搜索资源列表
ettercap-0.6.7.tar
- Ettercap最初设计为交换网上的sniffer,但是随着发展,它获得了越来越多的功能,成为一款有效的、灵活的中介攻击工具。它支持主动及被动的协议解析并包含了许多网络和主机特性(如OS指纹等)分析。 这里是它的源代码包-Ettercap initially designed for the exchange of online sniffers, but with the development, it was more and more functions into one effect
manganment
- 本文件是关于提高局域网的安全和管理,使你更有效地管理网络.-this document is on the improvement of security and LAN management, and enable you to more effectively manage their networks.
scapy-1.0.5.tar
- Scapy是一种功能强大的网络分组操作工具,可以产生各种分组,扫描网络,网络信息获取和网络分组截获等等。-Scapy is a powerful tool to a network that can give rise to various groups, scan networks, Network access to information and networks group intercepted and so on.
botnet-1[1].6.3.tar
- 这种NAT内部的机器A连接过外网机器C后,NAT会打开一个端口.然后外网的任何发到这个打开的端口的UDP数据报都可以到达A.不管是不是C发过来的-such NAT internal machinery A connecting machines over external networks C, NAT will open a port. Then external networks to any of the open ports of UDP datagrams can be reached
transport
- 有关内网渗透时候的端口转发源程序,欢迎大家使用。在进行外网控内网一台跳板然后控制其他内网机器的工具。-within the network penetration when the port forwarding source, all are welcome to use. Conducting external networks control network within a springboard then control other machines within the networ
little sniffer
- 把网卡设为混杂模式的sniffer 的小例子, vc6.0 , win2000下运行通过, 不用设备驱动程序 只能接受ip包,无法接收与ip包同级的其它网络包,如arp等 listview显示-put mixed mode sniffers small examples, vc6.0, WIN2000 running through without device drivers can only receive ip packet, can not receive the same level
weplab-0.1.5.tar
- Weplab是一个从教育视角审查WEP加密安全性的无线网络工具。它从几次攻击中可以估计出每一个点最小的安全需求。-Weplab is a tool to review the security of WEP encryption in wireless networks from an educational point of view. Several attacks are available so it can be measured the efectiveness and minimu
Build_a_wireless_intrusion_honeypot
- 众所周知无线网络在带来灵活接入的同时安全问题一直以来都是其软肋,企业无线网络或者家庭无线网络都很容易吸引外来“观光者”,一方面WEP,WPA等加密措施的纷纷被破解使得无线加密形同虚设,另一方面无线网络的自动寻网自动连接也让很多“非有意者”连接到你的无线网络中。那么我们该如何防范针对无线网络的攻击和入侵呢?我们是否能够通过必要的措施对入侵者进行反击呢?今天就请各位读者跟随笔者一起反客为主搭建无线入侵蜜罐,让入侵者露出本来面目。-As we all know to bring a flexible
Networking-Essentials-Assign-1(1)
- networking work related to computer networks gives basic formula and examples to solve this
software-architecture-metrics-2
- the proposed routing approaches to relieve this drawback adopts a greedy fashion to relay the packets 27 hop-by-hop by selecting the nearest neighboring vehicle to the destination as the nexthop forwarder. 28 It is an efficient method of packet r
sally-jarkas---A5
- A5 program in mobile networks implemented in matlab
guizewangluo
- 应用matlab程序,构建规则网络,是研究复杂网络不或缺的代码-Application matlab program to simulate a regular network, is the study of complex networks essential program code
suijiwangluo
- 通过matlab仿真出随机网络,对于研究复杂网络有很好的帮助-Through the matlab simulation of random networks, the study of complex networks have a good help
2
- Recent advances in the relevant technologies of contemporary wireless sensor nodes has motivated a growth in the deployment of wireless sensor networks (WSN) for commercial, non-commercial and research applications. In the aforementioned appl
3
- A new kind of wireless multi-hop network architecture called Wireless Mesh Network (WMN) has recently attracted much attention. In this paper, we propose congestion aware multipath routing protocol called EAOMDV-LB for multiradio multiple inter