Network and Information Security Practices

nights ~

ping

Packet Internet Group

  • Detecting communication network
  • Detecting packet loss or retransmission of the assignment, damage
  • Detection time stamp and round-trip time
1
2
-t renld.cn of ping 
of ping 151.101 .100 .133 -l 1560 # sets the length

tracert

Traceroute IP data to obtain data from the local to the target host

Some routers for security is not visible, display* * *

1
2
3
tracert renld.cn

-d renld.cn trecert # does not have to resolve to a host name

ipconfig

Check the TCP / IP network configuration

1
2
ipconfig # basic
ipconfig /all

netstat

Display the currently active TCP, port, routing table information

Port occupancy inquiry, to find out whether the port is open the machine implanted Trojan horses or other hacker program

1
netstat -n -o

arp

Ip address resolves to the mac address

Instead of using arp NDP IPVA

1
2
3
4
-a arp # all interfaces ARP cache
arp -a 192.168 .1 .100 # show ip address interface
arp -s ipAddr phiAddr # Bind
arp -d # remove all

net

Manage network environment, services, users, login

netsh

Network Configuration

Network monitoring (windows)

Wireshark

Working Mechanism

Driver Support: put the interface into promiscuous mode

Packet capture filtering mechanism

IP sniffer conduct statistical analysis, showing internal and external IP address, Port port number, host name

switch

  1. Network switch: accept information sent to the frame, and then sent to be stored in the network showing the other end of the member
  2. So that each divided port network independent
  3. Maintenance of each port address table for the (dynamic mapping)
  4. Related development libraries:
    • Unix: libpcap
    • Windows: WinPcap

Original: Big Box  Network and Information Security Practices


Guess you like

Origin www.cnblogs.com/petewell/p/11612144.html