亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? hobbit.txt

?? 網(wǎng)絡(luò)嗅探器
?? TXT
?? 第 1 頁 / 共 5 頁
字號(hào):
Netcat 1.10
===========							   /\_/\
								  / 0 0 \
Netcat is a simple Unix utility which reads and writes data	 ====v====
across network connections, using TCP or UDP protocol.		  \  W  /
It is designed to be a reliable "back-end" tool that can	  |     |     _
be used directly or easily driven by other programs and		  / ___ \    /
scripts.  At the same time, it is a feature-rich network	 / /   \ \  |
debugging and exploration tool, since it can create almost	(((-----)))-'
any kind of connection you would need and has several		 /
interesting built-in capabilities.  Netcat, or "nc" as the	(      ___
actual program is named, should have been supplied long ago	 \__.=|___E
as another one of those cryptic but standard Unix tools.	        /

In the simplest usage, "nc host port" creates a TCP connection to the given
port on the given target host.  Your standard input is then sent to the host,
and anything that comes back across the connection is sent to your standard
output.  This continues indefinitely, until the network side of the connection
shuts down.  Note that this behavior is different from most other applications
which shut everything down and exit after an end-of-file on the standard input.

Netcat can also function as a server, by listening for inbound connections
on arbitrary ports and then doing the same reading and writing.  With minor
limitations, netcat doesn't really care if it runs in "client" or "server"
mode -- it still shovels data back and forth until there isn't any more left.
In either mode, shutdown can be forced after a configurable time of inactivity
on the network side.

And it can do this via UDP too, so netcat is possibly the "udp telnet-like"
application you always wanted for testing your UDP-mode servers.  UDP, as the
"U" implies, gives less reliable data transmission than TCP connections and
some systems may have trouble sending large amounts of data that way, but it's
still a useful capability to have.

You may be asking "why not just use telnet to connect to arbitrary ports?"
Valid question, and here are some reasons.  Telnet has the "standard input
EOF" problem, so one must introduce calculated delays in driving scripts to
allow network output to finish.  This is the main reason netcat stays running
until the *network* side closes.  Telnet also will not transfer arbitrary
binary data, because certain characters are interpreted as telnet options and
are thus removed from the data stream.  Telnet also emits some of its
diagnostic messages to standard output, where netcat keeps such things
religiously separated from its *output* and will never modify any of the real
data in transit unless you *really* want it to.  And of course telnet is
incapable of listening for inbound connections, or using UDP instead.  Netcat
doesn't have any of these limitations, is much smaller and faster than telnet,
and has many other advantages.

Some of netcat's major features are:

	Outbound or inbound connections, TCP or UDP, to or from any ports
	Full DNS forward/reverse checking, with appropriate warnings
	Ability to use any local source port
	Ability to use any locally-configured network source address
	Built-in port-scanning capabilities, with randomizer
	Built-in loose source-routing capability
	Can read command line arguments from standard input
	Slow-send mode, one line every N seconds
	Hex dump of transmitted and received data
	Optional ability to let another program service established connections
	Optional telnet-options responder

Efforts have been made to have netcat "do the right thing" in all its various
modes.  If you believe that it is doing the wrong thing under whatever
circumstances, please notify me and tell me how you think it should behave.
If netcat is not able to do some task you think up, minor tweaks to the code
will probably fix that.  It provides a basic and easily-modified template for
writing other network applications, and I certainly encourage people to make
custom mods and send in any improvements they make to it.  This is the second
release; the overall differences from 1.00 are relatively minor and have mostly
to do with portability and bugfixes.  Many people provided greatly appreciated
fixes and comments on the 1.00 release.  Continued feedback from the Internet
community is always welcome!

Netcat is entirely my own creation, although plenty of other code was used as
examples.  It is freely given away to the Internet community in the hope that
it will be useful, with no restrictions except giving credit where it is due.
No GPLs, Berkeley copyrights or any of that nonsense.  The author assumes NO
responsibility for how anyone uses it.  If netcat makes you rich somehow and
you're feeling generous, mail me a check.  If you are affiliated in any way
with Microsoft Network, get a life.  Always ski in control.  Comments,
questions, and patches to hobbit@avian.org.

Building
========

Compiling is fairly straightforward.  Examine the Makefile for a SYSTYPE that
matches yours, and do "make <systype>".  The executable "nc" should appear.
If there is no relevant SYSTYPE section, try "generic".  If you create new
sections for generic.h and Makefile to support another platform, please follow
the given format and mail back the diffs.

There are a couple of other settable #defines in netcat.c, which you can
include as DFLAGS="-DTHIS -DTHAT" to your "make" invocation without having to
edit the Makefile.  See the following discussions for what they are and do.

If you want to link against the resolver library on SunOS [recommended] and
you have BIND 4.9.x, you may need to change XLIBS=-lresolv in the Makefile to
XLIBS="-lresolv -l44bsd".

Linux sys/time.h does not really support presetting of FD_SETSIZE; a harmless
warning is issued.

Some systems may warn about pointer types for signal().  No problem, though.

Exploration of features
=======================

Where to begin?  Netcat is at the same time so simple and versatile, it's like
trying to describe everything you can do with your Swiss Army knife.  This will
go over the basics; you should also read the usage examples and notes later on
which may give you even more ideas about what this sort of tool is good for.

If no command arguments are given at all, netcat asks for them, reads a line
from standard input, and breaks it up into arguments internally.  This can be
useful when driving netcat from certain types of scripts, with the side effect
of hiding your command line arguments from "ps" displays.

The host argument can be a name or IP address.  If -n is specified, netcat
will only accept numeric IP addresses and do no DNS lookups for anything.  If
-n is not given and -v is turned on, netcat will do a full forward and reverse
name and address lookup for the host, and warn you about the all-too-common
problem of mismatched names in the DNS.  This often takes a little longer for
connection setup, but is useful to know about.  There are circumstances under
which this can *save* time, such as when you want to know the name for some IP
address and also connect there.  Netcat will just tell you all about it, saving
the manual steps of looking up the hostname yourself.  Normally mismatch-
checking is case-insensitive per the DNS spec, but you can define ANAL at
compile time to make it case-sensitive -- sometimes useful for uncovering minor
errors in your own DNS files while poking around your networks.

A port argument is required for outbound connections, and can be numeric or a
name as listed in /etc/services.  If -n is specified, only numeric arguments
are valid.  Special syntax and/or more than one port argument cause different
behavior -- see details below about port-scanning.

The -v switch controls the verbosity level of messages sent to standard error.
You will probably want to run netcat most of the time with -v turned on, so you
can see info about the connections it is trying to make.  You will probably
also want to give a smallish -w argument, which limits the time spent trying to
make a connection.  I usually alias "nc" to "nc -v -w 3", which makes it
function just about the same for things I would otherwise use telnet to do.
The timeout is easily changed by a subsequent -w argument which overrides the
earlier one.  Specifying -v more than once makes diagnostic output MORE
verbose.  If -v is not specified at all, netcat silently does its work unless
some error happens, whereupon it describes the error and exits with a nonzero
status.  Refused network connections are generally NOT considered to be errors,
unless you only asked for a single TCP port and it was refused.

Note that -w also sets the network inactivity timeout.  This does not have any
effect until standard input closes, but then if nothing further arrives from
the network in the next <timeout> seconds, netcat tries to read the net once
more for good measure, and then closes and exits.  There are a lot of network
services now that accept a small amount of input and return a large amount of
output, such as Gopher and Web servers, which is the main reason netcat was
written to "block" on the network staying open rather than standard input.
Handling the timeout this way gives uniform behavior with network servers that
*don't* close by themselves until told to.

UDP connections are opened instead of TCP when -u is specified.  These aren't
really "connections" per se since UDP is a connectionless protocol, although
netcat does internally use the "connected UDP socket" mechanism that most
kernels support.  Although netcat claims that an outgoing UDP connection is
"open" immediately, no data is sent until something is read from standard
input.  Only thereafter is it possible to determine whether there really is a
UDP server on the other end, and often you just can't tell.  Most UDP protocols
use timeouts and retries to do their thing and in many cases won't bother
answering at all, so you should specify a timeout and hope for the best.  You
will get more out of UDP connections if standard input is fed from a source
of data that looks like various kinds of server requests.

To obtain a hex dump file of the data sent either way, use "-o logfile".  The
dump lines begin with "<" or ">" to respectively indicate "from the net" or
"to the net", and contain the total count per direction, and hex and ascii
representations of the traffic.  Capturing a hex dump naturally slows netcat
down a bit, so don't use it where speed is critical.

Netcat can bind to any local port, subject to privilege restrictions and ports
that are already in use.  It is also possible to use a specific local network
source address if it is that of a network interface on your machine.  [Note:
this does not work correctly on all platforms.]  Use "-p portarg" to grab a
specific local port, and "-s ip-addr" or "-s name" to have that be your source
IP address.  This is often referred to as "anchoring the socket".  Root users
can grab any unused source port including the "reserved" ones less than 1024.
Absence of -p will bind to whatever unused port the system gives you, just like
any other normal client connection, unless you use -r [see below].

Listen mode will cause netcat to wait for an inbound connection, and then the
same data transfer happens.  Thus, you can do "nc -l -p 1234 < filename" and
when someone else connects to your port 1234, the file is sent to them whether

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美va在线播放| 亚洲国产一区视频| 日韩欧美中文字幕一区| 欧美三级在线看| 色婷婷亚洲精品| 欧美三级电影网| 欧美色图第一页| 欧美性xxxxxx少妇| 欧美日本一道本在线视频| 欧洲色大大久久| 欧美日韩一区在线观看| 欧美高清一级片在线| 日韩免费看网站| 久久久久久毛片| 国产精品免费看片| 中文字幕在线不卡国产视频| 亚洲天堂中文字幕| 亚洲图片欧美色图| 日本不卡免费在线视频| 麻豆91精品91久久久的内涵| 国产一区在线看| av色综合久久天堂av综合| 97国产一区二区| 51久久夜色精品国产麻豆| 日韩欧美一区二区不卡| 国产日韩欧美精品一区| 国产精品久久久久久久岛一牛影视 | 337p日本欧洲亚洲大胆色噜噜| 欧美刺激午夜性久久久久久久| 欧美—级在线免费片| 午夜视频在线观看一区| 国产一区二区三区最好精华液 | 亚洲激情综合网| 奇米影视一区二区三区| 国产高清无密码一区二区三区| 色综合久久综合网欧美综合网| 制服丝袜av成人在线看| 国产精品毛片高清在线完整版| 亚洲亚洲人成综合网络| 国产精品一区免费在线观看| 91视频观看视频| 日韩欧美高清一区| 一区二区三区四区亚洲| 国产乱子轮精品视频| 欧美区一区二区三区| 久久久综合视频| 午夜精品国产更新| 一本大道av伊人久久综合| 日韩免费电影网站| 亚洲一区二区三区影院| 国产凹凸在线观看一区二区| 91麻豆精品国产91久久久久久| 国产欧美日韩综合| 久久国产精品第一页| 精品视频免费在线| 亚洲天天做日日做天天谢日日欢| 久久99精品网久久| 久久亚洲综合色一区二区三区| 亚洲一区二区三区视频在线| 成人在线一区二区三区| 精品国产区一区| 天天色天天操综合| 欧美午夜寂寞影院| 亚洲精品视频免费看| jlzzjlzz亚洲日本少妇| 欧美国产综合一区二区| 国内精品视频666| 日韩一二三四区| 日本一区中文字幕| 4hu四虎永久在线影院成人| 夜夜精品浪潮av一区二区三区| 99久久国产综合色|国产精品| 久久久久久**毛片大全| 国产精品99久久久久久似苏梦涵| 欧美www视频| 日本强好片久久久久久aaa| 欧美日韩国产一级片| 亚洲成av人片一区二区梦乃| 欧美久久久久久蜜桃| 视频在线观看一区二区三区| 欧美老肥妇做.爰bbww视频| 亚洲免费成人av| gogogo免费视频观看亚洲一| 日韩美女精品在线| 欧美三级韩国三级日本一级| 五月婷婷综合网| 日韩亚洲欧美综合| 国产乱对白刺激视频不卡| 日本一区二区综合亚洲| 9人人澡人人爽人人精品| 有码一区二区三区| 精品视频在线视频| 久久国产剧场电影| 国产精品丝袜在线| 在线观看日韩一区| 青椒成人免费视频| 久久久久亚洲蜜桃| 99国产精品99久久久久久| 国产乱码精品1区2区3区| 久久日一线二线三线suv| 国产精品18久久久久久vr| 亚洲欧洲成人精品av97| 欧美在线制服丝袜| 日韩成人一级大片| 国产精品午夜春色av| 欧美在线一区二区三区| 激情五月婷婷综合网| 亚洲视频免费在线| 日韩亚洲欧美一区二区三区| 播五月开心婷婷综合| 亚洲国产欧美在线| 国产喷白浆一区二区三区| 91理论电影在线观看| 激情五月婷婷综合网| 亚洲一区在线观看免费观看电影高清 | aaa亚洲精品| 日本在线不卡一区| 国产精品色在线观看| 欧美精品在线视频| 国产成人av资源| 午夜精品成人在线视频| 亚洲国产精品av| 欧美日韩日日摸| av成人老司机| 免费不卡在线观看| 亚洲精品欧美在线| 国产精品视频一二三区| 日韩欧美成人激情| 欧美日韩综合不卡| 91原创在线视频| 国产成人免费在线视频| 图片区小说区区亚洲影院| 国产精品成人网| 国产日韩高清在线| 欧美成人国产一区二区| 911国产精品| 欧美亚洲国产一区在线观看网站| 丁香天五香天堂综合| 久久成人免费网站| 热久久国产精品| 亚洲成a人v欧美综合天堂下载| 最新国产精品久久精品| 中文字幕精品在线不卡| 久久久噜噜噜久久人人看| 日韩欧美你懂的| 在线播放/欧美激情| 欧美日韩一区二区在线观看| 一本色道久久综合亚洲aⅴ蜜桃| 成人激情免费电影网址| 国产成人在线视频免费播放| 激情图片小说一区| 激情五月激情综合网| 国产一区二区不卡| 国产成人综合亚洲网站| 成人免费视频免费观看| 成人免费毛片a| www.亚洲色图| 9色porny自拍视频一区二区| 91色婷婷久久久久合中文| 91丨porny丨最新| 欧洲日韩一区二区三区| 欧美区在线观看| 日韩一区二区在线观看视频| 欧美一级二级在线观看| 91精品国产欧美一区二区18| 日韩精品一区二区三区在线播放| 精品理论电影在线| 国产调教视频一区| 国产精品久久久久久亚洲伦| 亚洲欧美日韩久久| 亚洲成a人v欧美综合天堂| 久久精品国产网站| 粉嫩蜜臀av国产精品网站| 欧美中文字幕亚洲一区二区va在线 | 亚洲图片欧美视频| 免费的成人av| 成人激情文学综合网| 欧美视频一区在线| 2017欧美狠狠色| ...xxx性欧美| 亚洲.国产.中文慕字在线| 蜜桃一区二区三区四区| 成人一级视频在线观看| 色婷婷久久久综合中文字幕| 欧美videos中文字幕| 亚洲日本在线天堂| 日韩中文字幕麻豆| 国产成人午夜精品5599 | 亚洲午夜久久久久久久久电影网| 免费国产亚洲视频| 99麻豆久久久国产精品免费优播| 精品视频免费看| 中文字幕第一页久久| 日韩高清电影一区| av网站一区二区三区| 欧美mv和日韩mv国产网站| 免费观看日韩电影| 成人av网站在线| 精品三级在线看| 一区二区三区精品在线观看|