朱元璋为什么不传位给朱棣| 表象是什么意思| 水金龟属于什么茶| 什么东西有头无脚| 胰岛素高是什么原因| 左侧附件区囊性回声是什么意思| 姜太公钓鱼愿者上钩是什么意思| 曹丕为什么不杀曹植| 孕晚期羊水多了对宝宝有什么影响| 鲁班是什么家| 杨树林是什么品牌| 氪金是什么意思| 蓝加红是什么颜色| 知见是什么意思| 痱子用什么药膏最有效| 奶油小生什么意思| 四月十六日是什么星座| 左腰疼是什么原因| 精神心理科主要治疗什么疾病| ost是什么意思| 右侧卵巢囊性结构是什么意思| 什么虫子有毒| 胃酸过多吃什么好| 三月阳春好风光是什么生肖| 乌鸡不能和什么一起吃| 查摆是什么意思| 头经常晕是什么原因| 发热挂什么科| 游丝是什么意思| 痛风能吃什么鱼| 三个牛读什么字| 也字五行属什么| 痛经什么原因| 阴囊瘙痒用什么药| 外婆菜是什么| 100a是什么尺码| 穿堂风是什么意思| 腔梗是什么病| 风属于五行属什么| 咸鱼是什么意思| txt什么意思| 什么时候敷面膜是最佳时间| 晚上八点半是什么时辰| 海豚吃什么| 白血病是什么原因引起的| 当家作主是什么生肖| 肚脐眼发炎是什么原因| 我能做什么| 斐乐手表属于什么档次| 白灼虾是什么虾| 七夕节吃什么| 昆仑玉是什么玉| 吓得什么填空| 下午六点是什么时辰| 欠缺是什么意思| 真命题是什么意思| 什么人容易得老年痴呆| 二月一号是什么星座| 拾人牙慧的意思是什么| 吃黄瓜有什么好处和坏处| 肚脐眼的作用是什么| 为什么的拼音怎么写| 阴阳人是什么意思| 为什么月经期有性冲动| 猴和什么相冲| 玉米什么时候传入中国| 坐月子能吃什么零食| 木薯是什么| 胎儿腹围偏大说明什么| 多发性硬化是什么病| 身先士卒是什么意思| 氨基丁酸是什么| baumwolle是什么面料| 语重心长是什么意思| 小腹右边疼是什么原因| 女孩喜欢什么礼物| 屁多是什么原因造成的| 腿弯后面疼是什么原因| 口腔溃疡能吃什么| 2月5号是什么星座| 鼻子流血是什么原因| 顶包是什么意思| 庶是什么意思| 精子是什么味道的| 动脉夹层什么意思| 再生纤维是什么面料| 腔梗灶是什么意思| 鼻饲是什么意思| 红眼病什么症状| 制作人是干什么的| 领事是什么级别| 甲亢病是一种什么病| 乳腺结节是什么病| 氰化钠是什么| 什么是尿崩症| 外阴瘙痒是什么情况| 咳血是什么原因| soldier是什么意思| 白帆是什么| 水命中什么水命最好| 左眼跳代表什么| 波折是什么意思| 1007是什么星座| 宫颈筛查hpv阳性是什么意思| 玛奇朵是什么意思| 沙和尚是什么妖怪| 滑膜炎用什么药治疗最好最快| 老是吐是什么原因| 缘起缘灭是什么意思| 1450是什么意思| 人体左边肋骨下疼是什么原因| 蚂蚁最怕什么东西| 0是什么数| 什么的拳头| 甲低有什么危害| 迷恋一个人说明什么| 拉比是什么意思| 鲁迅的原名叫什么| 孕期脸上长痘痘是什么原因| 脂肪肝吃什么药好| 犬瘟是什么原因引起的| 左侧卵巢无回声是什么意思| joola是什么牌子| 瞳孔缩小见于什么病| 30度穿什么衣服合适| 医联体是什么意思| 女人腰酸背痛是什么病| 狗狗为什么喜欢舔人| 7月15日什么星座| 梦见车翻了是什么预兆| 德比什么意思| 感冒吃什么| 吃什么肉不会胖又减肥| 五月十二是什么星座| 玉和翡翠有什么区别| 母猫怀孕有什么症状| 血管变窄吃什么能改善| 请问支气管炎吃什么药最有效| 非甾体抗炎药是什么意思| 霍金得的是什么病| 右侧附件区囊性回声是什么意思| 紫玫瑰花语是什么意思| 聊胜于无的聊是什么意思| 什么叫外阴白斑| 1924年属什么生肖| 跌打损伤用什么药最好| 鱼豆腐是什么做的| 玉字五行属什么| 吃什么最容易减肥| 虎皮兰开花寓意什么| 排骨炖什么好吃又有营养| 芜湖有什么大学| 辽宁舰舰长是什么军衔| 小腹疼痛挂什么科| 肝囊肿是什么原因引起的| 300年前是什么朝代| 尿酸过高是什么原因| kv是什么单位| 新白娘子传奇许仙为什么用女的演| fda什么意思| 粉色代表什么| 做梦下大雨是什么兆头| 什么是激素脸| 健康是什么意思| 碱性磷酸酶高是什么病| 颈椎退行性病变是什么意思| 斯沃琪手表什么档次| 大便出血是什么原因引起的| 努嘴是什么意思| 黄豆炒什么好吃| 红领巾的含义是什么| 男性解脲支原体是什么病| 一什么陆地| 火加木是什么字| 舌头上有红点点是什么原因| circles是什么意思| 1288是什么意思| alpha是什么| 异烟肼是什么药| 北边是什么生肖| 水指什么生肖| 加拿大用什么货币| 女人30如狼40如虎是什么意思| 3.17是什么星座| 为什么不能摸猫的肚子| 心动过缓吃什么药最好| 绝症是什么意思| 叶黄素对眼睛有什么功效| 睡觉打呼噜什么原因| 摩拳擦掌是什么意思| 来月经是黑色的是什么原因| 三维和四维有什么区别| 吃什么药能冲开宫腔粘连| 梦到地震预示什么| 英姿飒爽是什么意思| 搓是什么意思| 孕妇梦见下雪是什么征兆| 1946属什么生肖| 陈旧性骨折是什么意思| 什么时候种胡萝卜最好| 肌无力是什么病| 沉淀是什么意思| 默契什么意思| 女人眉心有痣代表什么| 为什么晚上血压比白天高| 缓释片是什么意思| 电话停机是什么意思| 什么咖啡最好| ca是什么意思| 牙龈发炎肿痛吃什么药| 咳嗽有痰挂什么科| 轻度溶血是什么意思| 巴洛特利为什么叫巴神| 虎的本命佛是什么佛| 肾结石什么不可以吃| 为什么会有地震| graff是什么牌子| 蝙蝠长什么样子图片| 什么仗人势| 淋巴细胞偏低是什么意思| 四维什么时候做最佳| 思伤脾是什么意思| 丫丫的老公叫什么| 最好的洗发水是什么牌子| 猫便秘吃什么最快排便| 取环后吃什么恢复子宫| 女人是什么| jackjones是什么品牌| 支原体吃什么药好得快| 虚热是什么意思| 鲱鱼罐头为什么这么臭| 顶礼是什么意思| 山狸是什么动物| 吴亦凡演过什么电影| 紫水晶五行属什么| 等代表什么生肖| 牙龈上火肿痛吃什么药| 头皮上长疣是什么原因造成的| 大便颗粒状是什么原因造成的| 失信人是什么意思| 当兵什么时候入伍| 吃了避孕药后几天出血是什么原因| 岳绮罗是什么来历| 三高可以吃什么水果| 64年的龙是什么命| 毛囊炎用什么药膏最好| 2026年是什么命| 啪啪是什么意思| 复合维生素b片主治什么病| 跑步对身体有什么好处| 过敏涂什么药膏| 五心烦热是什么意思| 海阔什么| 黑色素缺失吃什么补充最快| 膝盖积液有什么症状| 装是什么意思| 雌二醇是什么意思| 苦瓜吃多了有什么坏处| 南红五行属什么| 土霉素治什么病| 麦粒肿用什么药| 牙齿流血是什么原因| 荔枝不能和什么同吃| ngs什么意思| 百度
CAPEC

扶贫不能排排坐分果果(话说新农村)

百度 过去,仙桃农村脏乱差,我们满足人民群众对美好生活的向往,把清洁工程延伸到每个村,一把扫帚扫到底,农村垃圾集中处理。

A Community Resource for Identifying and Understanding Attacks

New to CAPEC? Start Here
Home > About CAPEC >  

About CAPEC

Summary of Use Cases

There are twenty-six known use cases applicable to software organizations, supply chain markets, project teams, and security teams. These can be grouped into eight categories. The table below provides a summary, while the following list contains a more detailed description of each use case.

This page illustrates how most of these use cases are actively employed by the community. The variety of these use cases suggests CAPEC’s potential value across the entire Software Development Lifecycle (SDLC).

CAPEC Use Cases

Category/Use Case Summary
Application Testing
[UC-1] Security Test Case Identification and Construction CAPEC assists testers to construct systematic and real-world attack scenarios.
[UC-2] Red Teaming Template Creation Attack Patterns provide an excellent resource for defining penetration testing templates for red teams.
Analysis
[UC-3] Incident Response and Threat Analysis Knowledge of the attack patterns enables responders to better align mitigation strategies.
[UC-4] Compliance Analysis Support measuring compliance with industry standards and guidelines.
[UC-5] Malware Behavior Analysis Relate the behavior of malicious code to attack patterns.
[UC-6] Threat Characterization and Attribution Provide assistance in characterizing and eventually supporting attribution of threats from observed attack instances.
[UC-7] Software Security Trend Analysis Common terms for attack patterns are useful to determine which attacks occur most often.
[UC-8] Attack Risk Mitigation/Remediation Guidance The CAPEC’s Solutions and Mitigations provide relevant mitigations and remediations.
[UC-9] Correlating Findings between Attack Simulation and Real-World Operational Monitoring Comparing the results of simulated attacks with those of real-world attacks.
[UC-10] Correlating Findings between Static Analysis and Penetration Testing Comparing static analysis findings of observed weaknesses with penetration testing findings of observed successful vectors of attack.
[UC-11] Event Auditing Common terms for attack patterns map and correlate events across different audit trails.
Threat Modeling
[UC-12] Threat Modeling Mapping relevant threats and likely actions against the specific attack surface of the software to place threat information in an objective and actionable context.
Requirements
[UC-13] Security Control Selection CAPEC’s Solutions and Mitigations provide an authoritative resource to support security control selection during the requirements and architecture phases of the development lifecycle.
[UC-14] Analyze and Capture Security Requirements (Abuse Cases) CAPEC’s detailed information and context of attack patterns help populate abuse case templates for conducting security requirements analysis.
Evaluations
[UC-15] Evaluating Static and Dynamic Analysis Tools Tools can be evaluated based on coverage of attack patterns.
[UC-16] Tool/Service Characterization and Selection Use of CAPEC allows security analysis tool/service vendors to characterize their coverage and capabilities.
[UC-17] Determination of Assessment Techniques Use of CAPEC enables the determination of the effectiveness of different software assessment techniques.
[UC-18] Manual and Automated Software Assessments CAPEC attack patterns provide a standardized way to identify and remediate software weaknesses prior to the deployment of software
Reporting
[UC-19] Enhanced Reporting Use of CAPEC allows operational security tool vendors to map which attacks their various security mechanisms prevent.
[UC-20] Advisories & Alerts CAPEC attack patterns offer a wealth of attack-centric contextual information that can add depth and enhanced detail to reports.
[UC-21] Communication of Results/Research to Support Action Use of CAPEC allows for a standardized vocabulary to share information within a development team.
Training/Education
[UC-22] Security Awareness Training CAPEC describes the attacker’s perspective and attack concepts for use in security training.
[UC-23] Training Software Developers, Testers, Buyers, and Managers CAPEC provide a standardized knowledge base for use in the development of courses and presentations.
Prioritization
[UC-24] Prioritize Weakness Analysis by Attack Relevance CAPEC provides a useful mechanism for prioritizing weakness analysis activities.
[UC-25] Plan and Prioritize Secure Code Review CAPEC provides a useful mechanism for prioritizing secure code review efforts.
[UC-26] Prioritize Penetration Testing by Weakness Relevance CAPEC provides a useful mechanism for prioritizing penetration testing activities.

Description of CAPEC Use Cases

The following sections describes the twenty-six use cases to illustrate the landscape of possibilities for leveraging CAPEC’s attack patterns.

Application Testing

[UC-1] Security Test Case Identification and Construction

Summary: CAPEC assists testers to construct systematic and real-world attack scenarios to evaluate the risks and resiliency of system to coordinated attacks.

Context: CAPEC can assist application testers to understand how attackers are likely to misuse and abuse an application so they can determine its resiliency to different types of attacks. So, the CAPEC's are design patterns for someone to use to write test cases and could be used by QA professionals as well as penetration testers.

[UC-2] Red Teaming Template Creation

Summary: Attack Patterns, with their intrinsic CAPEC mapping to specific threat capabilities and motivations, provide an excellent resource for defining penetration testing templates for red teams seeking to emulate specific threats.

Analysis

[UC-3] Incident Response and Threat Analysis

Summary: The process of analyzing current threats and responding to ongoing incidents requires a wealth of information to understand how best to mitigate the issues and stop the adversary. Two pieces of information that can be useful are the underlying types of code weaknesses that are being exploited and the pattern of attack that is being leveraged. By knowing the weaknesses, responders can search for similar potential issues in other applications that the adversary may also be targeting. Knowledge of the attack patterns enables responders to better align mitigation strategies to better stop the specific type of threat.

Context: For example, US-CERT would like to include a CWE and CAPEC identifier within every incident report to enables each incident to be linked back to a richer information source.

[UC-4] Compliance Analysis

Summary: CAPEC offers a useful resource to support measuring compliance with industry standards and guidelines.

Context: CAPEC could be mapped to existing security regulations in the same way that companies have mapped CWE to standards and regulations. CAPEC may facilitate a more streamlined understanding to achieving regulatory compliance as well as compliance testing.

[UC-5] Malware Behavior Analysis

Summary: CAPEC can be useful in describing the behavior of malicious code by tagging specific attacks the code engages in to CAPEC entries to obtain a behavioral profile.

Context: CAPEC is thought to provide a means for analyzing malware by providing an attack-level conceptual framework that could be used to describe the behavioral characteristics of the malware.

[UC-6] Threat Characterization and Attribution

Summary: Attack Patterns, through their CAPEC mapping to specific threat capabilities, motivations and behaviors, can provide assistance in characterizing and eventually supporting attribution of threats from observed attack instances.

[UC-7] Software Security Trend Analysis

Summary: Trend analysis is performed to determine which software weaknesses and attacks occur most often. Performing trend analysis relies on having common terms for the weaknesses and attack patterns to be tracked. CWE and CAPEC provide these terms.

Context: For example, multiple major software vendors (e.g., Red Hat) annotate their own bug reports with CWE identifiers, so they can identify their own frequently-occurring mistakes and adjust their development or testing processes accordingly. NIST’s NVD classifies each CVE entry based on its related CWE identifier, which enables ecosystem-wide trend analysis.

[UC-8] Attack Risk Mitigation/Remediation Guidance

Summary: CAPEC attack patterns, through their defined Solutions and Mitigations, provide an excellent resource to support identification of relevant mitigations and remediations for weaknesses uncovered through successful relevant attacks.

[UC-9] Correlating Findings between Attack Simulation and Real-World Operational Monitoring

Summary: CAPEC offers a unique bridge for correlating the findings from White-Box and Black-Box Web Application scanning solutions which simulate attacks and the findings of operational monitoring tools such as web application firewalls which capture real-world actual attack instances for purpose of correlating results across different defensive technologies.

Context: To allow web application scanners (WAS) technologies to map their findings to web application firewall (WAF) technologies. Due to the benefits of interoperability between WAS and WAF technologies, some vendors are partnering with complementary technologies. CAPEC can facilitate interoperability via attack-to-weakness mappings that enhance cross-product reporting. Web application scanners can show which CWE weaknesses their technology detects and helps remediate, and WAF technologies can show which CAPEC entries were detected and which weaknesses that the attack typically exploits. This linkage can assist in better correlating the results from the two technologies in operation.

[UC-10] Correlating Findings between Static Analysis and Penetration Testing

Summary: CAPEC attack patterns, through their mapping to targeted and relevant weaknesses, provide a useful mechanism to assist in correlating the findings of static analysis which typically report observed weaknesses and penetration testing which typically reports successful vectors of attack.

[UC-11] Event Auditing

Summary: Audit Trail linkage between Firewall, IDS, Web Logging Software, and Host IPS technologies to facilitate a common Attack Dictionary against which to map and correlate events.

Context: Tie patterns into the observable behaviors that firewalls, network IDS/IPS, and host IDS see. Adorning the different CAPEC patterns and their respective exploratory, experimentation, and exploitation portions with how those steps would show up in the various sensors will provide a way for SIM type capabilities to use CAPECs as templates that they can compare what they "see" with in order to identify attacks quicker and with more confidence.

Threat Modeling

[UC-12] Threat Modeling

Summary: CAPEC attack patterns, through their mapping to both threat characteristics and targeted weakness contexts, provide an excellent resource for mapping relevant threats and their likely actions against the specific attack surface of the software as part of a threat modeling activity. This helps to place threat information in an objective and actionable context.

Requirements

[UC-13] Security Control Selection

Summary: CAPEC attack patterns, through their defined Solutions and Mitigations, provide an excellent resource to support security control selection during the proactive security engineering activities of the requirements and architecture phases of the lifecycle.

Context: CAPEC allows an analyst/designer/architect to think about how their system or application will be attacked and thus possibly how they could change the design/architecture to limit or eliminate some of the weaknesses the attack patterns would leverage to carry out their attack. This use also applies to early phase SDLC planning where security controls are being designed into product requirements.

[UC-14] Analyze and Capture Security Requirements (Abuse Cases)

Summary: Attack Patterns, with their CAPEC descriptions and characterizing context elements, offer excellent abuse case templates for conducting security requirements analysis.

Evaluations

[UC-15] Evaluating Static and Dynamic Analysis Tools

Summary: Static and dynamic analysis tools are often selected based on their coverage of software weaknesses and attack patterns. CWE and CAPEC provide a basis for understanding tool coverage and how tools compare to each other because they provide a comprehensive list of standardized software weaknesses and attack patterns that tools might identify, as well as providing standard IDs so that different tools can be compared more effectively and efficiently. CWE lists the weaknesses that a static analysis tool might cover, while CAPEC provides the list of attack patterns that a dynamic analysis tool might test for.

Context: For example, CWE is currently used in the National Institute of Standards and Technology’s (NIST) Software Assurance Metrics And Tool Evaluation (SAMATE) project for understanding tool capabilities. Each individual “test case” is labeled with its associated CWE identifier.

[UC-16] Tool/Service Characterization and Selection

Summary: CAPEC offers an objective referential resource to allow security analysis tool/service vendors to characterize their coverage and capabilities in order to support effective selection by the user.

Context: CAPEC compatibility mapping for Black-Box, White-Box, Fuzzers, and other assessment tools/services to provide a mapping of which CAPEC Patterns present within testing libraries, and the potential types of CAPEC attack patterns that could originate from discovered vulnerabilities.

[UC-17] Determination of Assessment Techniques

Summary: Different software assessment techniques (e.g., fuzz-testing, attack surface analysis, code reviews, pen testing teams, design review) are effective at detecting different issues. By enabling a shared understanding of the types of issues that each technique is able to identify, CWE and CAPEC support the selection of various assessment techniques that best serve assessment goals.

Context: For example, in 2014, the Institute for Defense Analyses used CWE identifiers in a detailed report to National Security Agency’s (NSA) Center for Assured Software (CAS) that linked a large number of software vulnerability mitigation techniques with the CWE identifiers associated with those techniques. These findings can be used by software development project managers to identify and prioritize mitigation efforts to ensure that they mitigate the broadest range of weaknesses and attacks possible.

[UC-18] Manual and Automated Software Assessments

Summary: CWE and CAPEC provide a standardized way to identify and remediate software weaknesses prior to the deployment of software, thereby preventing the materialization of exploitable vulnerabilities in operational environments. Once assessment techniques are selected, CWE and CAPEC provide the foundation for constructing test cases, assessing software against the test cases, discovering weaknesses, and identifying remediation steps.

Context: For example, a team assessing a new software product uses CWE and CAPEC to know what specific issues to look for, and how to correlate that knowledge with the results of any tools being used to assist the assessment

Reporting

[UC-19] Enhanced Reporting

Summary: CAPEC offers an objective referential resource to allow operational security tool vendors to map which attacks their various security mechanisms prevent and improve the quality of descriptive information provided to the user.

Context: CAPEC could be used by security technologies as a repository of information that can be used to enhance report data and analysis.

Many security tool vendors feel that it is desirable to have a link from a CVE to a CAPEC, a bridge if you will. This eases creation of summary diagrams about attack types, distributions, and other supporting material that add immense value to their existing reporting schemes.

[UC-20] Advisories & Alerts

Summary: CAPEC attack patterns offer a wealth of attack-centric contextual information that can add depth and enhanced detail to corporate advisories and security alerts.

[UC-21] Communication of Results/Research to Support Action

Summary: The results of software assessments must be communicated to development teams and risk managers so that appropriate changes can be made to the code base and residual risk can be effectively managed. CWE and CAPEC facilitate this communication by providing standardized lists of software weaknesses and the methods to exploit those weaknesses such that two or more people know they are talking about the same thing and also have an ID number to reference. Without standardization, individuals are forced to engage in non-standard descriptive terms that generate rework and misunderstanding.

Context: For example, NIST and other members of the Forum of Incident Response and Security Teams (FIRST) Vulnerability Reporting and Data eXchange (VRDX) Special Interest Group (SIG) are investigating ways to share vulnerability information across different global regions and teams, who speak different languages. Standard identification schemes such as CWE and CAPEC provide this language-independent way to reference such issues

Training/Education

[UC-22] Security Awareness Training

Summary: CAPEC offers an excellent resource for communicating the attacker’s perspective and attack concepts for use within security training across a wide range of topics and a wide range of potential audiences, both internal and external.

[UC-23] Training Software Developers, Testers, Buyers, and Managers

Summary: Software is a key functional element of almost every aspect of IT systems, businesses, and the economy. Software developers at any level of experience require resources that provide a basis for understanding exploitable weaknesses and the methods to exploit them. CWE and CAPEC provide a standardized knowledge base for this understanding, enabling the development of courses, certification criteria, and validating the scope and range of knowledge present in the software security workforce.

Context: For example, organizations getting started in software assurance will use the CWE/SANS Top 25 list, the related CWE entries, and their links to associated CAPECs to establish a curriculum and educate new staff about the weaknesses they are trying to avoid in their developed code.

Prioritization

[UC-24] Prioritize Weakness Analysis by Attack Relevance

Summary: Attack Patterns, through their mapping to targeted and relevant weaknesses, provide a useful mechanism to assist in prioritizing weakness analysis activities based on which types of attacks have been determined to be most relevant for the security context of the software under analysis.

[UC-25] Plan and Prioritize Secure Code Review

Summary: Attack Patterns, when prioritized against the context of a given software application, can provide assistance, through their CAPEC mapping to targeted and relevant weaknesses, in planning and prioritizing secure code review efforts against that application.

[UC-26] Prioritize Penetration Testing by Weakness Relevance

Summary: Attack Patterns, through their mapping to targeted and relevant weaknesses, provide a useful mechanism to assist in prioritizing penetration testing activities based on which weaknesses have been determined to be most relevant for the desired security properties of the software under analysis.

More information is available — Please select a different filter.
Page Last Updated or Reviewed: April 04, 2019
不能喝酒是什么原因 空调开不了机是什么原因 晚上七八点是什么时辰 头部挂什么科 斑秃去医院挂什么科
将军是指什么生肖 小圆细胞阳性什么意思 胆固醇低是什么原因 直辖市是什么级别 复试一般会问什么问题
墙头草是什么意思 谷丙转氨酶是检查什么 43属什么 沙棘是什么 蛋花样大便是什么原因
多吃黑芝麻有什么好处 阴囊瘙痒是什么原因 淡盐水漱口有什么好处 什么样的人不能坐飞机 先天性聋哑病属于什么遗传病
防蓝光眼镜有什么用hcv8jop7ns0r.cn 红加绿是什么颜色hcv9jop6ns1r.cn 明前茶和明后茶有什么区别aiwuzhiyu.com 浅表性胃炎吃什么药好hcv8jop2ns5r.cn 补钙吃什么最好hcv9jop0ns7r.cn
韭菜可以炒什么naasee.com 淡淡的什么hcv7jop9ns6r.cn rf医学上是什么意思hcv8jop7ns2r.cn joan什么意思luyiluode.com 菠菜什么时候传入中国hcv7jop9ns8r.cn
本家是什么意思hcv8jop9ns5r.cn 干咳是什么原因引起的hcv8jop4ns4r.cn 市人大副主任什么级别hcv9jop3ns9r.cn 吃什么白头发变黑hcv9jop5ns7r.cn 提手旁的字与什么有关hcv9jop0ns9r.cn
吃酒酿有什么好处ff14chat.com 什么时候降温hcv8jop5ns6r.cn 有什么办法可以怀孕hcv8jop5ns6r.cn 左下腹疼挂什么科0297y7.com 什么充电宝能带上飞机weuuu.com
百度