This paper mainly uses Wireshark to analyze the process of receiving e-mail by using POP3 protocol, and uses telnet command for simple operation.
1. POP3 introduction
Post Office Protocol (English: Post Office Protocol, abbreviation: pop) is a member of TCP/IP protocol family and is defined by RFC 1939. This protocol is mainly used to suppo ...
Added by benzrf on Fri, 25 Feb 2022 11:35:18 +0200
In a word, Google DNS 184.108.40.206 will truncate the packet length of Ping response, and there will be different results on the system, but Wireshark packet capture results will show that Ping is not responding.
Start with www.163 Com as an example, Windows defaults to Ping, and the data length is 32.
$ ping www.163.com
Added by eraxian on Mon, 10 Jan 2022 14:53:54 +0200
Kali Linux only does penetration testing in the LAN, which is a little overqualified. Perhaps the long-distance penetration of aircraft with the wind can better reflect its original intention (strong concealment, maybe no trace!). To realize this idea, we need to solve a core problem: how to capture the network traffic of remote LAN? This probl ...
Added by jv2222 on Sun, 09 Jan 2022 18:11:40 +0200
Game client programming
IDE: Visual Studio 2019
C# version: 8.0
Write an online game client. The campus intranet IP address of the game server is 10.1.230.74, the port is 3900, and TCP connection is adopted.
After the connection is successful, the messages sent by the server can be continuously displayed in ...
Added by Cless on Tue, 30 Nov 2021 19:33:00 +0200
What is hexadecimal dump
On a computer, a hexadecimal dump is a hexadecimal view of the computer's data (on screen or paper), either from RAM or from a file or storage deviceViewing hexadecimal data dumps is usually done as part of debugging or reverse engineering.In a hexadecimal dump, each byte (8 bits) is represented as a two-digit hexadeci ...
Added by the DtTvB on Fri, 26 Nov 2021 20:05:27 +0200