Threat Hunting-ICMP Traffic Analysis

Overview ICMP (Internet Control Message Protocol) Internet Control Message Protocol, which is used to send control messages in TCP/IP networks and is used to transfer control messages between IP hosts and routers. Control messages refer to messages about the network itself, such as network connectivity, whether the host is reachable, and whether routes are available. […]

HCIA: ICMP, Telnet, DHCP

ICMP belongs to the network layer—-IP and ARP also belong to the network layer Transport layer: TCP, UDP Huawei common basic commands <huawei>system-view—-Switch user view to system view [huawei]undo—-delete [huawei]quit—-Exit to the previous view [huawei]display—-View <huawei>reboot—-Restart the device [huawei]sysname—-Modify the system name display version—-View system version Telnet PC side—-use router to represent PC side [PC]interface […]

Memory operation functions (memcpy, memmove, memset, memcmp)—-C language

Article directory Summary 1.memcpy 1.1 Function introduction 1.2 Simulation implementation 2.memmove 2.1 Function introduction 2.2 Simulation implementation 3. memset 3.1 Function introduction 4.memcmp 4.1 Function introduction Abstract This article introduces commonly used memory operation functions in C language, including memcpy, memmove, memset and memcpy. These functions handle the copying, moving, and initialization of memory data. […]

[C Language] Use of strcmp, strstr, strerror, memcpy functions

Article directory 1. strcmp function 1. Function description 2. Function simulation implementation 2. strstr function 1. Function description 2. Function simulation implementation 3. strerror function 1. The role of function 2. Example usage 4. memcpy function 1. Function description 2. Function simulation implementation One, strcmp function 1, function description int strcmp ( const char * […]

[C language simulates the implementation of strncpy function, strncat function, strncmp function, strstr function]

C language programming notes—026 C language simulation implements strncpy function, strncat function, strncmp function, strstr function 1. Introduce the strncpy function 1.1. Simulate and implement strncpy function 2. Introduce the strncat function 2.1. Simulate and implement strncat function 3. Introduce the strncmp function 3.1. Simulate and implement strncmp function 4. Introduce strstr function 4.1. Simulate […]

Do you really understand memory functions (memcpy, memmove, memset, memcmp)?

Blog homepage: Jiang Chijun’s blog ?Inclusion column: The road to advanced C language Column recommendation: ?Beginner’s road to C language ?Exploration of data structure Code repository: Jiang Chijun’s code repository Everyone is welcome to likeCommentCollect? Article directory 1.memcpy function 1.1 [Notes]: 1.2【Example】 Simulation implementation of memcpy 2.memmove function 2.1 [Notes]: 2.2【Example】 Simulation implementation of memmove […]

[Intranet Penetration] Covert communication tunnel technology to establish ICMP tunnel

1. Basic knowledge 1. Overview For general network communication, first establish a TCP connection between the two machines, and then perform normal data communication. When the P address is known, the message can be sent directly: if the P address is not known, the domain name needs to be resolved into the P address. In […]

[Linux5.4] [TUN] Simple use case – simulate ICMP_ECHO packet (ping initiated)

[Linux5.4][TUN] Simple use case – simulate ICMP_ECHO packet (ping initiated) I have written a simple example of simulating ICMP_ECHOREPLY before. Here is a simple example of using the tun module to initiate a ping, which is an example of the ICMP_ECHO packet. IP header verification //IP header verification uint16_t ip_checksum(uint16_t *buf, int size) {<!– –> […]