This is a creation in
Article, where the information may have evolved or changed.
Article keywords
Go/golang
Gopacket
Grab Bag
Pcap/libpcap
Arp
Nbns
MDNs
Manuf
Program
Description
This article for the go language itself is not too much to explain, want to spend more time on a few network protocol explanation, I hope this article on the plan or are using go for TCP/IP programming and grasping the package of friends to bring help.GitHub Address: Https://github.com/t
Bkjia.com integrated message: at present, network boundary security protection cannot effectively protect network security. Only border security and Intranet Security Management three-dimensional control is the way out.
Intranet security focuses on internal network users, application environments, application environment boundaries, and Intranet Communication Se
The nst bounce backdoor cannot be used for su interaction after connecting to nc. the following error is returned:Standard in must be a ttySolution:Python-c import pty; pty. spawn ("/bin/sh ")The shell can be used for su interaction.
Ps: Several noteworthy cases encountered in the recent penetration test, which are recorded as follows:
1. history is not recorded:Unset history histfile histsave histzone history histlog; export HISTFILE =/dev/null; export HISTSIZE = 0; export HISTFILESIZE = 0
2. h
We recommendProgramDedicated search engine-http://www.openso.net
Point-to-point technology has been widely used in recent years, mainly represented by QQ, Skype, BT, Thunder, PPStream, PPLIVE, qvod. We can see that as long as the data volume is large, and the use of transit servers requires a certain amount of input applications, we can consider using P2P technology. There are two benefits: 1. It can reduce costs and investment. 2. Improve transmission performance. There are a lot of materi
Practice of SSH Intranet port forwardingGuideAs we all know, SSH is a secure transmission protocol, which is used on many connected servers. However, in addition to this function, its tunnel forwarding function is even more attractive.
If the linux servers between the two Intranets need to log on to each other, or need to access a port in the Intranet, worry that there is no public IP address, you can use n
Use OPENVPN to implement Intranet mutual access between two locations (1) master server configurationMaster Server Configuration
Functions to be implemented:
Shenzhen:Master VPN Server: dns.dog.comInternet ip-eth1: 192.168.68.71Intranet ip-eth0: 10.1.1.254Guangzhou:VPN Server: lvs1.dog.comInternet ip-eth1: 192.168.68.73Intranet ip-eth0: 10.1.2.1Clients outside China:192.168.68.79Shenzhen-Guangzhou tunnel uses virtual IP addresses 10.8.0.1 and 10.8.0.
As more and more Linux servers are installed on the Intranet, you must upload the installation disk to install software on each server. It is troublesome and time-consuming to configure the local yum service. You can install the yum service on a Linux server on the Intranet, and then other servers can directly modify the repo file to use the yum service. Configuration http://www.linuxidc.com/Linux/2013-08/8
Many of the calling resources (databases, web interfaces, etc.) in the intranet environment of the company are mapped by domain name-IP through the intranet DNS service.However, when the DNS mappings are changed, the resources connected in the application are not changed.Previously, it was generally considered that the Linux DNS cache resulted in a complete analysis today, with the following results:1. Cach
Intranet penetration-domain penetration Basics1. Domain environment construction + recognition domain + experiment environment
1. Preface:I have always wanted to penetrate the domain, but unfortunately I have not met a good domain environment. I have read many articles about Domain penetration by others. So I set up my own environment to test ...... [This is the gap between diaosi and Gao fushuai.
Learn what domains are from building them. Then I lear
Amazing technology: using php socket5 proxy for Intranet penetration testing
During penetration testing, we often encounter webshells, but webserver provides web services through web port ing on the Intranet. If you have protection software that causes abnormal server permissions, you cannot create socket proxy and port forwarding. At this time, if you want to penetrate the
Configure routes in windows to solve the problem of simultaneous disconnection between the Intranet and the Internet
This is the most basic network knowledge, but I encountered this problem a few days ago and found that I almost forgot it. I will write it down here.Basic Principles
First, the first two images
Set the Network Packet Flow under the correct route
There are two default route settings for the Network Packet Flow
When your computer is c
A website in sogou is incorrectly configured and directly posts data to the Intranet.
A website in sogou is incorrectly configured and directly posts data to the Intranet.
CVE-2014-3393, Cisco Adaptive Security Appliance (ASA) Software has Security vulnerabilities in the implementation of the Clientless ssl vpn entry custom framework, unauthenticated remote attackers can exploit this vulnerability to modify
Guangxi Education and Training Network Arbitrary File Upload from getshell to intranet fall
Guangxi Education and Training Network Arbitrary File Upload from getshell to intranet fallDetailed description:
Http ://**.**.**.**/First, googleSite: **. ** adminExpected result: http: // **. **/bbs/toplist. jsp? Page = 1 orders = 7It contains all user namesNew users are added every day.Site: **. ** filetype: doc
From FoolishQiangblog
Some people often ask me this question "how to enter the intranet" and how to answer it. In summary, it is a sentence "break through the gateway and use port redirection to enter the intranet ".
The first choice is to break through the gateway (GetWay), which is easy to understand, because an intranet must always access the internet through
Bilibili Intranet roaming: redis obtains the root permission
I pretended to listen to a port on VPS, and then suddenly rebounded to a shell. Well, I pretend I don't know which month a crontab backdoor brought me into Bilibili's intranet again.There are many unauthorized redis access in the Intranet. Why not ask magic conch?Detailed description:
I pretended to lis
Teamviewer vpn + win7 vpn create a remote access to the Intranet environment1. teamviewer vpn is the simplest. Select vpn as follows. However, you must select this feature when installing teamviewer.Connect and remember the partner ip address.2. Set up an "incoming connection" for the Intranet PC in win7 vpn ".Create a vpn connection on an Internet computerThen you will find that the connection is on, and t
ExploitationIptablesSetInternetPort allIngToIntranetThe specific operation process is as follows:
Etc/init. d/iptables start iptables
Initialize iptables and delete previous rules,
Iptables-F
Iptables-X
Iptables-Z
Iptables-F-t nat
Iptables-X-t nat
Iptables-Z-t nat
Allow SSH access, or you will not be able to access it later.
Iptables-a input-p TCP -- dport 22-j ACCEPT
Set Default inbound and outbound rules
Iptables-P INPUT DROP
Iptables-P OUTPUT ACCEPT
Iptables-P FORWARD ACCEPT
Iptables-a input-
Laptop Intranet/Internet (Wireless and Local Network) preferred, laptop order
I. Problems
Work needs. You need to switch between the Intranet and Internet every day. The intranet is Wireless wifi, and the Internet is connected by a network cable. When the network cable is connected to the computer at the beginning, the local connection is used by default. Ev
Recently, I was working on an internal knowledge base system, requiring that it can only be used in an Intranet environment. I virtualized a server on a physical server. After installing the CentOS6.4 system, during environment deployment, it is found that the system is installed with minimal installation. Many Development Kits are not installed. However, the server cannot access the Internet and cannot use the Internet yum source to install the softw
"Go" CentOS5.6 Configure rsync Intranet synchronization data to the external networkThis article transferred from: http://www.linuxidc.com/Linux/2012-06/64070.htmFirst, the demandGuard there is a demand, is to put an intranet server data synchronization to a server outside the network, I used to be RSYNC+INTIFY-TOOL+SSH implementation of real-time synchronization updates, the other day I was in Dongguan on
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.