Site updated: 2021-04-10 21:53:40
This commit is contained in:
@ -79,13 +79,13 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="控制局域网内的IOT设备中间人攻击—流量分析使用Nmap分析局域网内设备,得到智能设备的IP 小米智能插座:192.168.31.197 网关:192.168.31.147(控制它的手机ip) ettercap嗅探智能设备和网关之间的流量sudo ettercap -i ens33 -T -q -M ARP:remote /192.168.31.197// /192.168.31.147//">
|
||||
<meta name="description" content="局域网内所有的动作都在黑客的掌握之中吗?">
|
||||
<meta name="keywords" content="小米,miio,中间人,重放攻击">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="利用miio控制局域网内的小米智能设备">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2018/12/15/miio-control/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="控制局域网内的IOT设备中间人攻击—流量分析使用Nmap分析局域网内设备,得到智能设备的IP 小米智能插座:192.168.31.197 网关:192.168.31.147(控制它的手机ip) ettercap嗅探智能设备和网关之间的流量sudo ettercap -i ens33 -T -q -M ARP:remote /192.168.31.197// /192.168.31.147//">
|
||||
<meta property="og:description" content="局域网内所有的动作都在黑客的掌握之中吗?">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323434/miio/1.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323435/miio/2.png">
|
||||
@ -95,10 +95,10 @@
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323440/miio/6.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323440/miio/7.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323440/miio/8.png">
|
||||
<meta property="og:updated_time" content="2019-04-15T07:35:38.082Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:43:57.848Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="利用miio控制局域网内的小米智能设备">
|
||||
<meta name="twitter:description" content="控制局域网内的IOT设备中间人攻击—流量分析使用Nmap分析局域网内设备,得到智能设备的IP 小米智能插座:192.168.31.197 网关:192.168.31.147(控制它的手机ip) ettercap嗅探智能设备和网关之间的流量sudo ettercap -i ens33 -T -q -M ARP:remote /192.168.31.197// /192.168.31.147//">
|
||||
<meta name="twitter:description" content="局域网内所有的动作都在黑客的掌握之中吗?">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553323434/miio/1.png">
|
||||
|
||||
|
||||
@ -405,6 +405,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
局域网内所有的动作都在黑客的掌握之中吗?
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -730,7 +734,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,23 +79,23 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="论文来源:USENIX SECURITY 2018:Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices下载:原文pdf中文slides 论文解读概要: 物联网(IoT)设备的快速增长的格局为其管理和安全性带来了重大的技术挑战,因为这些物联网设备来自不同的设备类型,供应商和产品模型。 物联网设备的发现是">
|
||||
<meta name="description" content="提前发现、登记和注释物联网设备">
|
||||
<meta name="keywords" content="USENIX,数据挖掘,自然语言处理">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="基于采集规则引擎的物联网设备发现方法">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2018/12/23/基于规则引擎发现IOT设备/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="论文来源:USENIX SECURITY 2018:Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices下载:原文pdf中文slides 论文解读概要: 物联网(IoT)设备的快速增长的格局为其管理和安全性带来了重大的技术挑战,因为这些物联网设备来自不同的设备类型,供应商和产品模型。 物联网设备的发现是">
|
||||
<meta property="og:description" content="提前发现、登记和注释物联网设备">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313806/ARE/1.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313904/ARE/2.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313904/ARE/4.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313946/ARE/6.png">
|
||||
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313805/ARE/5.png">
|
||||
<meta property="og:updated_time" content="2019-04-15T07:35:38.083Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:33:47.037Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="基于采集规则引擎的物联网设备发现方法">
|
||||
<meta name="twitter:description" content="论文来源:USENIX SECURITY 2018:Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices下载:原文pdf中文slides 论文解读概要: 物联网(IoT)设备的快速增长的格局为其管理和安全性带来了重大的技术挑战,因为这些物联网设备来自不同的设备类型,供应商和产品模型。 物联网设备的发现是">
|
||||
<meta name="twitter:description" content="提前发现、登记和注释物联网设备">
|
||||
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1553313806/ARE/1.png">
|
||||
|
||||
|
||||
@ -402,6 +402,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
提前发现、登记和注释物联网设备
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -730,7 +734,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -79,18 +79,18 @@
|
||||
|
||||
|
||||
|
||||
<meta name="description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析Tcpdump介绍 tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。tcpdump 适用于大多数的类Unix系统 操作系统:包括Linux、Solaris、BSD、Mac OS X、HP-UX和AIX 等等。在这些系统中,tcpdump 需要使用libpcap这个捕捉数据的">
|
||||
<meta name="description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析">
|
||||
<meta name="keywords" content="TCPDUMP,拒绝服务攻击">
|
||||
<meta property="og:type" content="article">
|
||||
<meta property="og:title" content="TCPDUMP拒绝服务攻击漏洞">
|
||||
<meta property="og:url" content="https://cool-y.github.io/2018/12/25/TCPDUMP拒绝服务攻击漏洞/index.html">
|
||||
<meta property="og:site_name" content="混元霹雳手">
|
||||
<meta property="og:description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析Tcpdump介绍 tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。tcpdump 适用于大多数的类Unix系统 操作系统:包括Linux、Solaris、BSD、Mac OS X、HP-UX和AIX 等等。在这些系统中,tcpdump 需要使用libpcap这个捕捉数据的">
|
||||
<meta property="og:description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析">
|
||||
<meta property="og:locale" content="zh-Hans">
|
||||
<meta property="og:updated_time" content="2019-07-01T09:28:40.813Z">
|
||||
<meta property="og:updated_time" content="2021-04-10T13:48:18.517Z">
|
||||
<meta name="twitter:card" content="summary">
|
||||
<meta name="twitter:title" content="TCPDUMP拒绝服务攻击漏洞">
|
||||
<meta name="twitter:description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析Tcpdump介绍 tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。tcpdump 适用于大多数的类Unix系统 操作系统:包括Linux、Solaris、BSD、Mac OS X、HP-UX和AIX 等等。在这些系统中,tcpdump 需要使用libpcap这个捕捉数据的">
|
||||
<meta name="twitter:description" content="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析">
|
||||
|
||||
|
||||
|
||||
@ -396,6 +396,10 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-description">
|
||||
TCPDUMP 4.5.1 拒绝服务攻击漏洞分析
|
||||
</div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
@ -410,7 +414,7 @@
|
||||
|
||||
|
||||
|
||||
<h1 id="TCPDUMP-4-5-1-拒绝服务攻击漏洞分析"><a href="#TCPDUMP-4-5-1-拒绝服务攻击漏洞分析" class="headerlink" title="TCPDUMP 4.5.1 拒绝服务攻击漏洞分析"></a>TCPDUMP 4.5.1 拒绝服务攻击漏洞分析</h1><h2 id="Tcpdump介绍"><a href="#Tcpdump介绍" class="headerlink" title="Tcpdump介绍"></a>Tcpdump介绍</h2><ol>
|
||||
<h2 id="Tcpdump介绍"><a href="#Tcpdump介绍" class="headerlink" title="Tcpdump介绍"></a>Tcpdump介绍</h2><ol>
|
||||
<li>tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。tcpdump 适用于大多数的类Unix系统 操作系统:包括Linux、Solaris、BSD、Mac OS X、HP-UX和AIX 等等。在这些系统中,tcpdump 需要使用libpcap这个捕捉数据的库。其在Windows下的版本称为WinDump;它需要WinPcap驱动,相当于在Linux平台下的libpcap.</li>
|
||||
<li>tcpdump能够分析网络行为,性能和应用产生或接收网络流量。它支持针对网络层、协议、主机、网络或端口的过滤,并提供and、or、not等逻辑语句来帮助你去掉无用的信息,从而使用户能够进一步找出问题的根源。</li>
|
||||
<li>也可以使用 tcpdump 的实现特定目的,例如在路由器和网关之间拦截并显示其他用户或计算机通信。通过 tcpdump 分析非加密的流量,如Telnet或HTTP的数据包,查看登录的用户名、密码、网址、正在浏览的网站内容,或任何其他信息。因此系统中存在网络分析工具主要不是对本机安全的威胁,而是对网络上的其他计算机的安全存在威胁。</li>
|
||||
@ -703,7 +707,7 @@
|
||||
|
||||
|
||||
|
||||
<div class="post-toc-content"><ol class="nav"><li class="nav-item nav-level-1"><a class="nav-link" href="#TCPDUMP-4-5-1-拒绝服务攻击漏洞分析"><span class="nav-text">TCPDUMP 4.5.1 拒绝服务攻击漏洞分析</span></a><ol class="nav-child"><li class="nav-item nav-level-2"><a class="nav-link" href="#Tcpdump介绍"><span class="nav-text">Tcpdump介绍</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#分析环境"><span class="nav-text">分析环境</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#漏洞复现"><span class="nav-text">漏洞复现</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#编译安装tcpdump"><span class="nav-text">编译安装tcpdump</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#生成payload(来自exploit-db-payload)"><span class="nav-text">生成payload(来自exploit-db payload)</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#崩溃分析"><span class="nav-text">崩溃分析</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#pcap包格式"><span class="nav-text">pcap包格式</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#gdb调试"><span class="nav-text">gdb调试</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#内存分析"><span class="nav-text">内存分析</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#漏洞总结"><span class="nav-text">漏洞总结</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#漏洞修补"><span class="nav-text">漏洞修补</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#参考"><span class="nav-text">参考</span></a></li></ol></li></ol></div>
|
||||
<div class="post-toc-content"><ol class="nav"><li class="nav-item nav-level-2"><a class="nav-link" href="#Tcpdump介绍"><span class="nav-text">Tcpdump介绍</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#分析环境"><span class="nav-text">分析环境</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#漏洞复现"><span class="nav-text">漏洞复现</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#编译安装tcpdump"><span class="nav-text">编译安装tcpdump</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#生成payload(来自exploit-db-payload)"><span class="nav-text">生成payload(来自exploit-db payload)</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#崩溃分析"><span class="nav-text">崩溃分析</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#pcap包格式"><span class="nav-text">pcap包格式</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#gdb调试"><span class="nav-text">gdb调试</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#内存分析"><span class="nav-text">内存分析</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#漏洞总结"><span class="nav-text">漏洞总结</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#漏洞修补"><span class="nav-text">漏洞修补</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#参考"><span class="nav-text">参考</span></a></li></ol></div>
|
||||
|
||||
|
||||
</div>
|
||||
@ -735,7 +739,7 @@
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
Reference in New Issue
Block a user