?? webbufferoverflow.xml.emulab-medium
字號:
<?xml version="1.0" encoding="UTF-8"?><Worm xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="file:///home/kelek/wormsim/xml/wormProp.xsd"> <name>WebBufferOverflow</name> <Field name="RequiredService" type="string" strval="webserver" set="1"/> <Field name="host" type="string" set="0"/> <Field name="filesystem" type="string" strval="web" set="1"/> <Field name="ispv" type="int" set="1" intval="0"/> <Field name="pvfpp" type="int" intval="100" set="1"/> <PropagationVector> <Medium> <VulnerableServices> <name>webserver</name> <version>1.0</version> <Effect name="InfectFilesystem" type="string" strval="web"/> </VulnerableServices> </Medium> <TargetDiscoveryMechanism> <ClientOriented> <PortScan> <PortScanMechanism> <RandomScan method="probe" objective="query-first"> <addressRange>10.1.1.1</addressRange> <netmask>29</netmask> <probability>1.0</probability> </RandomScan> </PortScanMechanism> <PortScanRate unit="usec" value="50000"> <numAddresses>1</numAddresses> </PortScanRate> </PortScan> </ClientOriented> </TargetDiscoveryMechanism> </PropagationVector></Worm>
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -