Infiltration of commonly used DOS commands, HTTP protocols and data submission methods

Source: Internet
Author: User
Tags clear screen

Dir View Directory

CD Switch Directory

Strat www.xxx.com Open Web page

del Delete file

CLS Clear Screen Command

Ipconfig view IP address

Netstat-an displaying network connections, routing tables, and network interface information

SYSTEMINFO displays detailed configuration information about the computer and its operating system, including operating system configuration, security information, product ID, and hardware properties

NET User View users

NET user admin Admin/add add an Account Admin password admin users

NET user admin View Admin user Information

Net localgroup Administrators admin/add to elevate admin to admin

HTTP protocol and HTTPS protocol (from Baidu)

http

Hypertext Transfer Protocol (Http,hypertext Transfer Protocol) is one of the most widely used network protocols on the Internet. All WWW documents must comply with this standard. HTTP was originally designed to provide a way to publish and receive HTML pages. 1960 American Ted Nelson conceived a way to process text messages through a computer called hypertext (hypertext), which has become the foundation of the HTTP Hypertext Transfer Protocol Standard architecture. The Ted Nelson organized a collaborative study between the World Wide Web Consortium and the Internet Engineering Group (Internet Engineering Task Force), eventually releasing a series of RFCs, of which the famous RFC 2616 defines the HTTP 1.1.

HTTPS: Encrypt http

HTTPS (full name: Hyper Text Transfer Protocol over secure Socket Layer) is a security-targeted HTTP channel and is simply a secure version of HTTP. That is, the SSL layer is added under HTTP, the security base of HTTPS is SSL, so the detailed content of encryption needs SSL. It is a URI scheme (abstract identifier system) with syntax similar to http: System. For secure HTTP data transfer. Https:url indicates that it uses HTTP, but HTTPS has a different default port than HTTP and an encryption/authentication layer (between HTTP and TCP). The system was originally developed by Netscape (Netscape) and built into its browser Netscape navigator, providing an authentication and encryption method of communication. It is now widely used for security-sensitive communications on the World Wide Web, such as transaction payments

Several ways to submit data to the server

Get: Getting data from the server

Get/refresh.php?callback=c9507eab_1c64_4359_b8ab_8ba845dc8828&bid=9a7d86667cb63acf13626750&siteid= 1970055&ucid=5568457&t=1473068810144 http/1.1

Host:p3.qiao.baidu.com

user-agent:mozilla/5.0 (Windows NT 6.1; WOW64; rv:48.0) gecko/20100101 firefox/48.0

Accept: */*

accept-language:zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3

Accept-encoding:gzip, deflate

referer:http://www.haojiemold.com/showart.asp?art_id=295

cookie:bidupsid=4654cc50453ca2428421f13a56692c76; pstm=1472895523; __cfduid=ded7d140a22bd7d59088a3003376fe78d1472984434; h_ps_pssid=20988_1453_18133_20857_20732_20837_20884; baiduid=4e50a7a59a03f4853b017f92b81e4d0d:fg=1; BDRCVFR[IY5AXX5UTBB]=MBXNW11J9DFMH7GUZR8MVQV; bd_brg_bid={"1970055″:" 9a7d86667cb63acf13626750 "}; pgv_pvi=3435858944; pgv_si=s2883547136

Connection:keep-alive

Post (Login box, search box): Submit data to the server

post/http/1.1

Host:askadmin.jianke.com

user-agent:mozilla/5.0 (Windows NT 6.1; WOW64; rv:48.0) gecko/20100101 firefox/48.0

accept:text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

accept-language:zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3

Accept-encoding:gzip, deflate

referer:http://askadmin.jianke.com/

Connection:keep-alive

Upgrade-insecure-requests:1

content-type:application/x-www-form-urlencoded

Content-length:29

Username=admin&password=admin

Cookies: Site Cache

Referer:http://192.168.110.131:8081/admin/login.asp

Cookie:fhjehermskhagqlpgsor=tatrpowjruxznjdgobvqrqzrpfafdbttkzvqeefz

Reprinted from Digo8

Infiltration of commonly used DOS commands, HTTP protocols and data submission methods

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.