In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Open and run into the DOS interface as we talked about in the first lesson.
Enter netstat-an
Proto (Control Protocol)
The 127.0.0.1 above the Local Address (local address) refers to the local computer, 192.168.13.112, which is the IP address of my computer. 139,445,123,137,139,445,123,137 after the colon. This is the port that my computer opens.
Foreign Address (connected external network address) shows that this port of my computer is connected to the IP address of the external network, 0.0.0.0 is not found to connect.
State (connection status)
Our commonly used ports are generally 135,135,3389, 1433 and 8080. These ports
Port 80: Port 80 is open for HTTP (HyperText Transport Protocol), the hypertext transfer protocol, which is the most frequently used protocol for surfing the Internet, and is mainly used for WWW (World Wide Web), the protocol for transmitting information on the World wide Web. You can use the HTTP address (commonly known as "URL") plus ": 80" to access the website, because the default port number of web browsing service is 80, so you can enter the URL instead of ": 80".
135Port: 135Port is mainly used to use RPC (Remote Procedure Call, remote procedure call) protocol and provide DCOM (distributed component object Model) services. Through RPC, you can ensure that programs running on a computer can successfully execute code on remote computers. Using DCOM, you can communicate directly through the network and transmit across a variety of networks, including HTTP protocols. Port 135is used to remotely open each other's telnet service, to start a RPC connection with a remote computer, and to easily hack into the computer.
Port 445: Port 445 is a mixed reputation port, with which we can easily access a variety of shared folders or shared printers in the local area network, but it is precisely because of it that people have the opportunity to share your hard drive secretly through this port, and even format your hard drive quietly!
Port 1025: the listening port (listen port) dynamically assigned by Windows. After accessing the port anonymously, you can get the server information and user information of the Windows network. Obtaining the user name and server information anonymously means that the user can easily obtain the information of the server. It was previously known that the same information can be obtained through SMB (ports 139,445), but this is the first time that Windows configurations that can obtain this information through other ports have been discovered. What's more, if you can guess the order, not anonymously but pretend to be a formal user to connect, it is possible to execute arbitrary commands.
Port 1433: the default port for SQL Server, and the SQL Server service uses two ports: TCP-1433 and UDP-1434. Of this, 1433 is used for SQL Server to provide services to the outside world, and 1434 is used to return to the requestor which TCP/IP port SQL Server uses.
Port 2383: the default instance of SSAS uses port 2383.
Port 2425: Flying Pigeon Book, feiQ port.
Port 30985: Flying Pigeon Book, feiQ port.
Port 1434 is an unexposed listening port for Microsoft SQL Server. If you want to use SQL, you must open ports 1433 and 1434.
Port 139: the connection that NetBIOS File and Print Sharing enters through this port attempts to obtain the NetBIOS/SMB service. This protocol is used for Windows "File and Printer sharing" and SAMBA. Sharing your hard drive on Internet is probably the most common problem.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
AboutThis level moves on from format1 and shows how specific values can be written in memory.This le
© 2024 shulou.com SLNews company. All rights reserved.