Gongzong No.: Black palm A blogger who focuses on sharing penetration testing, hot spots in the hacker circle and hacker tool technology area!
During intranet penetration, a WebShell or CobaltStrike, Metasploit, etc. are just the beginning. It is more about moving horizontally within the intranet, expanding the results and reaching ...
Posted by Crashin on Sat, 15 Jan 2022 23:04:25 +0100
Self use ~ do not spray
4.1.1 overview of network layer functions
*Overview of network layer functions
The packet is transmitted from the source end to the destination end to provide communication services for different hosts in the packet switching network
*Network layer functions
1.Routing and forwarding
2.Heterogeneous network int ...
Posted by Panthers on Sun, 09 Jan 2022 09:51:40 +0100
Simulate BGP group attribute policy configuration instance using eNSP
As shown in the figure There are two user network segments in AS 300 When users in AS 100 access these two network segments It is hoped to realize traffic sharing on R2 and R3 When AS 200 accesses these two network segments It is hoped that traf ...
Posted by gth759k on Mon, 03 Jan 2022 10:14:37 +0100
Computer network -- Cisco Packet Tracer experiment
This experiment is based on Chess song teaching network complete
There are 15 experiments in this part, which need to be completed by Cisco packet tracker software. Please first understand the concepts of VLSM, CIDR, RIP, OSPF, VLAN, STP, NAT and DHCP to enable network planning and configur ...
Posted by chuddyuk on Mon, 03 Jan 2022 04:54:53 +0100
Introduction to network programming
C/S structure: the full name is Client/Server structure, which refers to client and server structure. Common programs include QQ, Xunlei and other software.
B/S structure: fully known as Browser/Server structure, it refers to browser and server structure. Common browsers inclu ...
Posted by BarmyArmy on Sat, 25 Dec 2021 02:06:55 +0100
Today we will introduce the related content of EVPN. Using Huawei eNSP simulator as a tool, this paper designs and implements a typical EVPN application scenario for configuring distributed gateways, and completes the corresponding configuration. Read this article, you need to know something about EVPN. If you are still confused about it, you a ...
Posted by MikeFairbrother on Fri, 24 Dec 2021 11:54:15 +0100
Scope of application
What is Double Dispatch
Visitor pattern: represents an operation that acts on elements in an object structure. It allows you to define new operations on these elements without changing the element class.
Posted by kungfu71186 on Fri, 26 Nov 2021 20:16:10 +0100
Transmission control protocol TCP
The ultimate purpose of transport layer protocol is to provide reliable end-to-end transmission of data
TCP is a connection oriented protocol, because it will initiate a formal connection before transmitting data to track the delivery of data packets. When the transmission is about to end, he will officiall ...
Posted by google_man2000 on Fri, 26 Nov 2021 04:32:22 +0100