亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? windows internet programming part 3.html

?? a collection of mega hacking tools
?? HTML
?? 第 1 頁 / 共 5 頁
字號:
(which more than likely you will) you can still download version 2.0

for your version of windows from the microsoft website, windows 3.1

unfortunately does not have a 2.0 version microsoft has decided not

to release a 16 bit one. Of course if you have Windows 3.1 what the

fuck are you doing? suddenly springs to mind, oh well, go away. Now

Windows32 systems have Winsock however different versions have varying

amounts of support for raw sockets. All Version 2 stacks have support

for creating ICMP packets using Raw Sockets but Only Windows NT4, 2000

and XP have the capability for creating TCP and UDP packets. D'ont

worry there is still alot of things you can do with ICMP alone if you

use a Win 9x system. Before we go into the programming side of things

we must now cover the IP, ICMP, TCP and UDP protocols in more detail.

If you have read Part 1 of this tutorial you should have a pretty good

idea about how all the protocols work if not thats ok it shouldn't be

too bad and you should be able to understand things, so please read

on for explenations of the Protocols.





3.0 THE INTERNET HEADERS

=======================================



In part 1 we discussed the different Internet protocols and how they

fit together with packets so you should know pretty well how data is

transfered across the internet and understand many of the fields

within the different headers, if you aren't sure or cant quite

remember I suggest you read the first few sections of Part 1 of this

tutorial. Well now that you have a pretty good idea about the different

headers and understand the idea behind them we are going to have to go

into slightly more detail about the different headers and their

respective fields.







3.1 THE IP HEADER

=======================================



   +---------------------------------+--------------------------------+

   |Version |  IHL   |     TOS       |         Total Length           |

   | 4 bits | 4 bits |    8 bits     |            16 bits             |

   +--------+--------+---------------+------+-------------------------+

   |        Identification           |Flags |     Fragment Offset     |

   |            16 bits              |3 bits|         13 bits         |

   +-----------------+---------------+------+-------------------------+

   |  Time to Live   |   Protocol    |        Header Checksum         |

   |      8 bits     |    8 bits     |             16 bits            |

   +-----------------+---------------+--------------------------------+

   |                        Source Address                            |

   |                            32 bits                               |

   +------------------------------------------------------------------+

   |                      Destination Address                         |

   |                            32 bits                               |

   +------------------------------------------------+-----------------+

   |                     Options                    |     Padding     |

   +------------------------------------------------+-----------------+



   FIG 1.0  - Structure of an IP Header





As you can see above the IP header has a total of 14 Fields.



1.  Version

2.  IHL

3.  TOS

4.  Total Length

5.  Identification

6.  Flags

7.  Fragment Offset

8.  Time To Live

9.  Protocol

10. Header Checksum

11. Source Address

12. Destination Address

13. Options

14. Padding





1.  Version		- The version field describes what version of the IP Protocol

			  is being used, we will be using IPv4 because it is more

			  supported and IPv6 is not yet fully implemented.



2.  IHL			- The Internet Header Length (IHL) contains the length of the

			  Internet Header in 32 bit words. Minimum value for a header

			  is 5.



3.  TOS			- The Type Of Servive (TOS) field was designed to tell routers

			  how the packet is to be handled for example so that packets

			  that need to move quickly like streaming audio would have a

			  higher TOS value than other packets so that routers would

			  send them across the network faster. These days most routers

			  do not process the TOS field because it would waste too much

			  of the routers time so we usually just set the TOS field to

			  0.



4.  Total Length 		- This field contains the total size of the Internet Packet

			  including headers and data. Typical IP headers are 20 bytes

			  in size, same with TCP ones, so an Internet Packet with an

			  IP Header, a TCP Header and no data would be 20 + 20 = 40

			  bytes in length, Total Length = 40 Bytes.



5.  Identification		- This field is used to aid in tracking fragmented packets,

			  each fragment has the same ID as the first datagram, the

			  ID's of datagrams following each other is usually

			  incremented, because this value must be unique most

			  applications use there process id to fill in this field.



6.  Flags			- Flags are used with IP to control fragmentation, there are

			  4 flags.





			1-NO FLAGS		       [VALUE = 0x00]



			  Does not specify any fragmentation options



			  		     





			2-MORE FRAGMENT		       [VALUE - 0X01]



			  Means there is more fragments to be

			  recieved after this packet



			  		     





			3-DONT FRAGMENT		       [VALUE = 0X02]



			  Tells the stack not to fragment this packet



			

			4-MORE & DONT		       [VALUE = 0X03]



			  Tells the stack that there are more packets

			  to be recieved after this one and not to

			  fragment it



			  		     





		    NOTE: THE LAST FRAGMENT CANNOT HAVE A FLAG OF 0X01 (MORE FRAG)

			  AS THERE ARE NO OTHER PACKETS TO FOLLOW.







7.  Fragment Offset	- The fragment offset is used for placing different packets

			  in the correct order when reassembling Datagrams. The first

			  fragment must have a value of 0 and the last must be equal

			  to the value of Total Length. Value is measured in units of

			  64 bits (8 octets).



8.  Time To Live	- The Time To Live (TTL) field was created so that if a packet

			  cannot find its destination it will be destroyed rather than

			  travel across the internet indefinately, if packets kept

			  mounting in this fashion it would seriously degrade network

			  performance. Each router that a packet meets decrements the

			  value of the TTL field by one. If the value is decremented

			  to 0 before it reaches its destination the packet will be

			  destroyed and an error sent back to the computer that the

			  packet originated from. If the TTL is set to 0 on creation

			  it will immediately be destroyed.



9.  Protocol		- This field specifies what protocol is being carried in the

			  datagram eg; TCP.



			  The most common values are as follows:



			  IPPROTO_TCP	= TCP

			  IPPROTO_UDP	= UDP

			  IPPROTO_ICMP	= ICMP



			  Other protocols and there values will be specified later.



10. Header Checksum	- The checksum is the size of the Internet Header, it is used

			  to verify the integrity of a packet by comparing the headers

			  size with the value of the checksum. Certain fields in the

			  IP Header change troughout transport such as the TTL field

			  because of this the checksum is recalculated and verified

			  by each router or gateway it encounters.



11. Source Address		- The IP Address of the computer that the packet originated

			  from. In other words if you sent a packet this field would

			  contain your IP Address. This lets the computer being sent

			  the packet know where it came from and where to send a reply.



12. Destination Address 	- The IP Address of the computer that the packet is being sent.

			  Lets routers that the packet meets know where to send the

			  packet to.



13. Options		- Mostly the options aren't filled out and they are very rarely

			  used at all so we wont discuss them very much. There are

			  however 3 interesting options that we will discuss here,

			  they are:



			  1. Loose Source Routing

			  2. Strict Source Routing

			  3. Record Routing.



			  1. Loose Routing

			  

			  Loose Routing allows us to specify the source computer (us)

			  and the destination computer's IP Address's in the IP

			  header along with the address's of a couple of other routers

			  that the packet must travel across between, then we can

			  better control how the packet travels across the internet.



			  2. Strict Routing



			  Strict Routing allows us to specify the source computer (us)

			  and the destination computer's IP Address's in the IP

			  header along with the address's of other routers, the packet

			  then has to travel along this exact route to get to its

			  destination, using this we can route our packets around

			  routers or gateways that are down or not responding, this

			  also means that if you wanted to you could ensure that the

			  packet travels across certain networks and passes certain

			  routers, of course this isn't recommended as you could

			  'accidentaly' bypass security restrictions on some networks

			  by using this method, which is naughty.



			  3. Record Routing



			  Im sure we are all familiar with the traceroute program

			  which uses the ICMP protocol to tell us what routers our

			  packets are traveling trough to get to there destination,

			  record routing can be used ina  similiar way, by setting

			  this option every router that the packet meets places its

			  IP Address into the IP Header, we can then examine the packet

			  and see what IP Address's it contains.



		    NOTE: AN IP HEADER CAN ONLY BE A MAXIMUM OF 60 BYTES LONG AND THE

			  HEADER IS 20 BYTES IN LENGTH, EACH IP ADDRESS IS 4 BYTES IN

			  SIZE SO AN IP HEADER CAN ONLY CONTAIN A MAXIMUM OF 10 IP

			  ADDRESS'S EACH.





14. Padding		- Padding is there to respect the 32 bits boundary, its composed

			  of 0's.







3.2 THE TCP HEADER

=======================================



Well before we get into the TCP header we first have to explain how exactly a TCP connection

is formed between two hosts. The First host sends a TCP packet with one of the fields in the

header set with a value of SYN, this is known as a SYN (synchronise) packet. So what is this

packet synchronising? A potential problem with a TCP connection would be  if a connection was

established between some internet user at home and a shop on the internet, the user views his

details but in the mean time some-1 were to pretend they were that user and the webshop sent

that users details to that person instead of the real user (such as the real users credit

card numbers?). Because of this a thing called an acknowledgement number was created, the

number is defined by the server and the syn packet is used to transmit this number to the

host, both sides of the connection now have the same Acknowledgement number and they are

synchronised! The Acknowledgement number will be contained in all TCP packets troughout this

session and if any packets recieved at either side have a wrong Acknowledgement number then

the packet will be discarded.



The second host will now send another TCP packet this time with a field set to ACK

(Acknowledge) this is known as a SYN_ACK packet. Its purpose is to acknowledge the reception

of the SYN packet.



Once the first host has recieved the SYN_ACK packet it sends one last ACK packet, just to be

sure to be sure.



As you can see this process involves 3 steps.



1. Host sends SYN packet to target start a connection

2. Target sends host an ACK packet saying it recieved the SYN.

3. Host sends target an ACK packet to confirm and connection is established.



Because of these 3 steps the TCP connection is known as the Three-Way-Handshake.







   +---------------------------------+--------------------------------+

   |          Source Port            |       Destination Port         |

   |            16 bits              |           16 bits              |

   +---------------------------------+--------------------------------+

   |                          Sequence Number                         |

   |                              32 bits                             |

   +------------------------------------------------------------------+

   |                      Acknowledgment Number                       |

   |				  32 bits			      |

   +--------+------------+-----------+--------------------------------+

   |D-Offset|  Reserved  | Ctrl Bits |   	   Window               |

   | 4 bits |   6 bits   |   6 bits  |	   16 bits              |

   +--------+------------+-----------+--------------------------------+

   |            Checksum             |        Urgent Pointer          |

   |             16 bits             |            16 bits             |

   +---------------------------------+--------------+-----------------+

   |                     Options                    |     Padding     |

   +------------------------------------------------+-----------------+

   |				Data			      |

   +------------------------------------------------------------------+





   FIG 1.1  - Structure of a TCP Header





There are 12 fields in total in the TCP Header and your Datagram.



1.  Source Port

2.  Destination Port

3.  Sequence Number

4.  Acknowledgement Number

5.  Data Offset

6.  Reserved

7.  Control Bits

8.  Window

9.  Checksum

10. Urgent Pointer

11. Options

12. Padding







1.  Source Port		- The Source port number.



2.  Destination Port	- The Destination port number.



3.  Sequence No.		- The sequence number is used to ensure that segments

			  recieved by a host are from where they claim to be,

			  this prevents people from hijacking connections.



4.  Acknowledgement No. 	- The acknowledgement number to ensure both sides of

			  the connection are authentic, as explained above.



5.  Data Offset		- The Data Offset in the header is expressed in 32 bit

			  words. The default is 5 if you have no options set

			  in the TCP header.



6.  Reserved		- This field is reserved for future use, you must have

			  it set to 0.



7.  Control Bits		- This is the field that contains values such as SYN

			  and ACK. It has a total of 6 values.



    		    	  URG:  Send Urgent Data to destination.

    		    	  ACK:  Acknowledgment of Data.

    			  PSH:  Push Data to destination.

    			  RST:  Reset the connection.

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
不卡在线视频中文字幕| 亚洲精品一二三| 国产一区二区调教| 久久久久久久久久久久久女国产乱 | 国产一区二区三区观看| 久久久国产一区二区三区四区小说| 国产中文字幕一区| 久久先锋影音av鲁色资源| 成人综合婷婷国产精品久久免费| 国产免费成人在线视频| 色网综合在线观看| 亚洲成人自拍网| 日韩免费在线观看| 国产**成人网毛片九色 | 亚洲一区二区三区四区在线观看 | 国产精品一区免费在线观看| 日本一区二区三区在线不卡| 91蜜桃视频在线| 午夜精品aaa| 久久夜色精品一区| 99精品视频一区| 青青草91视频| 国产精品美女久久久久久久网站| 欧美性受xxxx黑人xyx性爽| 蜜臀av国产精品久久久久| 国产精品美女久久久久aⅴ| 欧美日韩精品高清| 粉嫩av一区二区三区粉嫩| 一区二区三区欧美| 久久日韩粉嫩一区二区三区| 欧美性大战久久| 高清不卡在线观看av| 同产精品九九九| 日本一二三四高清不卡| 在线不卡免费欧美| 91猫先生在线| 国产成人免费视| 日一区二区三区| 亚洲特级片在线| 日韩精品在线一区二区| 91日韩精品一区| 国产精品99久久久久| 日本亚洲最大的色成网站www| 国产精品福利一区| 久久久av毛片精品| 91精品国产欧美一区二区| 色婷婷综合久色| 成人av免费在线| 国产在线精品一区二区三区不卡| 亚洲一区二区三区视频在线 | 亚洲欧美日韩在线不卡| 久久久影视传媒| 日韩欧美激情在线| 欧美日韩一区二区在线观看视频| 成人开心网精品视频| 国产在线国偷精品产拍免费yy| 丝袜美腿亚洲色图| 亚洲午夜久久久久久久久电影网| 国产精品女同一区二区三区| 久久久亚洲综合| 精品国产成人在线影院| 欧美一区二视频| 911国产精品| 欧美日韩国产一区| 91官网在线免费观看| 99re热这里只有精品视频| 国产成人在线视频网站| 狠狠色丁香九九婷婷综合五月| 日韩激情中文字幕| 视频一区中文字幕国产| 五月开心婷婷久久| 午夜精品福利一区二区三区av| 夜夜亚洲天天久久| 一区二区三区日本| 亚洲午夜久久久久久久久电影网| 一区二区三区欧美激情| 亚洲一区二区三区国产| 亚洲123区在线观看| 性做久久久久久免费观看欧美| 亚洲午夜精品一区二区三区他趣| 一区二区三区精品| 日韩中文欧美在线| 蜜臀a∨国产成人精品| 精品亚洲国内自在自线福利| 精品一二三四区| 成人自拍视频在线观看| 99久久99久久久精品齐齐| 93久久精品日日躁夜夜躁欧美| 91视频一区二区三区| 91福利在线播放| 在线成人高清不卡| 久久一日本道色综合| 国产精品情趣视频| 亚洲一区二区三区四区在线免费观看| 亚洲小说欧美激情另类| 麻豆精品一二三| 高清久久久久久| 欧美亚洲国产bt| 欧美成人在线直播| 中文字幕国产精品一区二区| 一区二区三区四区亚洲| 蜜臀久久久久久久| 国产又粗又猛又爽又黄91精品| 成人激情动漫在线观看| 日本韩国一区二区三区| 日韩欧美一级在线播放| 国产日韩亚洲欧美综合| 一区二区三区在线播放| 麻豆成人综合网| 成人激情小说网站| 91精品国产免费| 国产精品污网站| 亚洲va欧美va人人爽| 国产毛片精品一区| 欧美日韩在线播放三区四区| 日韩久久久久久| 亚洲三级在线播放| 精品一区二区三区免费观看| 色综合天天综合网天天看片| 制服丝袜在线91| 亚洲图片激情小说| 韩国欧美国产一区| 在线视频国内自拍亚洲视频| 337p粉嫩大胆噜噜噜噜噜91av| 亚洲伦理在线免费看| 国产一区二区毛片| 欧美日韩国产综合草草| 国产精品网曝门| 麻豆国产精品官网| 欧美日韩国产天堂| 亚洲色图视频免费播放| 久久精品99国产精品日本| 一本大道久久a久久综合婷婷| 精品国产伦一区二区三区观看方式| 一区二区三区中文在线| 国产成人av电影| 精品人伦一区二区色婷婷| 亚洲福利视频三区| 色综合视频一区二区三区高清| 精品欧美一区二区三区精品久久 | 亚洲婷婷在线视频| 国产精品系列在线播放| 日韩精品一区二区三区蜜臀| 亚洲成在人线在线播放| 91麻豆swag| 亚洲欧洲精品一区二区精品久久久 | 亚洲va韩国va欧美va精品| 91网站在线播放| 欧美国产精品一区二区| 精品一区二区三区视频| 91精品欧美一区二区三区综合在| 亚洲激情综合网| 99精品国产视频| 中文字幕av资源一区| 国产东北露脸精品视频| 26uuu国产日韩综合| 日本大胆欧美人术艺术动态| 欧美日韩视频一区二区| 一区二区日韩av| 在线日韩一区二区| 日韩美女视频19| 99精品视频在线免费观看| 国产精品久久久久三级| 国产精品影视网| 日本一区二区免费在线| 国产成人丝袜美腿| 亚洲国产高清aⅴ视频| 成人深夜福利app| 中文久久乱码一区二区| av电影一区二区| 中文字幕在线观看一区二区| 国产成人精品一区二区三区四区| 精品动漫一区二区三区在线观看| 激情深爱一区二区| 久久久亚洲国产美女国产盗摄 | 欧美大片日本大片免费观看| 久久99最新地址| 久久精品网站免费观看| 波多野结衣中文字幕一区| √…a在线天堂一区| 色狠狠综合天天综合综合| 亚洲成人午夜电影| 日韩午夜电影av| 国产一区二区成人久久免费影院 | 日本高清不卡视频| 亚洲成人综合网站| 欧美成人国产一区二区| 国产ts人妖一区二区| 日韩美女视频一区| 欧美日本一区二区三区四区| 石原莉奈在线亚洲三区| 欧美v国产在线一区二区三区| 国产一区二区伦理| 亚洲精品视频免费看| 日韩午夜三级在线| 菠萝蜜视频在线观看一区| 五月婷婷激情综合| 久久亚洲捆绑美女| 色婷婷av一区二区三区大白胸| 日韩精品高清不卡|