▍1. TCP-IP-protocol
主要介绍了TCP/IP协议,以及IP协议的ARP地址解析.(Introduces the TCP/IP protocol, and IP Address Resolution Protocol ARP.)
主要介绍了TCP/IP协议,以及IP协议的ARP地址解析.(Introduces the TCP/IP protocol, and IP Address Resolution Protocol ARP.)
基于TCP的简单木马,取对方系统信息,将对方鼠标左右对调等(Simple TCP-based Trojan, take the other system information, such as the mouse around each swap)
Modbus TCP/IP通信开发说明以及源代码,仅供参考(Modbus TCP/IP communications development as well as source code, for reference)
驱动级域名劫持 就是访问A.com转到b.com,当然如果改成访问A就丢包,那就变成拦截指定网站了。首先用抓包工具发现,访问某网站时,(如果本地没有该网站的DNS缓存)首先会发DNS查询包(UDP),然后会与该网站建立连接,然后,发http请求包。 观察包内容,需要把发出的包的目标改成我们的目标,然后把响应的包中我们改过的东西改回来,就是欺上瞒下。代码不多,重点是演示了如何获取TCP与UDP的接收到包的内容。仅适用于XP: bin会将www.baidu.com劫持到ip138.com(Drive level domain hijacking is to visit A.com to b.com, of course, if A is dropping into access, it becomes blocked designated site. First discovered by capturing tool, visit a website, (if there is no local DNS cache of the site) will first send a DNS query packets (UDP), then establish a connection with the site, and then send http request packet. Observe the contents of the package, we need to change the target packet sent our goal, then put the package in response to the things we turn to come back, that is, superiors and subordinates. Code much focus is to demonstrate how to get the contents of TCP and UDP packets received. Only applies to XP: bin will www.baidu.com hijacked to ip138.com)
驱动级域名劫持 就是访问A.com转到b.com,当然如果改成访问A就丢包,那就变成拦截指定网站了。首先用抓包工具发现,访问某网站时,(如果本地没有该网站的DNS缓存)首先会发DNS查询包(UDP),然后会与该网站建立连接,然后,发http请求包。 观察包内容,需要把发出的包的目标改成我们的目标,然后把响应的包中我们改过的东西改回来,就是欺上瞒下。代码不多,重点是演示了如何获取TCP与UDP的接收到包的内容。仅适用于XP: bin会将www.baidu.com劫持到ip138.com(Drive level domain hijacking is to visit A.com to b.com, of course, if A is dropping into access, it becomes blocked designated site. First discovered by capturing tool, visit a website, (if there is no local DNS cache of the site) will first send a DNS query packets (UDP), then establish a connection with the site, and then send http request packet. Observe the contents of the package, we need to change the target packet sent our goal, then put the package in response to the things we turn to come back, that is, superiors and subordinates. Code much focus is to demonstrate how to get the contents of TCP and UDP packets received. Only applies to XP: bin will www.baidu.com hijacked to ip138.com)
本代码为描写TCP监控流量的一些方法,例如设置过滤器等等简单功能。利用WAPCAP来完成(The code for the TCP traffic monitoring methods described, for example, set up filters so simple functions. Use WAPCAP to complete)
本代码为描写TCP监控流量的一些方法,例如设置过滤器等等简单功能。利用WAPCAP来完成(The code for the TCP traffic monitoring methods described, for example, set up filters so simple functions. Use WAPCAP to complete)
能够对IP地址的合法性进行判断以及相应的子网(Able to judge the legitimacy of the IP address and the corresponding subnet)
能够对IP地址的合法性进行判断以及相应的子网(Able to judge the legitimacy of the IP address and the corresponding subnet)
MC55 TCP 使用方法,介绍如何使用MC55的TCP过程,有兴趣的可以下载来看下。(MC55 TCP use, how to use the TCP process MC55, are interested can download look down.)
MC55 TCP 使用方法,介绍如何使用MC55的TCP过程,有兴趣的可以下载来看下。(MC55 TCP use, how to use the TCP process MC55, are interested can download look down.)