HTTP proxy is the most classic and common proxy protocol. It is widely used in the company's Intranet environment. Generally, employees need to configure an HTTP proxy for the browser to access the Internet. At first, the HTTP Proxy was also used to go over the "Kung Fu network". However, due to the continuous development of "Kung Fu network", the common HTTP Proxy has long been ineffective. However, there are still many people who use plain text HTTP Proxy protocol and software such as stunnel
remaining full text>How to Use the SOCKS5 Proxy server?
A proxy server is used by a proxy network user to obtain network information. It is a transfer station for network information.Simply put, I need to read a book. Then someone will read this book to me, and the one who reads this book will act as an agent!Role of proxyIts function is to obtain network information by proxy network users. It is a transfer station for network information. In general, when we use a web browser to directly conne
SOCKS5_NOIDENT
Set SOCKS5_DEMAND_IDENT
#
# Set SOCKS5_PWDFILE/etc/socks5.pwd
# User authentication method
Auth-u
# Allow users of all IP addresses
Permit u ------
# If an IP address segment (192.168.0.0/255.255.255.0) is restricted
# Permit--192.168.0 .---
# If you restrict access from an IP address (192.168.0.10)
# Permit--192.168.0.10 ---
Deny ------
# Cascading
# Socks4--202.110.217.75: 1080
# Socks5--61.167.58.77: 1080
Then the password file
$ Vim/etc/socks5/passwd
# UserA passwd
UserA pass
working, and it is difficult to experience these principles at work. This example gives you another process to experience these principles.
This example mainly uses some programming technologies, such as socket programming, signals, processes, and some advanced unix socket programming topics. Of course, none of these are the main ones. the important thing is to experience the market development method.
2. background for developing this proxy program
I am working in a closed network env
, whether it is recorded through the keyboard. For HASH capturing, We need to store all the key data in the account, password, and email address. On the one hand, we need to prepare the information for penetration, and on the other hand, prevent the current attackers from dropping the data.
3-1-1. Use Remote Control Key records for capturing.
3-1-2. Use PWDUMP7 or GETHASHES to capture the HASH and crack it. GETHASHES V1. After 4, all the HASH values of the domain can be captured.
3-1-3. Use GINA
3proxy Install and configure the network agent process3proxyOfficial website in: https://3proxy.ru/, 3proxy can be used to set up a variety of protocol agents, http socks such as, and so on, about 3proxy detailed introduction can be found through the search to understand, here does not say.installation3proxyThe code is hosted on the github above address is: Https://github.com/z3APA3A/3proxyThe installation steps are as follows:
git clone http
. The TLS logging protocol uses secret methods, such as Data Encryption Standard (DES), to ensure secure connections. The TLS logging protocol can also be used without encryption technology. The TLS handshake protocol enables servers and clients to authenticate each other prior to data exchange and negotiate cryptographic algorithms and keys. TLS uses key algorithms to provide endpoint identity authentication and communication secrecy on the Internet, based on public Key Infrastructure (INFRASTR
designed on the second layer of OSI.Build a tunnel to replace PPTP (three-tier tunnel ). 1.3.2.5 socksSocks is a proxy protocol for network connections.Enable hosts at one end of socks to access socks completely, while hosts at the other end do not require direct access from IP addresses. Socks can identify and authorize connection requests, establish proxy con
preceding connection, the connections between (A)
Back to TopPart 3 Analysis of other types of dynamic forwarding instances
Well, dynamic forwarding sounds cool. When you see this, have you ever thought about local forwarding and remote forwarding, but the premise is that there is a fixed application server port number, for example, port 389 of the LDAP server in the preceding example. What should I do without this port number? Wait, what kind of application will not have t
to exclude some symbols p.split(r‘(\s\,\.\#\\)ab*‘) , so that the format can be some of the symbols to exclude, only correctly shard out the key information we need.Search and replace sub ()sub(replacement,string[,count = 0])The returned string is replaced in the string with the leftmost duplicate of the RE, and if the pattern is not found, the character will be returned unchanged. The optional parameter count is the maximum number of times a pattern match is replaced, and count must be a non-n
Http://www.oschina.net/news/62897/docker-hub-contains-high-risk-vulnerabilities Here's a statistic,Docker . Official and individual release of the image due to a variety of reasons, such as the number of loopholes, how can we start from scratch to make a custom image? Yes, look for the official document Http://docs.docker.com/articles/baseimages/, it's clear.The test is as follows: Make a centos image on the centos7 MachineRefer directly to this scripthttps://raw.githubusercontent.com/docker/doc
tags anywhere on the page, and then specify the color, font, border, background, and alignment properties of the blocks, and so on. For example: we create the sitelayout.css file, defined as follows:
. PageHeader(padding:10px;border:1px solid #666;height:100px;height:70px;). Pagenav(padding:10px;border:1px solid #666;height:100px;height:30px;). Catalognav(Float:left;top:130px;padding:10px;border:1px solid
There are two ways to send a shell script:Way 1:sh file.sh arg1 Arg 2 ....Mode 2:read-p "hint" Arg 1 arg2The default parameters are directly separated by a space, following a few examples to explain the problems encountered in the communication and confusionWay one: Show by script instance[[email protected] ~]# cat arg1.sh #!/bin/bashfunchag () {echo $ $2}main () {echo $ funchag $ $2}main $*Test:[[Email protected] ~]# sh arg1.sh 1 2 5 bayi 2[[email protected] ~]# SH arg1.sh 111The script passes,
add a comment using the following command:
Db.sang_collect.update ({name: "The Kingdoms of the},{" $push: {comments: "Good Book 666"}})
The comments field does not exist at this time, and the system automatically creates the field for us, with the following results:
{"
_id": ObjectId ("59f042cfcafd355da9486008"),
"name": "The Chinese Kingdoms",
"author": {
"name": "Ming Dynasty Guanzhong",
" Gender ": Male",
"age"
Tags: exit chown Ash Usage Order Learn permissions special permission bits take effectI. Rights Management1. Types of permissions: r:读权限,对文件来说可以读取里面的内容,对目录来说可以列出目录下的文件。 w:写权限,对文件来说可以修改文件的内容,对目录来说可以创建删除目录下的文件。 x:执行权限,对文件来说可以运行这个文件,对目录来说可以进入这个目录。2. Three categories of users of documents u:属主,表示此文件属于这个用户。 g:属组,表示这个文件属于此组。 o:其他用户。3.chown usageChown change the owner of the file, belong to the group, only with the administrator to use permissions.Usage chown [OPTION] ... [OWNER] [: [
Summary of CSS vertical center method, css vertical center 1. Use containers as table units
. Middle-demo1 {display: table-cell; height: 100px; // The height can be dynamically changed, here is just a demo vertical-align: middle; border: 1px solid #666 ;}
Browser support:Http://caniuse.com/#search=table-cell
2. Vertical center of fixed height Elements
. Middle-demo2 {position: relative; width: 200px; height: 200px; border: 1px solid #
collection to an immutable data type i.e. frozenset () freezes# s = Frozenset ("Barry") # Print (S,type (s)) #frozenset ({' Y ', ' B ', ' A ', ' r '}) Depth copy1 Assignment operations L1 = [ l1l1.append (666)print(L1)print(L2) print(ID (L1), id (L2))#[1, 2, 3, 666][1, 2, 3, 666]24943462409042494346240904 for an assignment operation, L1 and L2 point to
Principle1, offline operation.2, divided into a number of blocks, the interval is sorted by block first, the block is sorted by the right boundary of the interval. The block size is generally sqrt (n).3, according to the sequence of the operation of the interval, continuous interval transfer, update the answer.Topics1, small z socks (hose) HYSBZ-2038Test instructions: There are n socks, the probability of f
(note: Add parameters without SSL security authentication) {' https ': ' http://46.105.214.133:3128 '}curl-m--retry 3-x/http 46.105.214.133:3128-k https://proxy.mimvp.com/test_proxy2.php # https_proxywget-t--tries 3-e "Https_proxy=ht tp://46.105.214.133:3128 "--no-check-certificate https://proxy.mimvp.com/test_proxy2.php# https_proxy # Curl Support Socks # among them, SOCKS4 and SOCKS5 two kinds of protocol agent, can crawl both HTTP and HTTPS Web pa
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.