. Refer to the-L and-n options.
-L,--listenport #
Specifies the port to use when the server is reverse-connected to the client. The default is to use a client connection to the port on the server.
-P,--parallel #
The number of threads. Specifies the number of threads that are used between the client and the server. The default is 1 threads. This parameter needs to be used by both the client and the server side.
-S,--
Tags: NCFeature Description: Powerful networking toolsNetcat (NC) is a simple and useful tool that can not only read and write data through a network connection using TCP or UDP protocol, but also a powerful network debugging and probing tool to build almost all types of network connections you need.Installation:[emailprotected]/0 # yum -y install ncHelp:[Emailprotected]/0 # NC-HUSAGE:NC [ -46DDHKLNRSTUUVZC] [-I interval] [-P source_port] [-S Source_ip_addres s] [-t
Tcp ttl: 42 TOS: 0x0 ID: 39426
** SF *** Seq: 0x55A0EF7B Ack: 0x40F9DC84 Win: 0x404
5/13-17:54:10. 623674 192.168.1.244: 118-> 192.168.1.250: 118
Tcp ttl: 42 TOS: 0x0 ID: 39426
** SF *** Seq: 0x6E42083A Ack: 0x4F07A60B Win: 0x404
The Analysis of TCP/IP headers has some interesting phenomena:
1. The value of the Fragment Idnetification field in the IP header is always 39426
2. The source port number of TC
Ping is a specialized term for submarine personnel, indicating the sonar pulse in response. Ping is a very useful TCP/IP tool in the network. Its main function is to detect network connectivity and Analyze network speed. Ping has both good and evil. Let's talk about the good side first. As mentioned above, Ping is used to detect network connectivity and Analyze network speed. But how does Ping display connectivity? First, you need to know some Ping parameters and returned information.
The follow
time-Z turns the input and output off-when used for scanning, where the port number can specify one or a specified range of Lo-hi.9, 1.84 version of the parameters introduction1. NC [ -46DDHKLNRSTUUVZC] [-I interval] [-p source_port]2. [-S source_ip_address] [-t ToS] [-w timeout] [-X Proxy_protocol] [-X3. proxy_address[:p ort] [hostname] [port[s]] 1.-4 mandatory use of IPv42.-6 mandatory use of IPv63.-D allows socket communication to return debug inf
/differentiated
Services
8-Iy
The service type (ToS) field consists of eight digits, including three
Priority field (ignored now), 4-bit TOS sub-field and 1
Bit unused bit, but must be set to. The ToS sub-field represents the minimum value.
Latency, maximum throughput, maximum reliability, and minimum cost. 4-digit
You can set one of the bits. You only need to ca
I believe everyone is familiar with the ping command in windows, but there are not many people who can make the most of the Ping function, of course, I am not saying that I can allow ping to play its biggest function. I just often use the ping tool and summarize some small experiences. I would like to share it with you now.
Now I will refer to the help instructions of the ping command to show you the skills I will use when using ping. Ping can only be used after the TCP/IP protocol is installed:
as the Big endian byte order and also becomes the network byte order.
Fields in the beginning of the IP data department:
Currently commonProtocol versionYes 4;
Header LengthIt refers to the number of 32 bit characters, including any options;
Service type (ToS) FieldContains a 3-bit priority field, a 4-bit TOS sub-field and a 1-bit unused bit, but must be set to 0. 4-bit
computer ip address, verify the connection with the remote computer, verify the connection to one or more remote computers by sending ICMP echo data packets to the computer and listening for echo response data packets. This command can only be used after the TCP/IP protocol is installed.Ping [-T] [-A] [-N count] [-l length] [-F] [-I TTL] [-V TOS] [-r count] [- s count] [[-J computer-list] | [-K computer-list] [-W timeout] destination-listParameters-T
Verify the connection to a remote computer or local computer. This command can be used only after the TCP/IP protocol is installed.
Ping [-t] [-a] [-n count] [-l length] [-f] [-I ttl] [-v tos] [-r count] [- s count] [[-j computer-list] | [-k computer-list] [-w timeout] destination-list
Parameters
-T
Verify the connection to the specified computer until the user is interrupted.
-
Resolve the address to the computer name.
-N count
Send the specified num
bytes17:03:19.298070 IP (tos 0x12,ECT(0), ttl 64, id 7354, offset 0, flags [DF], proto TCP (6), length 176)
The packet is captured in verbose output and the packet is printed out in 16 and ASCII, in addition to the link level header
[[emailprotected] ~]# tcpdump -v -Xtcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes17:04:46.063040 IP (tos 0x12,ECT(0), ttl 64,
. The-p option can be used to specify a default subset. -P protocol Displays the connection of the Protocol specified by protocol; Protocol can be TCP or UDP. If you use the-S option to display statistics for each protocol, the protocol can be TCP, UDP, ICMP, or IP. -R Displays the contents of the routing table. Interval re-displays the selected statistics, pausing interval seconds between each display. Press Ctrl+b to stop displaying the statistics again. If this argument is omitted, netstat pr
Ping [-T] [-A] [-N count] [-l length] [-F] [-I TTL] [-V TOS] [-r count] [- s count] {-J computer-list] | [-K computer-list} [-W timeout] destination-listOptions:-T ping the specified host until stopped. To see statistics and continue-type control-break; to stop-type control-C.Ping the host continuously until you press control-C.This function has no special skills, but it can be used with other parameters, which will be mentioned below.
-A resolve addr
Whilst reading an article the other day I saw this mentioned and realized I haven't written about this yet either, although I have written about the similar tool goolag.
What is gooscan?
Gooscan is a tool that automates queries against Google search appliances, but with a twist. these maid are designed to find potential vulnerabilities on Web pages. think "CGI succeeded" that never communicates directly with the target Web server, since all queries are answered by a Google appliance, not by the
IP. py defines the IP class, which should be the implementation part of the IP protocol.
1. IP class inherited from dpkt. Packet2. The IP class implementation header structure is:_ HDR _ = (('V _ HL ',' B ', (4 ('Tos ',' B ', 0), # service type TOS: 8 bit, default value 0('Len', 'h', 20), # total length: 16 bits, default value: 20('Id', 'h', 0), # ID: 16bit, default value: 0('Off', 'h', 0), # offset (inclu
I recently read an article about QOS, which is good.
========================================================== ===
Detailed description of IP QoS stream classification methods
[Url] www.net130.com [/url] Date: 2007-11-18 views: 3337
Source: blog.sina.com.cn/stimwooi discussed with my colleagues the priority of qostraffic and resolution traffic. Later I found this article. . In RFC 791, the TOS-bit IP precedence is divided into eight priorities and c
is everywhere in the Linux TCP/IP protocol stack, See Harald welte.An excellent article written article (ftp://ftp.gnumonks.org/pub/doc/skb-doc.html ). struct iphdr *iph = skb->nh.iph;Here, we just print some interesting things to see what they look like. Macro'Ipquad' is used to display an IP address in a readable manner.Linux/include/Linux/kernel. h>. printk(KERN_INFO "ipt_ipaddr: IN=%s OUT=%s TOS=0x%02X " "TTL=%x SRC=%u.%u.%
the TCP/IP Header must be transmitted in this order, it is also called the network byte order. Machines that store binary integers in other forms, such as the little endian format, must convert the header to the network byte before data transmission.
The IPv4 protocol version number is 4. the header length field indicates the number of 32-bit characters in the header. Therefore, the maximum length of the header is (2 ^ 4-1) * 4 bytes.
The TOS field c
IP data HeaderThe IP header is as follows. Analyze each field one by one.The four-digit version field indicates IPv4 or IPv6.The length of the four-digit radical represents the length of the IP radical.Eight-bit service type: the service type (TOS) field contains a three-bit priority subfield (ignored now ), the 4-bit TOS subfield and the 1-bit unused bit must be set to 0. The 4-bit
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.