Intranet Infiltration some commands to collect and organize
=====
Some command to gather information
=====
@ Query Some of the circumstances of this machine
Ipconfig/all
@ Query machines with relationships
Net View
@ Query has several fields
Nei view/damin
@ View the list of computers in the TestDomain domain
NET View/domain:testdomain
@ query groups within a field
NET Group/domain
@ Divide Network Segment
dsquery subnet
@ query users in the domain
N
Many programs in the local area network can be applicable, but between the external network and intranet and between intranet and intranet is not feasible. The problem is NAT, this article will introduce the next 5 Nat penetration method, solve the internal and external network exchange. 1. Fully conical (full Cone) NAT
Host A and Host B in different
The author of the school through ADSL set up routes to share the Internet. The extranet gateway and DNS are 10.0.0.138, the external network port IP address is 10.0 0.1, and the subnet mask is 255.255.255.0. Self-built sites are placed on the server, on the server has been
IIS is installed and set up, and the "Default Web site" IP address points to 10.0.0.1.
In the default state, you can access the extranet, but you cannot access the intranet. If yo
Bkjia.com exclusive Article] Speaking of enterprise network security protection, Internet security technology is mature, such as some firewalls, vulnerability scans, and intrusion detection have been well developed. Many enterprises have emphasized the deployment of Internet security products while ignoring the threat of Intranet security. In many cases, the real threat comes from the internal, and many confidential information leaks are caused by poo
In recent years, network security has become the core content of enterprise network deployment. Intranet is a major component of network applications, and its security has been paid more and more attention. According to incomplete statistics, 15% of the investment in building an intranet outside China is used to enhance the network security of the Intranet. Secur
First, peanut shell installation (before installation needs in the Peanut Shell website registration to get a free domain name, with this domain name, behind the outside network through access to this domain name to achieve SSH login Intranet Linux host)[[email protected] desktop]# wget http://download.oray.com/peanuthull/linux/phddns-2.0.6.el6.x86_64.rpm--2014-10-27 20:11:30--http://download.oray.com/peanuthull/linux/phddns-2.0.6.el6.x86_64.rpmParsin
regional molecular network, that is, the IP phase is different when the subnet mask is not the same.
Add to
Using Command 2
Route Add-p Network Address mask Subnet Mask gateway address
You can add a route that you add to your path in a permanent route (also known as a static route)
Use the command effect chart as follows:
Delete
Using Command 3
Rotue Delete network Address
You can delete a route
In general, the system will automatically add a static route to all the networ
Apt Local source build (can be used for LAN Apt-get source or local source) This document describes the use of Apt-mirror software to build apt local source requirements: Intranet development environment for its specific reasons can not Sisu network, So we need the local intranet source to make it easy for developers to download and install software recommendations: Use a single disk to store source files o
Because the company in the computer room hosting server IP is not enough, but also for security considerations, so that a number of virtual nodes can not directly access the Internet, so I xenserver physical nodes through the use of iptables NAT function made a simple implementation
[Root@xenserver-cukxsegi ~]# sysctl net.ipv4.ip_forward=1 #开启转发[Root@xenserver-cukxsegi ~]# Echo ' net.ipv4.ip_forward=1 ' >>/etc/sysctl.conf #让重启不失效[Root@xenserver-cukxsegi ~]# iptables-p FORWARD DROP #将FORWARD链的策略
Reference Address: http://www.nat123.com/Pages_8_266.jspThe methods in this article are as follows:(1) Install and enable nat123 on the intranet, add mappings, and use other app types. Intranet address port is the LAN MSSQL address port, the network address port customization.(2) After the mapping succeeds, the external network access connection MSSQL uses the mapped extranet address domain name port. Note
A simple introduction of squid
Through Squid Proxy server to achieve intranet users to share the Internet, configure Squid cache and basic access control to accelerate and restrict access to Web services.
For web users, squid is a high-performance proxy caching server that speeds up the intranet browsing the Internet and increases the client's access hit rate. Squid not only supports HTTP protocol, but al
Objective:Sometimes we want to access the local area network SQL Server server, such as test environment database in the company intranet, back home or at the customer site to connect to the database in the intranetThe first step: if you can connect to the local area network database 192.168.150.129, remote also can connect itThe second step: Add a TCP port in the intranet pangolin, the IP of the local IP,
1. Overview of Intranet Security
After the 21st century, with the rapid increase of information technology in China, the Intranet Information security has received more and more attention. In just a few years, Intranet security products and vendors have emerged. However, it is worrying that although many products and vendors provide services with the concept of
I once saw an article on the Internet that introduced a method for direct access to the intranet. In fact, we only need to use the port ing tool to easily penetrate the intranet. Port ER is a tool like this. it is even more worth mentioning that it breaks away from the command line mode and provides a graphic interface operating environment. I. basic ideas
I once saw an article on the Internet that introduc
The existing server can access both inside and outside the network, can also be accessed by the extranet, binding the domain name. Intranet has a Web site to allow users to access the network (assuming the user killed without a VPN), as follows.
Intranet site address such ashttp://192.168.1.2/index.phpWhen an extranet user accesses my server http://mydomain.me/index.php , they can see and operate the same
NAT analysis (intranet users access the server through domain names) 1. environment hypothesis: the private network address of the Intranet server is 192.168.2.20., port 80 of the server is mapped to port 80 of port 202.101.1.1, and the domain name www.sina.com is applied. The IP address of the Intranet PC is 192.168.2.2, now we configure the following command on
Sandbox), also known as Sandbox, is one of the most widely used technologies in the information security field in recent years. Google Chrome and MS Office2010 all use sandbox technology to improve their security. In the current IT field, Sandbox technology is widely used in the anti-virus software industry. For example, IT is used for virus experiments and various sandbox Security modes in user applications.
So what is sandbox technology? Simply put, sandbox is an "environment" that provides a
Duang~~~ has industry insiders, peanut shell intranet version will be online more than a router? If the message is true, then the user with the intranet IP address can be completely through the router settings to solve the remote access and management problems.Is the message true?According to small understanding, early in 2013, the peanut shell has been resolved in the
Refer to http://www.centoscn.com/CentosServer/dns/2014/0113/2355.html keepalive high-availability modeThis scheme is only suitable for small businesses, in the case of low-scale use, the resolution of a large amount of time or bind the best.If you add Local intranet own domain name hijacking resolution, simply add the parse record in the installed DNSMASQ/etc/hosts and restart DNSMASQ to take effect.Common Enterprise IT Support "5,
Today, under the Linux server encountered a strange problem: The network domain name ping results and nslookup results inconsistent, the resolution process is recorded as follows.
Confirm that the/etc/resolv.conf configuration is correct: no problem;
Confirm if additional domain name is added in/etc/hosts: no problem;
Confirm the correct IP address in the domain name server, and colleagues confirm that the intranet domain name has bee
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.