vault backup: 2022-02-02 15:19:28

This commit is contained in:
Daniel Bulant 2022-02-02 15:19:28 +01:00
parent a5c097021f
commit 7ce5491468
5 changed files with 63 additions and 2 deletions

View file

@ -13,7 +13,7 @@
{
"path": "/",
"date": "2022-02-02",
"size": 746124
"size": 748443
}
],
"activityHistory": [
@ -58,7 +58,7 @@
},
{
"date": "2022-02-02",
"value": 3904
"value": 6223
}
]
}

View file

@ -12,6 +12,19 @@ Master boot record.
Partition table na disku (rozdělení na části disků, umožňuje více file systému a další rozdělení)
## POST
Power on self test
Beep Code
## 3 vrstvy
### První vrstva
Flash ROM, dříve EEP ROM
musí být hned dostupná po startu.
detekuje HW
### Druhá vrstva
CMOS čip, ukládá set nastavení BIOS a čas.
### Třetí vrstva
Ovladače jádra OS
Jsou uloženy v základní desce, rozšiřující kartách, v pamětech, v procesoru
zavádějí se v průběhu spouštění systému.
# UEFI
Novější verze BIOSu.

View file

@ -0,0 +1,16 @@
# arp-scan
```
Send ARP packets to hosts (specified as IP addresses or hostnames) to scan the local network. More information: https://github.com/royhills/arp-scan.
- Scan the current local network:
arp-scan --localnet
- Scan an IP network with a custom bitmask:
arp-scan {{192.168.1.1}}/{{24}}
- Scan an IP network within a custom range:
arp-scan {{127.0.0.0}}-{{127.0.0.31}}
- Scan an IP network with a custom net mask:
arp-scan {{10.0.0.0}}:{{255.255.255.0}}
```

30
notes/kbb/tools/nmap.md Normal file
View file

@ -0,0 +1,30 @@
# nmap
Network map
```
Network exploration tool and security / port scanner.Some features only activate when Nmap is run with privileges.More information: https://nmap.org.
- Check if an IP address is up, and guess the remote host's operating system:
nmap -O {{ip_or_hostname}}
- Try to determine whether the specified hosts are up and what their names are:
nmap -sn {{ip_or_hostname}} {{optional_another_address}}
- Like above, but also run a default 1000-port TCP scan if host seems up:
nmap {{ip_or_hostname}} {{optional_another_address}}
- Also enable scripts, service detection, OS fingerprinting and traceroute:
nmap -A {{address_or_addresses}}
- Assume good network connection and speed up execution:
nmap -T4 {{address_or_addresses}}
- Scan a specific list of ports (use -p- for all ports 1-65535):
nmap -p {{port1,port2,…,portN}} {{address_or_addresses}}
- Perform TCP and UDP scanning (use -sU for UDP only, -sZ for SCTP, -sO for IP):
nmap -sSU {{address_or_addresses}}
- Perform full port, service, version detection scan with all default NSE scripts active against a host to determine weaknesses and info:
nmap -sC -sV {{address_or_addresses}}
```

View file

@ -7,5 +7,7 @@ type: folder_brief_live
imagePrefix: 'data/'
```
%% Zoottelkeeper: Beginning of the autogenerated index file list %%
- [[kbb/tools/arp-scan|arp-scan]]
- [[kbb/tools/nmap|nmap]]
- [[kbb/tools/SQLMap|SQLMap]]
%% Zoottelkeeper: End of the autogenerated index file list %%