Tag:data packet

  • Problems and solutions caused by the introduction of routing in HCNP Routing & Switching

    Time:2022-3-19

    Previously, we learned about the topics related to routing introduction. For review, please refer tohttps://www.cnblogs.com/qiuhom-1874/p/15359902.html; Today, let’s discuss the problems caused by the introduction of routing and the solutions to avoid such problems; Default priority of each routing protocol in the IP routing table Tip: the above is the priority of each routing protocol in […]

  • Capture packets with tcpdump tool

    Time:2022-3-19

    Tcpdump is a network packet interception and analysis tool on Linux platform, which supports filtering for protocol, host, network port, port, etc. And you can use and, or, not and other logical statements to combine the filters to achieve targeted interception. 1. Monitor the specified network port Use the – I parameter to specify the […]

  • Sniff and then spoof programming under Linux

    Time:2022-3-15

    Sniff and then spoof programming under Linux 1、 Task description In this task, you will combine sniffing and spoofing techniques to implement the following sniffing and spoofing programs. You need two machines on the same LAN. Ping IP from machine a_ 10. This will generate an ICMP echo request package. If host IP_ If x […]

  • How to use traceroute

    Time:2022-3-15

    Through traceroute, we can know the path of information from your computer to the host at the other end of the Internet. Of course, every time a packet arrives at the same destination from the same source, the path may be different, but basically the route is the same most of the time. In Linux […]

  • Ping and traceroute principle

    Time:2022-3-14

    Ping principle Ping is mainly used to detect whether the host can communicate with the host. If you can’t Ping a host, it means you can’t establish a connection with the host. Ping uses ICMP Protocol. It sends ICMP echo request message to the destination host. ICMP Protocol stipulates that the destination host must return […]

  • Kali Linux cracking WiFi password (no external network card)

    Time:2022-3-3

      Environment preparation: mode 1 (select this mode): Kali Linux, one laptop, USB flash disk (at least 8G) mode 2: Kali Linux, external network card, one laptop, VM   In particular, it is mainly used to crack mode 1. If there is an external network card, it is very simple. You can directly use itVM can […]

  • Packet capture analysis of Wireshark simple protocol

    Time:2022-3-1

    IExperimental purpose HTTP、TCP、UDP、ICMP、ARP、IP、FTP、TELNETQuery analysis Basically master the use of query commands IIExperimental environment Hardware environment: one windows7 system and one XP system Software environment: VMware Workstation pro, Wireshark >Windows7 system IP: 192.168.220.129 >XP system IP: 192.168.220.130 IIIExperimental steps Get HTTP protocol packet Get TCP protocol packet Get UDP protocol packet Get ICMP Protocol packet Get […]

  • Technology sharing | sudden master-slave replication delay of MySQL

    Time:2022-2-28

    Author: Liu Kaiyang Beijing DBA, the delivery service team of aikesheng, has a strong interest in learning database and surrounding technologies, likes reading books and pursues technology. Source: original contribution *It is produced by aikesheng open source community. The original content cannot be used without authorization. For reprint, please contact Xiaobian and indicate the source. […]

  • DDoS attack

    Time:2022-2-27

    IExperimental purpose Understand the principle of DDoS attack Attack with tfn2k IIExperimental environment System environment: Windows environment, Kali environment Software environment:TFN2K IIIExperimental principle DDoS attack principleThe English meaning of distributed denial of service attack is distributed denial of service (DDoS). It uses a large number of DOS service programs installed on different high bandwidth hosts […]

  • ARP Spoofing and man in the middle attack

    Time:2022-2-25

    1、 Experimental purpose Master ARP Spoofing Attack Master the whole process of ARP Spoofing Attack Learn to prevent ARP Cheating 2、 Experimental environment System environment: Windows environment, Kail environment, XP environment Software tool: packeth 3、 Experimental principle ARP cache 1. There is an ARP cache table in each computer installed with TCP / IP protocol. […]

  • Qnet network test tool

    Time:2022-2-22

    1、 What is qnet Qnet Tencent wetest open platform recently launched a weak network testing tool qnet for mobile applications, which solves the pain point of special weak network testing on Android devices. Qnet does not need a root phone or a data cable. It provides users with fast, reliable and fully functional weak network […]

  • [network programming] 3 Using packet grabbing to verify TCP three-time handshake

    Time:2022-2-22

    Wireshark packet capture tool Set the capture filter to the IP address of the target server host 139.196.92.199 Send MySQL connection request to the server: You can see the caught bag: Set the display filter to exclude MySQL messages and only look at TCP messages !mysql || tcp The first three times are the three […]