Home > other >  How to realize the remote attack
How to realize the remote attack

Time:10-05

The teacher asked us to run the offensive or defensive software, and then write an essay,
Due to feel defensive won't write so many words, and then choose the offensive software,
I chose the gray pigeons black against the special edition, and also apply for a free online FTP space,
But according to set the host automatically online tutorial above, the success rate is not dozen zha,
Later in the computer room has realized the network port mapping, but also not to succeed every time,
Is not automatic on-line connection not, is not end button mapping, is this why?
Also, once the good, but it did not appear like a tutorial on a series of IP host,
Baidu said can capture IP with brawny software, then I tried a lot of catch chicken software, then I can say I don't use it,
Then select specializing in 1433 brawny tool, I am in accordance with the tutorial, but not what file does not exist, is a time when the last flash back,
So please everyone a great god taught, recommend a site to grasp chicken tools or the remote control software, had better be you used, can use,
IQ may have low==, so hope to have a tutorial, incidentally,
Don't with remote control, which is when the teacher in class presentation, nor ddos, it is clear what the teacher told can't use the software,
 , too great god help me, little women appreciated, and swear never into IT for you after the great god smear,
==, I do not know it belong to which a module, a post literally picked a, hope that the administrator can see can move to the right place, sorry,

CodePudding user response:

DDOS...

CodePudding user response:

Looking for an ordinary switches have four mouth, even two PCS, then with a network cable to the remaining two butt, then PING a network segment with your local front-end ports, but there is no IP, then the two machines are all dead,
Defense is disconnecting,

CodePudding user response:

The above said is wrong, had better use the HUB, switch may have the STP,

CodePudding user response:

Defense method can also be:
1. Buy a PC more cattle,
2. Rewrite the nic driver,
  • Related