我要开发一个应用程序,并基本包嗅探。
其中最关键的行动是其安装包嗅探密码司机。
One of the most critical actions is the password sniffer installation with its packet driver.
首先,以包嗅探或包分析模式启动Snort。
First, start Snort up in packet sniffing of packet analysis mode. Then, try a few of these scenarios.
调试可能需要使用网络包嗅探器这样的工具来捕获网络包。
Debugging can involve the use of tools such as network packet sniffers to capture network packets.
这个选项实际上提供了有关snort包嗅探的最详尽的记录(但都是必要的)。
Without getting into unnecessary detail, this option essentially provides the most verbose form of logging that Snort allows for in terms of packet sniffing.
任何人都可以在您的网络或远程计算机上使用包嗅探器查看交换的信息,有时甚至可以查看密码信息。
Anybody with a packet sniffer on your network or on a remote machine can view the information as it is exchanged, sometimes even password information.
入侵检测:从很大程度上讲,入侵检测实际上就是结合了包嗅探和记录功能,并在其上添加一层自动智能层。
Intrusion detection: in lots of ways, intrusion detection is just packet sniffing combined with logging, with a layer of automated intelligence thrown on top of it all.
包嗅探非常出色,但如您所见,Snort的包嗅探模式假设您一直关注着显示器,急切地查看数千行网络数据。
Packet sniffing is great, but as you've seen, Snort's packet sniffing mode assumes you're hunched over your display, eagerly watching as thousands of lines of network data flies by.
从包嗅探、分析一直到向您或管理员发出可能出现入侵的警报,Snort能够保护您的工作成果,使之免受攻击。
From packet sniffing to analysis to alerting you or an admin to possible intrusions, Snort protects your work from attack.
这也是另一篇文章的主题,现在您尝试了使用Snort、使用命令行版本、包嗅探器,但包记录器的更多内容不在此处赘述。
That's also a subject for the next article, so while you're experimenting with Snort, work with the command-line version, the packet sniffer, but hold off on the packet logger for now.
他很有可能寻找集线器上的一个死端口,然后插上安装了包嗅探器的笔记本电脑,该嗅探器可以不加选择地拾取网段上的通信量。
He most likely looked for a dead port on the hub and plugged his laptop in with a packet sniffer installed on it, which promiscuously picks up traffic on a network segment.
大多数的网络嗅探器也能够解码和解密特定的数据包内容,这能够帮助您研究一个已知协议的内容。
Most of the network sniffers will also decode and decipher specific packet contents, which will help you when you want to study the content of a recognized protocol.
此屏幕上的选项均应用于登录:Snort在嗅探包时可以登录数据库。
The options on this screen all apply to logging; Snort can log to databases when it sniffs packets.
如果您不确定,可尝试在您自己的机器上嗅探包,使用您自己的Snort安装,作为辅助,您还需要查看自己的IP地址。
If you're not sure, try sniffing packets on your own machine, with your own installation of Snort. You also might want to check and see what your IP address is to help.
tcpdump工具是一个比较老的工具,它从网上“嗅探”网络数据包,打印到stdout或记录在一个文件中。
The tcpdump tool is an older tool that "sniffs" network packets from a network and either prints them to stdout or logs them to a file.
另外,随着现代网络环境中交换机的大量使用,传统的网络嗅探器不能再监听到在其它主机之间来回传递的数据包。
Besides, with the rapid use of switches in modern network circumstances, the previously used network sniffer programs can not detect the data traffic between other hosts.
嗅探犬好像有不同意见。我可以检查您的包吗?
Our sniffer dog seems to disagree. Do you mind if we look in your suitcase?
基于宽带网络嗅探的实时TCP报文还原处理IP包缓存和TCP连接相关信息维护的内存管理。
The recovering of real-time TCP message based on wide-band networks sniffer deals with memory management for buffer memory of IP packets and TCP connection maintenance.
用FTP上传包含数据库用户名和密码的PHP文件到远程WEB服务器时,恶意的监听者就会通过探嗅数据包来获得密码。
Transferring a PHP file that contains database passwords to your remote Webserver over an insecure protocol like FTP can allow an eavesdropper to sniff the packets and reveal your password.
用FTP上传包含数据库用户名和密码的PHP文件到远程WEB服务器时,恶意的监听者就会通过探嗅数据包来获得密码。
Tranerring a PHP file that contains database passwords to your remote Webserver over an insecure protocol like FTP can allow an eavesdropper to sniff the packets and reveal your password.
用FTP上传包含数据库用户名和密码的PHP文件到远程WEB服务器时,恶意的监听者就会通过探嗅数据包来获得密码。
Tranerring a PHP file that contains database passwords to your remote Webserver over an insecure protocol like FTP can allow an eavesdropper to sniff the packets and reveal your password.
应用推荐