该文被密码保护。 阅读全文
posted @ 2014-01-31 05:37 群叔 阅读(8) 评论(0) 推荐(0) 编辑
摘要: 转载这位朋友[地址]几个cpumore /proc/cpuinfo |grep "physical id"|uniq|wc -l每个cpu是几核(假设cpu配置相同)more /proc/cpuinfo |grep "physical id"|grep "0"|wc -lcat /proc/cpuinfo | grep processor1. 查看物理CPU的个数#cat /proc/cpuinfo |grep "physical id"|sort |uniq|wc -l2. 查看逻辑CPU的个数#cat /pro 阅读全文
posted @ 2014-01-31 05:19 群叔 阅读(279) 评论(0) 推荐(0) 编辑
摘要: hydra可以破解:http://www.thc.org/thc-hydra,可支持AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL,MYSQL, NCP, NNTP,OracleListener, Or 阅读全文
posted @ 2014-01-31 02:28 群叔 阅读(2947) 评论(0) 推荐(0) 编辑
摘要: #1.扫描内网存活主机nmap -sP 10.2.24.* |grep for > tmp#2.扫描主机端口nmap -A -T4 192.168.1.2#3.扫描主机的所有端口nmap -p 1-65535 192168.1.2#4.扫描主机的操作系统nmap -O 192.168.1.2#5.扫描漏洞nmap -script=smb-check-vulns.nse -v 192.168.1.2#6.综合参数扫描目标主机nmap -sS -sV -O -script=smb-check-vulns.nse 192.168.1.24种常用的扫描1.nmap -sP 1.1.1.1/24探 阅读全文
posted @ 2014-01-31 01:57 群叔 阅读(4296) 评论(0) 推荐(0) 编辑