登录
首页 » Scanner » 通过发送自己构造的数据包来检测端口是否可以连接

通过发送自己构造的数据包来检测端口是否可以连接

于 2023-06-27 发布 文件大小:6.76 kB
0 80
下载积分: 2 下载次数: 1

代码说明:

通过发送自己构造的数据包来检测端口是否可以连接 -Detecting the port whether can be connected through sending the your own packets

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 端口扫描基本程序二
    端口扫描基本程序二-port scanning two basic procedures
    2022-03-02 21:41:02下载
    积分:1
  • 扫描一定范围的IP地址查找主机名
    扫描一定范围的IP地址查找主机名 -Scanning IP address and searching machine in certain domain
    2022-02-12 14:35:33下载
    积分:1
  • 一个开放的
    An open-source security scanner and exploiting framework for Microsoft Windows
    2022-02-03 09:24:49下载
    积分:1
  • kalman滤波实现目标跟踪 简洁明了
    kalman滤波实现目标跟踪 简洁明了-Kalman filter tracking concise
    2022-09-04 11:25:03下载
    积分:1
  • 半连接扫描的源程序
    半连接扫描的源程序-Semi-connected source scan
    2022-05-24 01:09:25下载
    积分:1
  • tftp 服务器和客户端 软件,功能强大!
    tftp 服务器和客户端 软件,功能强大!-tftp server and client software, powerful!
    2023-03-26 22:45:03下载
    积分:1
  • 查询wingate的程序
    查询wingate的程序 -Wingate scaner
    2022-07-26 02:45:40下载
    积分:1
  • 端口扫描程序,发现端口是否开启
    端口扫描程序,发现端口是否开启-port scanning procedures, whether to open ports found
    2022-02-06 12:18:31下载
    积分:1
  • d
    2022-09-10 15:45:04下载
    积分:1
  • 命运是一个802.11层的无线网络探测器,嗅探,和入侵检测。
    Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic. -Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic.
    2022-07-19 02:59:33下载
    积分:1
  • 696518资源总数
  • 105549会员总数
  • 12今日下载