描器superscan4.0 <br> nmap-3.81源代码(Linux平台) <br> nmap-3.81源代码(FreeBSD平台) <br> X-Scan-v3.3 <br>mysql弱口令扫描工具:mysqlweak <br>DFind_v0.83扫描工具 <br>MySql Weak Pass Scanner <br>Cain & Abel v2.68 for Win <br>阿D工具包2.01 <br>HScan v1.20 <br>动网大扫描 <br>多线程网站后台扫描工具 <br>MS06040漏洞扫描器 <br>挖掘鸡v3.5 <br>BluesPortScan超快的端口扫描工具 <br>动网大扫描 1.0测试版 <br>啊D网络工具包2.1免杀版 <br>sql注入中文转换器 <br>明小子Domain3.6 <br>guastbook漏洞利用 <br>德国的SQL注射工具 <br>流光FluXay 5 闪亮发布! <br>注入攻击综合软件包 <br>BBSXP论坛漏洞完全注射工具 <br>MS06007漏洞扫描器 <br>高速扫描:风雪端口扫描器 <br>动易2005 sp2漏洞利用工具 <br>webhacking-WEB渗透超级助手 <br> 简洁高速的扫描器:HScan <br>BBS论坛群发机破解版</p><p> </p><p> </p><p> </p><p>mssql注射辅助工具-getwebsehll <br>软件名称超级扫描器nmap-4.00 <br>挖掘鸡 V2.2 <br>啊D注入工具 V2.32 免杀版 <br>SQL注射综合程序 <br>扫描器IPtools2.5破解版 <br>SSPort高速端口扫描器 V1.0 <br> 局域网查看工具V1.60 <br>NCPH影子扫描器 <br>目前最完美的注入工具 <br>IP物理地址探测器 <br>网站猎手 <br>网络端口扫描工具 <br>震荡波扫描工具:Sasser Scanner <br> MS04-011漏洞扫描器RetinaSasser <br>SQL跨库查询动画教程 <br>命令行下NohackerScanner扫描器 <br>IP扫描IPScanner 1.79中文破解版 <br>嗅探监听:局域网密码查看工具1.46 <br>经典工具:X-Scan-v3.1 <br>监听工具:PromiScan v3.0 <br>扫描工具:FtpList 1.13 <br>经典漏洞扫描:X-Scan v3.0 <br>扫描工具:Remoxec <br>数据扫描工具:Oracle Auditing Tools <br>Web漏洞扫描工具Trapserver <br>著名的漏洞扫描:SSS <br>扫描工具:RpcScan v1.1.1 <br>经典的扫描工具:nmap 3.50 <br>漏洞扫描:GFI LANguard Scanner <br>小巧的IPC扫描工具 <br>CC6.0扫描程序 <br>nmap 3.75 for win <br>rootkit扫描工具:Rkdscan <br> 动画教程:JOEKOE留言本漏洞 <br> NBWS网站后台路径猜测工具 <br>web路径猜解工具:ScanWebPath <br> 未公布的动力系统漏洞演示 <br>SQL扫描工具:SQL ping <br> IIS权限探测:IIS Write Scanner V1.0 <br>扫描软件SImpsons'CGI Scanner及使用教程 <br>LANguard Network Security Scanner5.0 <br>加密工具:Morphine v1.3+GUI <br> DFind v0.8 <br>L-ScanPort2.0 <br>扫描工具:Scanner <br>X-Scan-v3.1-cn <br>Advanced IP Scanner V1.4 汉化版 <br>飞狐-网络扫描工具试用版 <br>Linux/UNIX扫描软件:XTHC-Amap v4.6 <br>动画教程:动力破解任何收费漏洞 <br>动画教程:'or''='漏洞最新演示 <br>天意阿里巴巴企业商务网V3.7上传漏洞 <br>代理猎手获取ADSL帐号冲Q币 <br>扫描器:nessuswx-1.4.4-install <br>IP扫描软件:Angry IP Scanner <br> 端口/漏洞/组件扫描工具:DFind v0.6 <br>可获取Web Server类型的端口扫描器 <br>135端口扫描器RpcScan v1.2.1 <br>4899空口令探测器 <br>经典工具:namp v3.50 命令行版 <br>猜解后台路径工具 <br>流光5.0黑客基地专用破解版 <br>免验证版NBSI(附加扫描器) <br>U-scan(UNICODE漏洞扫描器) <br> 自定义多线程后台扫描程序:ScanLogin <br>75款全球强劲工具大集合之一Nessus <br>75款全球强劲工具大集合之二NessusWX <br>Accessdiver 汉化版+使用教程 <br> 优秀的X-way <br>75款全球强劲工具大集合之十八SuperScan <br>75款全球强劲工具大集合之十六Nikto <br>75款全球强劲工具大集合之十一Libwhisker <br>75款全球强劲工具大集合之十二JOHN16 <br>75款全球强劲工具大集合之十二John <br>75款全球强劲工具大集合之十三SSH <br>75款全球强劲工具大集合之十五Tripwire <br>最快的端口扫描工具 <br>高速端口扫描PortScanner源代码</p>。
Superplasticity of AlCoCrCuFeNi High Entropy AlloyA. V. Kuznetsov1, a, D.G. Shaysultanov1, b, N.D. Stepanov1, c,G.A. Salishchev 1, d, O.N. Senkov2, e1 Laboratory of Bulk Nanostructured Materials, Belgorod State University, 85 Pobeda St., Belgorod308015, Russia2 UES, Inc., 4401 Dayton-Xenia Rd., Dayton, OH 45432, USAa kuznetsov@.ru,b shaysultanov@.ru,c stepanov@.ru,d salishchev@.ru,e oleg.senkov@Keywords: High entropy alloy, multi-directional forging, microstructure, superplasticity. Abstract.An AlCoCrCuFeNi high entropy alloy was hot worked by multi-directional isothermal forging at 950°C to produce an equiaxed fine-grain structure with the average grain/particle size of ~1.5 µm. The forged alloy exhibited superplastic behavior in the temperature range of 800-1000°C. For example, during deformation at a strain rate of 10-3s-1, tensile ductility increased from 400% to 860% when the temperature increased from 800°C to 1000°C. An increase in strain rate from 10-4 to 10-2 s-1 at T = 1000°C did not affect tensile ductility and elongation to failure was about 800%. The strain rate sensitivity of the flow stress was rather high, m = 0.6, which is typical to the superplastic behavior. The equiaxed morphology of grains and particles retained after the superplastic deformation, although some grain/particle growth was observed.Introduction.A new class of promising structural metallic materials, so called high entropy alloys (HEAs), has been developed during last decade [1-9]. These alloys typically contain from 5 to 13 principal elements in approximately equimolar concentrations [1]. A high entropy of formation of disordered solid solutions slows down formation of intermetallic phases in these alloys, and the alloys are thought to mainly consist of disordered solid solutions [1,4,5].Some of the properties expected from this class of alloys, such as high hardness, high strength, high wear and creep resistance, high temperature stability, and low thermal conductivity make them attractive for use in different applications [1,6,7]. Unfortunately, low ductility in the as-cast condition limits formability of many HEAs. One of the methods to improve formability is grain refinement [10]. Conventional grain refinement methods, which include cold rolling with subsequent recrystallization annealing, cannot be applied to HEAs with low ductility. One of the advanced methods of refining cast microstructure and improving properties is multi-directional forging [11,12]. Recently this method was successfully applied to refine the grain structure of a cast AlCoCrCuFeNi alloy [11].In this work, microstructure and elevated temperature tensile properties of the hot forged high entropy AlCoCrCuFeNi alloy are reported. The effects of temperature and strain rate on tensile ductility, flow stress and strain rate sensitivity were studied. The AlCoCrCuFeNi alloy was chosen as a material of investigation because it has the most extensive database among all other reported HEAs [1, 13-16].Materials and methods.An ingot of the AlCoCrCuFeNi alloy, with the composition shown in Table 1, was produced by induction melting of pure elements. The ingot was then electro-slag re-melted and cast into a water-cooled copper mold. Melting and casting was performed under an inert atmosphere of high-purity argon.Table 1. Chemical composition of the studied alloy.Al Cr Cu Ni Fe Co At. % 16.16±0.63 15.86±0.05 17.42±0.01 16.65±0.23 15.96±0.15 17.07±0.19 Wt. % 8.20±0.40 15.65±0.05 20.95±0.05 18.55±0.25 17.80±0.10 18.10±0.20The cast ingot was trimmed by cutting out about 10 mm thick pieces from the top and bottom of the ingot, and a blanket of 40 mm in diameter and 35 mm in length was machined from the remaining part of the ingot. The blank was homogenized at 960°C for 50 hours and hot forged in three orthogonal directions (so called “a-b-c forging” [9,10]) at 950°C. Forging was performed using a DEVR 4000 hydraulic press (the maximum force of 0.4 MN) equipped with isothermal stamping tool. The ram speed was 1mm/s and the total true strain achieved during forging was ~ 1000%. Uniaxial tensile tests were conducted using an Instron 5882 testing machine equipped with a furnace for heating up to 1200°C. Tensile specimens were heated to a testing temperature with a heating rate of ~15°/min, equilibrated at the temperature for ~15 minutes and tension tested with a crosshead speed of 0.016 mm/s, which corresponded to the initial strain rate of 10-3 s-1. The gauge length of the specimens was 16 mm and the gauge cross-section was 3×1.5 mm2. Several specimens were tested at different strain rates in the range of 10-5- 10-1 s-1. The microstructures of polished cross-sections of the deformed and non-deformed specimens were studied using scanning electron microscopes (SEM) Quanta 200 3D and Quanta 600 equipped with backscattered electron detectors,energy- dispersive spectrometers (EDS) and electronbackscattereddiffraction(EBSD)detectors. Standard linear interception method was used to determine size of grains/particles.Results and discussion.Microstructure after multi-directional isothermal deformation.The microstructuresof the alloy in the as-cast condition and after multi-directional isothermal forging at 950°C are shown in Figs. 1a and 1b, respectively. In as-cast condition, the alloy exhibits typical dendritic structure (fig. 1a) with the average dendrite size of about 50 µm. According to the EBSD analysis, the cast microstructure consists of the matrix with the BCC crystal structure (dark areas, the volume fraction is about 53%) and elongated particles with the FCC crystal structure (light areas, the volume fraction is about 47%). The FCC particles located at grain boundaries (i.e. interdendrite areas) are larger and brighter than the grey particles located inside the BCC matrix grains (i.e. inside the dendrites).a bFigure 1 – Microstructure of AlCoCrCuFeNi alloy in as-cast condition (а) and after multi-directional isothermal forging at 950°С (b).After multi-directional isothermal forging, the alloy has a fully recrystallized duplex structure (Fig 1b). Fine nearly equiaxed FCC-type particles are homogeneously distributed and mixed with the refined equiaxed grains of the BCC matrix. The volume fraction of the BCC matrixis ~60%, and the volume fraction of FCC particles is ~40%. The microstructure is characterized by the lognormal size distribution of grains/particles. The average grain/particle size is determined to be 1.5±0.9 µm. The high value of the standard deviation (s=0.9 µm) is due to large variations of the grain/particle sizes (from 0.2 to 6.1 µm) in the microstructure.Mechanical properties after multi-directional isothermal forging.The stress-strain curves obtained during tensile testing are shown in Fig. 2: at different temperatures and a constant strain rate έ = 10-3s-1(Fig. 2a) and at different strain rates and a constant temperature 1000°C (Fig. 2b). The values of the yield strength, σ0.2, ultimate tensileFigure 2 – Tensile stress-strain curves of the hot forged AlCoCrCuFeNi alloy obtained at (a) different testing temperatures (έ=10-3 c-1) and (b) different strain rates (Т=1000°С).Table 2. Tensile properties of the hot forged AlCoCrCuFeNi alloyT, °C 700 800 900 1000έ, s-110-310-310-310-410-310-210-1σ0.2, MPa 63 22 14 1 4 15.5 57σu, MPa 91 26 18 1.3 5 16 67 δ,% 63 604 405 753 864 858 442m - - - 0.59 0.51 0.62 - During tension testing at 700°C, plastic yielding occurs at 63 MPa and then the flow stress continuously increases, reaches a maximum value, σu = 91 MPa, at the strain of 10% and gradually decreases with further deformation due to strain localization and necking. At higher temperatures, from 800°C up to 1000°C, the stress-strain curves appear to be typical for superplastic behavior, with a prolonged steady-state flow stage. An increase in the testing temperature results in a significant increase in elongation and a decrease in flow stress. For example, at 700°C failure occurs at δ=63%, while at 1000°С δ reaches 864%. Both σ0.2 and σu decrease respectively from 63 MPa to 4 MPa and from 91 MPa to 5 MPa when the temperature increases from700°C to 1000°C (Fig. 2a and Table 2). Elongation to failure remains almost constant at strain rates in the range of 10-4-10-2 s-1 during testing at 1000°C. However, the flow stress increases with an increase in the strain rate: σ0.2 increases from 1 to 15.5 MPa, and σu increases from 1.3 to 16 MPa respectively. The plastic flow at these strain rates is characterized by very high strain rate sensitivity values, m = 0.51-0.62. With a further increase in strain rate from 10-2 to 10-1 s-1, elongation decreases to 442%, σ0.2 increases to 57 MPa, and σu increases to 67 MPa (Table 2). It should be noted that even at such a high strain rate the alloy still shows superplastic behavior. No signs of necking were found on tested specimens despite very high elongation values (Fig. 3).Figure 3 – Photographs of a non-deformed sample and tensile samples after deformation at 1000°Cand different strain rates.Evolution of microstructure during tensile testing.After tensile testing of the forged alloy at έ=10-3 s -1 in the temperature range of 700°С-1000°С, a noticeable increase in the grain/particle size occurs, especially at T = 900°C and 1000°C, however, the equiaxed morphology of grains and particles retains (see Fig. 4 and Table 3). For example, the average grain/particle size in the head (non-deformed part) of the samples increases from 1.5 µm (after forging) to 2.5 µm and 2.8 µm after tensile testing at 900°C and 1000°C, respectively. The grain/particle size in the heavily deformed region is slightly smaller (~2.2 µm at 900°C and 2.6 µm at 1000°C) than in the non-deformed region, which is probably an evidence of deformation-induced particle refinement.a bс dFigure 4 – Microstructure of the AlCoCrCuFeNi alloy after tensile testing tofracture at Т=1000°C and different strain rates: (a,b) 10-4 s -1; (c,d) 10-1 s -1; (a, c) non-deformed (sample head) and (b, d)deformed regions.A decrease in the strain rate from 10-1 to 10-4 s-1 at T = 1000°С leads to a more pronouncedgrain/particle growth in the non-deformed region, which seems to indicate static recrystallization.For example, after deformation at έ=10-1 s-1 the average grain/particle size is 2.2 µm, while afterdeformation at έ=10-4 s-1 this value increases to 4.4 µm. (Table 3, Fig. 4). In the deformed regionthe microstructure is refined, apparently due to dynamic recrystallization, and the average size of the structural elements is 1.4 µm and 2.7 µm at ε = 10-1and 10-4s-1, respectively. Intergranular porosity forms during deformation (Table 4). The volume fraction of pores is ~10.5%, 12.5% and7.9% after tension testing with έ=10-3 s-1 at 800ºC, 900°C, and 1000ºC, respectively. Pores almostdo not form during tensile testing at 1000°C with έ=10-4s-1(their volume fraction is ~0.1%).However, an increase in the strain rate to 10-1 s-1 increases the volume fraction of pores to ~12.9%.Table 3. The average grain/particle size and standard deviation (µm) in the multi-directionally forged AlCoCrCuFeNi alloy after tensile testing to fracture at given temperatures and strain rates. T, °C 700 800 900 1000έ, s-110-310-310-310-410-310-210-1 Porosity, (%) 10.5 10.8 12.5 0.1 7.9 11.4 12.9 Sample head 1.6±0.9 1.9±1.0 2.5±1.3 4.4±2.0 2.8±1.3 2.1±1.0 2.2±1.4 Gauge-neck 1.5±0.8 1.6±0.9 2.2±1.1 2.7±1.4 2.6±1.4 1.9±0.9 1.4±0.7 Table 4. Volume fraction of pores in the multi-directionally forged AlCoCrCuFeNi alloy after tensile testing to fracture at given temperatures and strain rates..T, °C 700 800 900 1000έ, s-110-310-310-310-410-310-210-1Porosity, (%) 10.5 10.8 12.5 0.1 7.9 11.4 12.9DiscussionApplication of multi-directional isothermal hot forging promoted high deformability of the AlCoCrCuFeNi high entropy alloy, which had low ductility in as-cast condition. A fine-grained duplex structure consisting of a mixture of BCC and FCC particles was formed after hot forging due to fragmentation of the initial dendritic structure and dynamic recrystallization. After hot forging, the average grain/particle size was ~1.5 µm and the volume fractions of the BCC and FCC phases were 60 and 40% respectively. The hot deformation was found to be an effective way to achieve high superplastic properties at the temperature range of 800-1000°С and the strain rate range of 10-4-10-1 s-1.Multistep isothermal forging significantly increases density of grain and interphase boundaries, which are known to become softer than the grain interiors at elevated temperatures [17].A noticeable increase in the tensile ductility and a decrease in the flow stress at temperatures higher than 700°C are likely related to diffusion-controlled grain boundary sliding (GBS). The GBS is more developed in a finer-grained microstructure. Dynamic recovery is also enhanced in fine-grained materials due to annihilation of dislocations at moving grain boundaries. Moreover, the plastic deformation controlled by GBS is characterized by a high strain rate sensitivity of the flow stress, which impedes necking and promotes superplastic deformation [16]. Prolonged stages of steady-state flow, observed during testing in the temperature range of 800-1000°С, are result of the superplastic behavior. In spite of very high plastic strains, grains and particles remained equiaxed and their growth is limited in the deformed region. It is likely that the extensive GBS accommodated by dynamic recovery and dynamic recrystallization [18] is responsible for equiaxed morphology of grains and particles after superplastic deformation of the HEA. The GBS also causesaccumulation of inter-granular porosity. It is interesting to note a considerable decrease in the volume fraction of pores, from 12.9% to 0.1%, with a decrease in the strain rate from 10-1 s-1 to 10-4 s-1during deformation at 1000ºC. Such behavior indicates that the rates of dislocation- and diffusion-driven recovery processes are not yet sufficient to accommodate the GBS at high strain rates, even at 1000ºC, but these recovery processes become efficient at low strain rates. This result seems to be in good agreement with the known fact that the high entropy alloys have lower diffusivity of the alloying elements relative to conventional alloys [6,7,9,19]. However, a detailed analysis of the mechanism of superplastic deformation of the AlCoCrCuFeNi high entropy alloy requires additional investigations.Conclusions.1. A fine equiaxed duplex structure with an average grain/particle size of ~1.5 µm was formed in the AlCoCrCuFeNi high entropy alloy after hot multi-directional forging.2. The forged alloy exhibited superplastic behavior in the temperature range of 800-1000°C and at έ=10-3s-1. Elongation to failure approached 604% at 800°C, decreased to 405% at 900°C and increased again to 860% at 1000°C. The absence of necking was an indirect indication of high strain rate sensitivity of the flow stress over the mentioned temperature range.3. The superplastic behavior was also observed over a wide strain rate range at 1000ºC. At the strain rates from 10-4 to 10-2 s-1 the elongation to failure was in the range of 753-864%, while the ultimate tensile stress increased from 1.3 MPa (at έ=10-4s-1) to 16 MPa (at έ=10-2s-1). The strain rate sensitivity m was in the range of 0.51-0.62. An increase in the strain rate to 10-1 s-1 led to a decrease in the elongation to 442% and an increase in the tensile stress to 67 MPa. Acknowledgements.This work was supported by Russian Ministry of Science and Education under grant №02.740.11.0510.References[1] J.-W.Yeh, S.-K. Chen, S.-J. Lin, J.-Y.Gan, et al.: Adv. Eng. Mater. Vol. 6 (5) (2004), p. 299[2] J.-W. Yeh: Ann. Chim: Sci. Mater. Vol. 31 (2006), p 633[3] J.-W. Yeh, Y.-L. Chen, S.-J. Lin, S.-K. Chen: Mater. Sci. Forum Vol. 560 (2007), p. 1[4] O.N. Senkov, G.B. Wilks, J.M. Scott, D.B. Miracle: Intermetallics Vol. 19 (2011), p. 698[5] O.N. Senkov, J.M.Scott, S.V.Senkova, et al.: J. Alloys Comp. Vol. 509 (2011), p. 6043[6] C.-W. Tsai, Y.-L. Chen, M.-H. Tsai, et al.: J. Alloys Comp. Vol. 486 (2009), p.427[7] O.N. Senkov, G.B. Wilks, D.B. Miracle, et al.:Intermetallics 18 (2010), p. 1758[8] O.N. Senkov and C.F. Woodward: Mater. Sci. Eng. A Vol. 529 (2011), p. 311.[9] O.N. Senkov, J.M. Scott, S.V. Senkova, F. Meisenkothen, D.B. Miracle, C.F. Woodward: J. Mater. Sci. 47 (2012), p. 4062.[10] R.M. Imayev, G.A. Salishchev, O.N. Senkov, et al.: Mater. Sci. Eng. A Vol. 300 (2001), p. 263.[11] G.A. Salishchev, R.I. Imayev, O.N. Senkov, and F.H. Froes: JOM Vol. 52 (12) (2000), p. 46[12] S.V. Zherebtsov, G.A. Salishchev, R.M. Galeyev, et al.: Scripta Mater. Vol. 51 (2004), p. 1147[13] A.V. Kuznetsov, D.G. Shaysultanov, et al.: Mater. Sci. Eng. A Vol. 533 (2012), p. 107[14] C.J. Tong, M.R. Chen, S.K. Chen, et al.: Metall. Mater. Trans. A Vol. 36A (2005), p.1263[15] C.J. Tong, Y.L. Chen, S.K. Chen, et al.: Metall. Mater. Trans. A Vol. 36A (2005), p.881[16] F.J. Wang, Y. Zhang, G.L. Chen, H.A. Davies, Int. J. Mod. Phys. B Vol. 6-7 (2009), p. 1254[17] V.M. Imayev, R.M. Imayev, G.A. Salishchev, Intermetallics Vol. 8 (2000), p. 1.[18] T.G. Nieh, J. Wadsworth and O.D. Sherby, Superplasticity in Metals and Ceramics (Cambridhe Solid State Science Series), University Press, Cambridge, UK, 1997.[19] K.B. Jang, Z.Y. Fu, J.Y. Zhang, J. Shi, W.M. Fang, et al.: J. Alloys Comp. Vol. (2010), p. 295.。