Overview
This article discusses how to query the TCP/IP protocol stack of a host to collect valuable information. FirstFirst, I enumerated several "classic" operating system identification methods outside the stack fingerprint. And thenI described
The internet is undoubtedly the greatest design in human history, connected with hundreds of millions of of computers and communication devices around the world, even when users on both ends of the globe can communicate in a single instant.It can be
The internet is undoubtedly the greatest design in human history, connected with hundreds of millions of of computers and communication devices around the world, even when users on both ends of the globe can communicate in a single instant.It can be
Document directory
HTTP (Hypertext Transfer Protocol)
FTP (file transfer protocol ):
Email Service
DNS (Domain Name System)
TCP three-way handshake
TCP broke up four times
The application layer protocol defines how application processes in
Document directory
TCP Packets
UDP Packets
UDP name server responses
Tcpdump: Dump traffic on a network is used to intercept data packets on the network. Different data packets can be intercepted based on specified network interfaces. It will
The English original intention is the dump traffic on a network, namely intercepts the network the datagram, may intercept the different datagram according to the specified network interface . It outputs a description of the content of the report
Port Scan path:What is a scanner?A scanner automatically detects remote or local host security vulnerabilities.ProgramBy using a scanner, you can discover the distribution of various TCP ports on the remote server and the services provided and their
Recently, there has been a kind of voice, that is, "learning needs to be fragmented". The main consideration is that the pace of work and life is accelerating, and it is difficult to have a long period of time for special study. For this reason,
The following describes the usage of the tcpdump command in Linux. For more information, see dumptrafficonanetwork, different data packets can be intercepted based on the specified network interface. It will output the description of the report
I,DNS System
1. DNS authorization:
The Network Information Center Nic is responsible for allocating the top polar domain and assigning authorization institutions to other designated regions. An independently managed DNS subtree is called a region.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.