12.34.56.78)$./Pf-c 3389-c 12.34.56.78: 2000Connect to port 3389 of the Local Machine and connect it to port 2000 of 12.34.56.78.Next, run pf on the machine 12.34.56.78 on the Internet:$./Pf-l 2000-l 5000Accept the connection from the external header to port 2000 and connect the connection to port 5000.In this case, y
Scan Tool-burpsuiteBurp Suite is one of the best tools for Web application testing and becomes the Swiss Army knife in web security tools. Its various functions can help us carry out a variety of tasks. Request interception and modification, Scan Web application vulnerability to brute force login form, perform various random checks such as session tokens. "As a h
Small Web Application Scan Tool Grabber Grabber is a Web application Scanning Tool integrated with Kali Linux. This tool is suitable for small and medium Web applications, such as personal blogs, forums, etc. The tool is written i
, record all requests and parameters, and analyze how the scan software determines whether a vulnerability exists.6. modify the vulnerability reported by the scan software. in my personal experience, this should be because the parameter you passed does not have intval.7. disable the mysql error prompt to prevent error injection.Prevention1. add global SQL keyword filtering to the program2. enable PHP single
Arachni is a versatile, modular, high-performance ruby framework designed to help infiltrate testers and administrators evaluate the security of Web applications. At the same time Arachni open source is free, can be installed on Windows, Linux and Mac systems, and can export evaluation reports.First, Arachni download and start, take the Linux environment as an example: http://www.arachni-scanner.com/downloa
Oracle Service Scanning Tool Oscanner Oracle is a relational database launched by Oracle for large-scale data storage such as large enterprises, telecommunications, banking and other industries. Kali Linux integrates the Oracle Service Scan specificity tool Oscanner. The tool
First of all, standing on the shoulders of giants, the first half is the previous article. I am lucky to be guided by this article, set successfully, and pass the test. The second part is the configuration of the serial port tool. Original address:
First of all, standing on the shoulders of giants, the first half is the previous article. I am lucky to be guided by this article, set successfully, and pass th
Linux Scan Technical NotesPrefaceHost node of the survival of the detection method, we use the most daily is the ping, in addition to other methods? This article describes fping,hping related operations to detect node survival.The survival of the service, our daily use of the most is Telnet, in addition to other ways? This article describes the detection of Nmap,ncat for service survival.In addition, this a
NMap, also known as NetworkMapper, is a network scanning and sniffing toolkit in Linux. It has three basic functions: one is to detect whether a group of hosts are online, and the other is to scan host ports, network Service provided by sniffing; the operating system used by the host can also be inferred. Nmap can be used to scan networks with only two nodes and
Article title: Linux bot scan (figure ). Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems, open source, and some other basic categories. many Cainiao are repeatedly playing 3389 bots. after a long time, they will naturally g
Many network services use Linux systems and have Apache Server software installed. Vulnerable to hackers using Nmap to scan Web sites, now share a precautionary experience.I can pass the setup, let Linux on Nmap scan ignore color. The iptables tool is used to filter the netw
First Xie Mu class net/*** Linux System scanning technology ** Host scan, route scan, batch service scan, system security Policy (anti-SYN and DDoS attack) *//*** Host Scan* Ping fping hping ** fping* Fping Installation* Download:* (mkdir/services cd/services)* Wggethttp://
Grab Bag Tool tcpdump[email protected] conf]# which tcpdump/usr/sbin/tcpdump[Email protected] conf]# Rpm-qf/usr/sbin/tcpdumpTcpdump-4.0.0-5.20090921gitdf3cb4.2.el6.x86_64[Email protected] conf]#tcpdump [Options] [filter conditions]Common monitoring options-I, specifying the network interface for monitoring-A, converted to acsii code for easy reading-W, saving the packet information to the specified file-R to read packet information from the specified
Linux systems use Arp-scan to check for IP address conflictsIf the IP address planning is not good, even if there is a unified IP address will make mistakes! Recommended server IP address use to register details, the last computer room batch deployment server, will have been reused IP and assigned to another server, fortunately, the business has not caused great impact.So when configuring IP for the server,
This article about multithreading tools, is very suitable for novice learning, tool efficiency is also very high, the code is relatively perfect, title.
This article I spring signed writer--aedoo
0x00 PrefaceI published the original article some time ago, "[Python hacker] python hand-taught you to build your own multi-threaded batch Tool", received a lot of heat assessment, Portal:Https://bbs.
Last night, I wrote two nights, I finally finished the PY Port Scanner, which is called the 0.1 version, is a Python multi-line Cheng scan tool.
The level is limited, the truth there are some confusion and puzzled place, the code may also write more chaotic. Some problems have not found a good solution, but also hope that we understand. Speed everyone to experim
port directly, the device name is usually/dev/ttyS ?, It is generally/dev/ttyS0. Bps/Par/Bits item 232 serial port configuration
115200.
Note: Here, item F is the default value of the Hardware Flow Control item. This will make it unavailable after the serial port connection. If the input is unavailable, modify item F to no.
II. DNW usage
The development software
Introduction to NC commands
NC process is netcat is a common network tool (the Swiss knife of the network); NC communication reads and writes data through TCP/IP protocol,
Can be TCP, UDP after network link communication.The most reusable function of the NC scan Port NC is to scan the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.