dried food! Summary of common methods of Intranet penetration

Gongzong No.: Black palm A blogger who focuses on sharing penetration testing, hot spots in the hacker circle and hacker tool technology area! preface During intranet penetration, a WebShell or CobaltStrike, Metasploit, etc. are just the beginning. It is more about moving horizontally within the intranet, expanding the results and reaching ...

Posted by Crashin on Sat, 15 Jan 2022 23:04:25 +0100

Computer network -- network layer

Self use ~ do not spray 4.1.1 overview of network layer functions *Overview of network layer functions The packet is transmitted from the source end to the destination end to provide communication services for different hosts in the packet switching network *Network layer functions 1.Routing and forwarding 2.Heterogeneous network int ...

Posted by Panthers on Sun, 09 Jan 2022 09:51:40 +0100

HCIA/HCIP uses eNSP to simulate BGP group attribute policy configuration instances

Simulate BGP group attribute policy configuration instance using eNSP Problem elicitation As shown in the figure There are two user network segments in AS 300 When users in AS 100 access these two network segments It is hoped to realize traffic sharing on R2 and R3 When AS 200 accesses these two network segments It is hoped that traf ...

Posted by gth759k on Mon, 03 Jan 2022 10:14:37 +0100

Computer network -- Cisco Packet Tracer experiment

Computer network -- Cisco Packet Tracer experiment This experiment is based on Chess song teaching network complete There are 15 experiments in this part, which need to be completed by Cisco packet tracker software. Please first understand the concepts of VLSM, CIDR, RIP, OSPF, VLAN, STP, NAT and DHCP to enable network planning and configur ...

Posted by chuddyuk on Mon, 03 Jan 2022 04:54:53 +0100

Java network programming

Introduction to network programming software structure C/S structure: the full name is Client/Server structure, which refers to client and server structure. Common programs include QQ, Xunlei and other software. B/S structure: fully known as Browser/Server structure, it refers to browser and server structure. Common browsers inclu ...

Posted by BarmyArmy on Sat, 25 Dec 2021 02:06:55 +0100

EVPN Configuration Instance - EVPN Distributed Gateway

Today we will introduce the related content of EVPN. Using Huawei eNSP simulator as a tool, this paper designs and implements a typical EVPN application scenario for configuring distributed gateways, and completes the corresponding configuration. Read this article, you need to know something about EVPN. If you are still confused about it, you a ...

Posted by MikeFairbrother on Fri, 24 Dec 2021 11:54:15 +0100

Design pattern learning - using go to implement visitor pattern

Visitor mode definition advantage shortcoming Scope of application code implementation What is Double Dispatch reference resources Visitor mode definition Visitor pattern: represents an operation that acts on elements in an object structure. It allows you to define new operations on these elements without changing the element class. Using ...

Posted by kungfu71186 on Fri, 26 Nov 2021 20:16:10 +0100

Transmission control protocol TCP

Transmission control protocol TCP The ultimate purpose of transport layer protocol is to provide reliable end-to-end transmission of data TCP is a connection oriented protocol, because it will initiate a formal connection before transmitting data to track the delivery of data packets. When the transmission is about to end, he will officiall ...

Posted by google_man2000 on Fri, 26 Nov 2021 04:32:22 +0100