Ps7isys Blog
In fact, this document is also a rough article about understanding and thinking... there is no technical content, but you can get it from your ideas;
Other technologies rely on self-exploration. I have been talking about it for a long time. It is better to try it on your own. This effect is more profound than what I told you directly...
Well, I will not talk much about other nonsense. I will tell you section C directly:
First, what is section C?
Here I will tell you. For example, on the 127.127.127.4 IP address, there is a website on the 127.4 server. We can think about it. He is a very large website with almost no vulnerabilities! However, he and C section 127.127.127.1 ~ 127.127.127.255 ~ 255 there are servers and websites with vulnerabilities, so we can penetrate 1 ~ 255 After any station, raise the right to sniff and obtain the password of the server 127.4 or even the password of the 3389 connection. If you are lucky, you will get a lot of passwords... (Now you can see the two words "Privilege Escalation". Now you know the importance of privilege escalation !)
Section C has no technical content. Simply configure the Cain tool. The current version is 4.9. It is very powerful, but it is used under the window ..
If it is a Linux Unix system, you can use Baidu! Unix sniffing,
It is common in UNIX environments such as Sniffit, Snoop, Tcpdump, and Dsniff! If window2003 does not have the privilege of Unix, don't think about it ..
In fact, you can think of section C as a remote keyboard recorder... and section C sniffing is hard to prevent many large websites from being so harmonious ..
As we all know, many of the major hacker websites are targeted by the big bulls, and many of them are attacked by sniffing...
If you do not have the permission. You can set up a virtual machine to test sniffing.