diff --git a/notes/.obsidian/plugins/obsidian-activity-history/data.json b/notes/.obsidian/plugins/obsidian-activity-history/data.json index 86d1b80..2bf63b0 100644 --- a/notes/.obsidian/plugins/obsidian-activity-history/data.json +++ b/notes/.obsidian/plugins/obsidian-activity-history/data.json @@ -13,7 +13,7 @@ { "path": "/", "date": "2022-02-02", - "size": 746124 + "size": 748443 } ], "activityHistory": [ @@ -58,7 +58,7 @@ }, { "date": "2022-02-02", - "value": 3904 + "value": 6223 } ] } diff --git a/notes/har/BIOS.md b/notes/har/BIOS.md index cb20a13..f23f069 100644 --- a/notes/har/BIOS.md +++ b/notes/har/BIOS.md @@ -12,6 +12,19 @@ Master boot record. Partition table na disku (rozdělení na části disků, umožňuje více file systému a další rozdělení) ## POST Power on self test +Beep Code + +## 3 vrstvy +### První vrstva +Flash ROM, dříve EEP ROM +musí být hned dostupná po startu. +detekuje HW +### Druhá vrstva +CMOS čip, ukládá set nastavení BIOS a čas. +### Třetí vrstva +Ovladače jádra OS +Jsou uloženy v základní desce, rozšiřující kartách, v pamětech, v procesoru +zavádějí se v průběhu spouštění systému. # UEFI Novější verze BIOSu. diff --git a/notes/kbb/tools/arp-scan.md b/notes/kbb/tools/arp-scan.md new file mode 100644 index 0000000..9dcd23d --- /dev/null +++ b/notes/kbb/tools/arp-scan.md @@ -0,0 +1,16 @@ +# arp-scan +``` +Send ARP packets to hosts (specified as IP addresses or hostnames) to scan the local network. More information: https://github.com/royhills/arp-scan. + + - Scan the current local network: + arp-scan --localnet + + - Scan an IP network with a custom bitmask: + arp-scan {{192.168.1.1}}/{{24}} + + - Scan an IP network within a custom range: + arp-scan {{127.0.0.0}}-{{127.0.0.31}} + + - Scan an IP network with a custom net mask: + arp-scan {{10.0.0.0}}:{{255.255.255.0}} +``` diff --git a/notes/kbb/tools/nmap.md b/notes/kbb/tools/nmap.md new file mode 100644 index 0000000..5d6015f --- /dev/null +++ b/notes/kbb/tools/nmap.md @@ -0,0 +1,30 @@ +# nmap +Network map + +``` +Network exploration tool and security / port scanner.Some features only activate when Nmap is run with privileges.More information: https://nmap.org. + + - Check if an IP address is up, and guess the remote host's operating system: + nmap -O {{ip_or_hostname}} + + - Try to determine whether the specified hosts are up and what their names are: + nmap -sn {{ip_or_hostname}} {{optional_another_address}} + + - Like above, but also run a default 1000-port TCP scan if host seems up: + nmap {{ip_or_hostname}} {{optional_another_address}} + + - Also enable scripts, service detection, OS fingerprinting and traceroute: + nmap -A {{address_or_addresses}} + + - Assume good network connection and speed up execution: + nmap -T4 {{address_or_addresses}} + + - Scan a specific list of ports (use -p- for all ports 1-65535): + nmap -p {{port1,port2,…,portN}} {{address_or_addresses}} + + - Perform TCP and UDP scanning (use -sU for UDP only, -sZ for SCTP, -sO for IP): + nmap -sSU {{address_or_addresses}} + + - Perform full port, service, version detection scan with all default NSE scripts active against a host to determine weaknesses and info: + nmap -sC -sV {{address_or_addresses}} +``` diff --git a/notes/kbb/tools/tools.md b/notes/kbb/tools/tools.md index 21b82fe..437eff8 100644 --- a/notes/kbb/tools/tools.md +++ b/notes/kbb/tools/tools.md @@ -7,5 +7,7 @@ type: folder_brief_live imagePrefix: 'data/' ``` %% Zoottelkeeper: Beginning of the autogenerated index file list %% +- [[kbb/tools/arp-scan|arp-scan]] +- [[kbb/tools/nmap|nmap]] - [[kbb/tools/SQLMap|SQLMap]] %% Zoottelkeeper: End of the autogenerated index file list %%