# 網路封包筆記3 ``` PowerShell -> Get-FileHash {Path} -Algorithm SHA1 PowerShell -> Get-Help Get-FileHash ``` ### 查詢檔案是否安全: 把上面得到的 hash 放入此網站中查詢 https://www.virustotal.com/gui/home/ ### wireshark filter ``` // 查詢 http http tcp.port == 80 // http tcp.port == 443 // https smtp.data.fragment // ftp 下的 command ftp.request.command // ftp data ftp-data tls.handshake.type == 1 ``` ### exe 檔的特徵 ``` MZ......................@............................................. .!..L.!This program cannot be run in DOS mode. ``` ### 如何使用ARP欺騙技術(ARP spoofing)進行中間人攻擊 https://www.uuu.com.tw/Public/content/article/20/20200217.htm ### Shellshock漏洞原理 https://www.cc.ntu.edu.tw/chinese/epaper/0036/20160321_3610.html ### 筆記 * 網路封包常見軟體工具: * tcpdump(linux)、tcpview(windows) * 3389 port => rdp 遠端桌面 * 網路封包: 流量型、封包型 * email 收、送: POP3、SMTP、IMAP4 * wireshark: 分析、統計、過濾
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up