ftp is an acronym for File Transfer Protocol, and File Transfer Protocol , a standard protocol for file transfer over the network, using a client / server model. It belongs to the application layer of the network transmission protocol.
Learn more ftp
lftp: is a lightweight file transfer tool, is a Unix-like system command-line interface FTP client software
sftp is an abbreviation SSH File Transfer Protocol, Secure File Transfer Protocol ;
vsftp is based on the use of GPL release of Unix-like systems ftp server software , which stands for Very Secure FTP can be seen from the name, the original intention of those who are prepared security code;
for more vsftp
vsftpd is very secure FTP daemon acronym, security is one of its greatest feature. vsftpd is the name of the server running on a UNIX-like operating system that can run on, such as Linux, BSD, Solaris, HP- UNIX systems above, is a completely free, open source ftp server software;
for more vsftpd
ping [options]
; -s SIZE default 64bytes, optional 128 , 136 , ... - long ping each W TIME, for a response wait timeout - W duration of the TIME command ping timeout -C ping number of ping
hping3 package
Send tcp / ip packet - fast fast - Faster Faster than fast - iu # how often a ping u microseconds - Flood AS AS Possible fast traceroute trace route, the number of routers from one host to another through an intermediate host
wget
- B background downloading, download the script - A logfile -q quit silent mode - do not display the download progress -O file saving location - to download directory HO - P downloaded to any filename directory -c HTTP --progress = DOT | bar represents progress --limit-rate = 100k designated speed file transfer -i file reads the URL from the file, batch download
nmap, ncat, tcpdump tool
nmap command
Role: host discovery, port discovery / enumeration, service discovery, OS version and hardware detection
root, default to TCP SYN (-sS) scan mode, semi-open scanning
nmap options delimitation address
Options
-sL scan the list of hosts
# nmap -sL 192.168.1.1/24
-exclude IP / FILE exclude IP or IP file
# nmap -sL 192.168.1.1/24 -excude 192.168.1.2
-p #, #, # port scans
nmap -p22,80 192.168.1.1/24
-sS TCP SYN scan default half-open, two-way handshake, forced off, the other hosts will not record
-sT establish a TCP connection, it will be performed three times, four times off
-sU UDP port scanning, ICMP unreachable error message is returned, indicating that the port is closed, if correct an appropriate response, indicating that the port is open.
-sF FIN packet transmission scan (scan to avoid a firewall blocking syn)
-sP to ping way to find out whether there is a host. ping HOST
-sV scan version. Do not scan for open ports, only after scanning port, that port open, and scan, scan for open ports corresponding software program for open ports
-sL HOST hide the original IP
-O scan the target host operating system
-PN avoid remote firewall blocks ping, ping operating ban
Address delimitation
1、FQDN
# nmap www.baidu.com
2、IP
# nmap 192.168.1.2
3, the network
# nmap 192.168.3.0/24
4, range
# nmap 192.168.1.1-192.168.1.100
5 list, file
# nmap -iL /PATH/TO/SOMEFILE
ncat command
The default ncat connected mode, tcp
Connection mode and listening mode
Connection mode:. Ncat connect as a client host, Post host must provide, Port default is 31337.
ncat host port
Listening modes: server .host / post as the server bindings. The default host for all addresses. The default port is 31337
ncat [options] host port
-l listen listening
The maximum number of concurrent -m --max-conns NUM of access ncat
-k --keep-open support concurrent access in Listen mode
-c, --sh-exec <command> Run
HOST the --allow access control, allowing only access is given ncat HOST
A and B exchange
Server A: # ncat -l 8888
Client B:# ncat 192.168.1.1 8888
Transfer files A and B
Server A:# ncat -l 8888 < file.txt
Client B:# ncat 192.168.1.1 > file.txt
Server A:# ncat -l 8888 > file.txt
Client B:# ncat 192.168.1.1 < file.txt
A and B transfer directory
Server A: # tar cf - dir | l ncat 8888
Client B:# ncat 192.168.1.1 8888 | tar xf -
Save bandwidth:
Server A: # tar cf - dir | q xz -9 | l ncat 8888
Client B:# ncat 192.168.1.1 8888 | tar Jxf -
A transport encryption and B
Server A:# nc localhost 1567 | mcrypt –flush –bare -F -q -d -m ecb > file.txt
Client B:# mcrypt –flush –bare -F -q -m ecb < file.txt | nc -l 1567
Video stream
server to read the file redirection ncat: cat file.avi | ncat -l 8888
Redirect client socket to read data from the mplayer ncat 192.168.1.1 8888 | mplayer -vo x11 -cache 3000 -
clone
dd if=/dev/sda | ncat -l 8888
ncat 192.168.1.1 8888 | dd of=/dev/sda
tcpdump command
dump the traffice on a network
Display capture packets content
- I IFACE - L buffered output lines - n-converted data to the default name, numeric - . N is not fully qualified domain name of the print format Lcc.org only show complete LCC - P interface in promiscuous mode is not - Q output less information -v, - VV output more detailed information - TT print unformatted time - W file packet saved to a file
src, dst, port, host, net, ether, gateway filtering options
src source host IP
dst target host IP
port port
host display only the information related to the host
net network-related
gateway for the host gateway
Source installation tcpdump
1, depending libcap libraries installed
2, the compiler environment: gcc, glibc, autoconf, automake