亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? hobbit.txt

?? 網絡嗅探器
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Netcat 1.10
===========							   /\_/\
								  / 0 0 \
Netcat is a simple Unix utility which reads and writes data	 ====v====
across network connections, using TCP or UDP protocol.		  \  W  /
It is designed to be a reliable "back-end" tool that can	  |     |     _
be used directly or easily driven by other programs and		  / ___ \    /
scripts.  At the same time, it is a feature-rich network	 / /   \ \  |
debugging and exploration tool, since it can create almost	(((-----)))-'
any kind of connection you would need and has several		 /
interesting built-in capabilities.  Netcat, or "nc" as the	(      ___
actual program is named, should have been supplied long ago	 \__.=|___E
as another one of those cryptic but standard Unix tools.	        /

In the simplest usage, "nc host port" creates a TCP connection to the given
port on the given target host.  Your standard input is then sent to the host,
and anything that comes back across the connection is sent to your standard
output.  This continues indefinitely, until the network side of the connection
shuts down.  Note that this behavior is different from most other applications
which shut everything down and exit after an end-of-file on the standard input.

Netcat can also function as a server, by listening for inbound connections
on arbitrary ports and then doing the same reading and writing.  With minor
limitations, netcat doesn't really care if it runs in "client" or "server"
mode -- it still shovels data back and forth until there isn't any more left.
In either mode, shutdown can be forced after a configurable time of inactivity
on the network side.

And it can do this via UDP too, so netcat is possibly the "udp telnet-like"
application you always wanted for testing your UDP-mode servers.  UDP, as the
"U" implies, gives less reliable data transmission than TCP connections and
some systems may have trouble sending large amounts of data that way, but it's
still a useful capability to have.

You may be asking "why not just use telnet to connect to arbitrary ports?"
Valid question, and here are some reasons.  Telnet has the "standard input
EOF" problem, so one must introduce calculated delays in driving scripts to
allow network output to finish.  This is the main reason netcat stays running
until the *network* side closes.  Telnet also will not transfer arbitrary
binary data, because certain characters are interpreted as telnet options and
are thus removed from the data stream.  Telnet also emits some of its
diagnostic messages to standard output, where netcat keeps such things
religiously separated from its *output* and will never modify any of the real
data in transit unless you *really* want it to.  And of course telnet is
incapable of listening for inbound connections, or using UDP instead.  Netcat
doesn't have any of these limitations, is much smaller and faster than telnet,
and has many other advantages.

Some of netcat's major features are:

	Outbound or inbound connections, TCP or UDP, to or from any ports
	Full DNS forward/reverse checking, with appropriate warnings
	Ability to use any local source port
	Ability to use any locally-configured network source address
	Built-in port-scanning capabilities, with randomizer
	Built-in loose source-routing capability
	Can read command line arguments from standard input
	Slow-send mode, one line every N seconds
	Hex dump of transmitted and received data
	Optional ability to let another program service established connections
	Optional telnet-options responder

Efforts have been made to have netcat "do the right thing" in all its various
modes.  If you believe that it is doing the wrong thing under whatever
circumstances, please notify me and tell me how you think it should behave.
If netcat is not able to do some task you think up, minor tweaks to the code
will probably fix that.  It provides a basic and easily-modified template for
writing other network applications, and I certainly encourage people to make
custom mods and send in any improvements they make to it.  This is the second
release; the overall differences from 1.00 are relatively minor and have mostly
to do with portability and bugfixes.  Many people provided greatly appreciated
fixes and comments on the 1.00 release.  Continued feedback from the Internet
community is always welcome!

Netcat is entirely my own creation, although plenty of other code was used as
examples.  It is freely given away to the Internet community in the hope that
it will be useful, with no restrictions except giving credit where it is due.
No GPLs, Berkeley copyrights or any of that nonsense.  The author assumes NO
responsibility for how anyone uses it.  If netcat makes you rich somehow and
you're feeling generous, mail me a check.  If you are affiliated in any way
with Microsoft Network, get a life.  Always ski in control.  Comments,
questions, and patches to hobbit@avian.org.

Building
========

Compiling is fairly straightforward.  Examine the Makefile for a SYSTYPE that
matches yours, and do "make <systype>".  The executable "nc" should appear.
If there is no relevant SYSTYPE section, try "generic".  If you create new
sections for generic.h and Makefile to support another platform, please follow
the given format and mail back the diffs.

There are a couple of other settable #defines in netcat.c, which you can
include as DFLAGS="-DTHIS -DTHAT" to your "make" invocation without having to
edit the Makefile.  See the following discussions for what they are and do.

If you want to link against the resolver library on SunOS [recommended] and
you have BIND 4.9.x, you may need to change XLIBS=-lresolv in the Makefile to
XLIBS="-lresolv -l44bsd".

Linux sys/time.h does not really support presetting of FD_SETSIZE; a harmless
warning is issued.

Some systems may warn about pointer types for signal().  No problem, though.

Exploration of features
=======================

Where to begin?  Netcat is at the same time so simple and versatile, it's like
trying to describe everything you can do with your Swiss Army knife.  This will
go over the basics; you should also read the usage examples and notes later on
which may give you even more ideas about what this sort of tool is good for.

If no command arguments are given at all, netcat asks for them, reads a line
from standard input, and breaks it up into arguments internally.  This can be
useful when driving netcat from certain types of scripts, with the side effect
of hiding your command line arguments from "ps" displays.

The host argument can be a name or IP address.  If -n is specified, netcat
will only accept numeric IP addresses and do no DNS lookups for anything.  If
-n is not given and -v is turned on, netcat will do a full forward and reverse
name and address lookup for the host, and warn you about the all-too-common
problem of mismatched names in the DNS.  This often takes a little longer for
connection setup, but is useful to know about.  There are circumstances under
which this can *save* time, such as when you want to know the name for some IP
address and also connect there.  Netcat will just tell you all about it, saving
the manual steps of looking up the hostname yourself.  Normally mismatch-
checking is case-insensitive per the DNS spec, but you can define ANAL at
compile time to make it case-sensitive -- sometimes useful for uncovering minor
errors in your own DNS files while poking around your networks.

A port argument is required for outbound connections, and can be numeric or a
name as listed in /etc/services.  If -n is specified, only numeric arguments
are valid.  Special syntax and/or more than one port argument cause different
behavior -- see details below about port-scanning.

The -v switch controls the verbosity level of messages sent to standard error.
You will probably want to run netcat most of the time with -v turned on, so you
can see info about the connections it is trying to make.  You will probably
also want to give a smallish -w argument, which limits the time spent trying to
make a connection.  I usually alias "nc" to "nc -v -w 3", which makes it
function just about the same for things I would otherwise use telnet to do.
The timeout is easily changed by a subsequent -w argument which overrides the
earlier one.  Specifying -v more than once makes diagnostic output MORE
verbose.  If -v is not specified at all, netcat silently does its work unless
some error happens, whereupon it describes the error and exits with a nonzero
status.  Refused network connections are generally NOT considered to be errors,
unless you only asked for a single TCP port and it was refused.

Note that -w also sets the network inactivity timeout.  This does not have any
effect until standard input closes, but then if nothing further arrives from
the network in the next <timeout> seconds, netcat tries to read the net once
more for good measure, and then closes and exits.  There are a lot of network
services now that accept a small amount of input and return a large amount of
output, such as Gopher and Web servers, which is the main reason netcat was
written to "block" on the network staying open rather than standard input.
Handling the timeout this way gives uniform behavior with network servers that
*don't* close by themselves until told to.

UDP connections are opened instead of TCP when -u is specified.  These aren't
really "connections" per se since UDP is a connectionless protocol, although
netcat does internally use the "connected UDP socket" mechanism that most
kernels support.  Although netcat claims that an outgoing UDP connection is
"open" immediately, no data is sent until something is read from standard
input.  Only thereafter is it possible to determine whether there really is a
UDP server on the other end, and often you just can't tell.  Most UDP protocols
use timeouts and retries to do their thing and in many cases won't bother
answering at all, so you should specify a timeout and hope for the best.  You
will get more out of UDP connections if standard input is fed from a source
of data that looks like various kinds of server requests.

To obtain a hex dump file of the data sent either way, use "-o logfile".  The
dump lines begin with "<" or ">" to respectively indicate "from the net" or
"to the net", and contain the total count per direction, and hex and ascii
representations of the traffic.  Capturing a hex dump naturally slows netcat
down a bit, so don't use it where speed is critical.

Netcat can bind to any local port, subject to privilege restrictions and ports
that are already in use.  It is also possible to use a specific local network
source address if it is that of a network interface on your machine.  [Note:
this does not work correctly on all platforms.]  Use "-p portarg" to grab a
specific local port, and "-s ip-addr" or "-s name" to have that be your source
IP address.  This is often referred to as "anchoring the socket".  Root users
can grab any unused source port including the "reserved" ones less than 1024.
Absence of -p will bind to whatever unused port the system gives you, just like
any other normal client connection, unless you use -r [see below].

Listen mode will cause netcat to wait for an inbound connection, and then the
same data transfer happens.  Thus, you can do "nc -l -p 1234 < filename" and
when someone else connects to your port 1234, the file is sent to them whether

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色综合夜色一区| 制服丝袜激情欧洲亚洲| 午夜精品福利在线| 精品久久久久久亚洲综合网| av福利精品导航| 日本成人超碰在线观看| 亚洲欧美一区二区视频| 精品国产乱码久久久久久闺蜜| 成人av免费观看| 国产麻豆成人传媒免费观看| 亚洲成人tv网| 亚洲女人小视频在线观看| 精品国产一区二区三区不卡| 欧美亚洲综合色| 一本大道久久a久久精二百| 国内精品久久久久影院薰衣草| 亚洲成av人片观看| 亚洲三级免费电影| 中文字幕第一区综合| 日韩一级视频免费观看在线| 欧美人成免费网站| 欧美亚洲动漫制服丝袜| 色一情一乱一乱一91av| 国产精品123区| 久久99热狠狠色一区二区| 人人精品人人爱| 亚洲人成伊人成综合网小说| 国产精品国产自产拍高清av王其 | 日韩一级免费观看| 欧美偷拍一区二区| 欧美在线免费观看亚洲| 日本韩国精品一区二区在线观看| 99精品视频在线免费观看| 岛国一区二区在线观看| 国产激情一区二区三区桃花岛亚洲| 韩国成人精品a∨在线观看| 久久草av在线| 国产精品亚洲一区二区三区妖精| 久久精品国产免费看久久精品| 日韩成人一区二区| 美脚の诱脚舐め脚责91| 九九视频精品免费| 国产电影一区在线| 懂色av中文字幕一区二区三区| 国产成人精品综合在线观看 | 色噜噜狠狠一区二区三区果冻| www.欧美日韩国产在线| 99在线精品视频| 色女孩综合影院| 欧美日韩一区二区欧美激情| 欧美老人xxxx18| 欧美一区二区私人影院日本| 日韩丝袜情趣美女图片| 久久―日本道色综合久久| 国产女人水真多18毛片18精品视频| 国产精品久久久久久户外露出| 国产精品久久久久久久午夜片| 亚洲色图视频网| 亚洲123区在线观看| 日本va欧美va瓶| 国产一区二区影院| 白白色 亚洲乱淫| 在线视频观看一区| 制服.丝袜.亚洲.中文.综合| 亚洲精品在线三区| 亚洲男人的天堂在线aⅴ视频| 午夜在线成人av| 国产露脸91国语对白| 99re热这里只有精品免费视频| 欧美网站一区二区| 日韩视频一区二区三区在线播放| 久久久久久久综合日本| 亚洲精品国产第一综合99久久| 日韩二区三区四区| 成人禁用看黄a在线| 欧美这里有精品| 精品少妇一区二区三区视频免付费 | 亚洲精品乱码久久久久久久久 | 国产在线精品视频| 91在线精品一区二区| 91精品在线一区二区| 国产欧美综合在线观看第十页 | 成人性生交大片免费看在线播放| 欧日韩精品视频| 久久综合一区二区| 亚洲欧美激情在线| 精品在线观看视频| 成人av网站免费观看| 在线成人小视频| 国产精品水嫩水嫩| 青青草成人在线观看| 99久久精品国产网站| 一区二区三国产精华液| 美女网站在线免费欧美精品| 99久久精品免费看国产| 精品成人在线观看| 亚洲一二三四区| 成人精品小蝌蚪| 日韩亚洲欧美中文三级| 亚洲欧美偷拍三级| 久久99国产乱子伦精品免费| 欧美亚洲综合网| 1区2区3区精品视频| 久久精品国产亚洲高清剧情介绍 | 国产成人精品免费看| 日韩欧美中文一区| 午夜成人免费电影| 日本久久电影网| 中文字幕成人av| 国产麻豆一精品一av一免费| 制服丝袜亚洲色图| 亚洲资源中文字幕| 91在线精品秘密一区二区| 久久色在线观看| 久久99精品国产麻豆婷婷洗澡| 欧美三级电影在线看| 亚洲激情综合网| 91久久精品一区二区| 亚洲天堂av老司机| 成人国产电影网| 国产三级精品三级在线专区| 国产美女精品在线| 精品国产123| 久久99精品久久久久久| 欧美成人欧美edvon| 精品一区中文字幕| 精品国产欧美一区二区| 麻豆freexxxx性91精品| 日韩视频免费观看高清完整版在线观看 | 欧美乱妇23p| 亚洲国产精品麻豆| 欧美亚洲一区二区在线观看| 亚洲自拍偷拍av| 欧美体内she精视频| 亚洲高清免费视频| 欧美另类久久久品| 青青草成人在线观看| 欧美本精品男人aⅴ天堂| 久久99久国产精品黄毛片色诱| 欧美zozo另类异族| 国产精品一区二区在线看| 欧美激情在线看| 99国产精品久久久久| 亚洲美女免费在线| 欧美日韩一区二区三区高清| 五月婷婷色综合| 欧美v国产在线一区二区三区| 国产在线一区二区综合免费视频| 欧美大胆人体bbbb| 成人影视亚洲图片在线| 亚洲色图欧美偷拍| 欧美日韩国产高清一区二区三区 | 国产女主播一区| 99精品视频在线播放观看| 亚洲一区在线视频| 亚洲啪啪综合av一区二区三区| 一本色道久久综合狠狠躁的推荐 | 成人黄色小视频| 亚洲精品日韩综合观看成人91| 欧美日韩国产综合视频在线观看| 日韩电影在线观看一区| 精品88久久久久88久久久| 成人免费高清在线| 亚洲一区二区免费视频| 欧美大片在线观看| av在线播放一区二区三区| 一级中文字幕一区二区| 日韩精品一区二区三区蜜臀| 成人黄色在线看| 日韩影视精彩在线| 欧美激情一区二区三区在线| 欧洲日韩一区二区三区| 久国产精品韩国三级视频| 国产精品国产三级国产普通话蜜臀| 91行情网站电视在线观看高清版| 美女免费视频一区二区| 国产精品国产三级国产普通话蜜臀| 欧美色视频在线观看| 九九久久精品视频| 亚洲愉拍自拍另类高清精品| 精品日韩一区二区| 在线观看日韩国产| 国产精品资源在线| 天天影视网天天综合色在线播放 | 亚洲国产精品精华液2区45| 欧美亚洲尤物久久| 丁香六月综合激情| 日本大胆欧美人术艺术动态 | 午夜精品福利久久久| 国产欧美日韩综合精品一区二区| 欧美三级中文字| 国产成人av网站| 日韩影院在线观看| 一区二区三区中文字幕精品精品 | 日韩和欧美一区二区| 亚洲国产精品精华液ab| 欧美大片在线观看一区二区| 在线观看日韩高清av| 成人18视频在线播放| 国产在线精品一区二区|