mirror of
https://github.com/danbulant/notes
synced 2026-05-19 04:18:49 +00:00
vault backup: 2022-02-02 15:19:28
This commit is contained in:
parent
a5c097021f
commit
7ce5491468
5 changed files with 63 additions and 2 deletions
|
|
@ -13,7 +13,7 @@
|
|||
{
|
||||
"path": "/",
|
||||
"date": "2022-02-02",
|
||||
"size": 746124
|
||||
"size": 748443
|
||||
}
|
||||
],
|
||||
"activityHistory": [
|
||||
|
|
@ -58,7 +58,7 @@
|
|||
},
|
||||
{
|
||||
"date": "2022-02-02",
|
||||
"value": 3904
|
||||
"value": 6223
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
|||
|
|
@ -12,6 +12,19 @@ Master boot record.
|
|||
Partition table na disku (rozdělení na části disků, umožňuje více file systému a další rozdělení)
|
||||
## POST
|
||||
Power on self test
|
||||
Beep Code
|
||||
|
||||
## 3 vrstvy
|
||||
### První vrstva
|
||||
Flash ROM, dříve EEP ROM
|
||||
musí být hned dostupná po startu.
|
||||
detekuje HW
|
||||
### Druhá vrstva
|
||||
CMOS čip, ukládá set nastavení BIOS a čas.
|
||||
### Třetí vrstva
|
||||
Ovladače jádra OS
|
||||
Jsou uloženy v základní desce, rozšiřující kartách, v pamětech, v procesoru
|
||||
zavádějí se v průběhu spouštění systému.
|
||||
|
||||
# UEFI
|
||||
Novější verze BIOSu.
|
||||
|
|
|
|||
16
notes/kbb/tools/arp-scan.md
Normal file
16
notes/kbb/tools/arp-scan.md
Normal file
|
|
@ -0,0 +1,16 @@
|
|||
# arp-scan
|
||||
```
|
||||
Send ARP packets to hosts (specified as IP addresses or hostnames) to scan the local network. More information: https://github.com/royhills/arp-scan.
|
||||
|
||||
- Scan the current local network:
|
||||
arp-scan --localnet
|
||||
|
||||
- Scan an IP network with a custom bitmask:
|
||||
arp-scan {{192.168.1.1}}/{{24}}
|
||||
|
||||
- Scan an IP network within a custom range:
|
||||
arp-scan {{127.0.0.0}}-{{127.0.0.31}}
|
||||
|
||||
- Scan an IP network with a custom net mask:
|
||||
arp-scan {{10.0.0.0}}:{{255.255.255.0}}
|
||||
```
|
||||
30
notes/kbb/tools/nmap.md
Normal file
30
notes/kbb/tools/nmap.md
Normal file
|
|
@ -0,0 +1,30 @@
|
|||
# nmap
|
||||
Network map
|
||||
|
||||
```
|
||||
Network exploration tool and security / port scanner.Some features only activate when Nmap is run with privileges.More information: https://nmap.org.
|
||||
|
||||
- Check if an IP address is up, and guess the remote host's operating system:
|
||||
nmap -O {{ip_or_hostname}}
|
||||
|
||||
- Try to determine whether the specified hosts are up and what their names are:
|
||||
nmap -sn {{ip_or_hostname}} {{optional_another_address}}
|
||||
|
||||
- Like above, but also run a default 1000-port TCP scan if host seems up:
|
||||
nmap {{ip_or_hostname}} {{optional_another_address}}
|
||||
|
||||
- Also enable scripts, service detection, OS fingerprinting and traceroute:
|
||||
nmap -A {{address_or_addresses}}
|
||||
|
||||
- Assume good network connection and speed up execution:
|
||||
nmap -T4 {{address_or_addresses}}
|
||||
|
||||
- Scan a specific list of ports (use -p- for all ports 1-65535):
|
||||
nmap -p {{port1,port2,…,portN}} {{address_or_addresses}}
|
||||
|
||||
- Perform TCP and UDP scanning (use -sU for UDP only, -sZ for SCTP, -sO for IP):
|
||||
nmap -sSU {{address_or_addresses}}
|
||||
|
||||
- Perform full port, service, version detection scan with all default NSE scripts active against a host to determine weaknesses and info:
|
||||
nmap -sC -sV {{address_or_addresses}}
|
||||
```
|
||||
|
|
@ -7,5 +7,7 @@ type: folder_brief_live
|
|||
imagePrefix: 'data/'
|
||||
```
|
||||
%% Zoottelkeeper: Beginning of the autogenerated index file list %%
|
||||
- [[kbb/tools/arp-scan|arp-scan]]
|
||||
- [[kbb/tools/nmap|nmap]]
|
||||
- [[kbb/tools/SQLMap|SQLMap]]
|
||||
%% Zoottelkeeper: End of the autogenerated index file list %%
|
||||
|
|
|
|||
Loading…
Reference in a new issue