Welcome![Sign In][Sign Up]
Location:
Search - TCP packet send code

Search list

[TCP/IP stackmyPing

Description: 这是一个简单的Ping程序的实现,模仿了Ping 的原理,对学习TCP/IP协议的朋友很有帮组,可以理解其原理,加深对网络的理解. 在学习中,大家可以相互交流,可以和我联系:QQ 48150181 Email:songshiyou888@163.com ping 是向目的地址发送一个icmp回显请求报文,然后等待回显应答报文 并在超时打印超时信息,本代码没有实现超时检测.-This is a simple procedure to achieve Ping, Ping imitate the principles of learning TCP/IP protocol is to help groups of friends, you can understand the principle, to deepen understanding of the network. During the study, everyone they communicate with each other, you can and contact me: QQ 48150181 Email: songshiyou888@163.comping destination address to send a icmp echo request packet, and then wait for Echo Reply message and print overtime information in overtime, the overtime detection code did not materialize.
Platform: | Size: 4096 | Author: songshiyou | Hits:

[JSP/Javatcp

Description: 用java写的tcp数据包发送和接收代码。-Using java to write the tcp packet send and receive code.
Platform: | Size: 2048 | Author: 杨敏 | Hits:

[TCP/IP stackSendUDP

Description: Japcap发送tcp数据包的原代码示例.-Send tcp packet Japcap the original sample code.
Platform: | Size: 1024 | Author: | Hits:

[Internet-Networksynscan

Description: windows平台vc6项目,在win2000上运行。 不能在winxp sp2及以上版本的windows系统中运行该程序,因为:XP SP2对raw socket做了一些限制,XP SP2仍支持raw socket的接收,但raw socket的发送被限制了: 1) 不能通过raw socket发送TCP报文。做此尝试时会得到10004号错误。 2) 不能通过raw socket发送伪造源IP的UDP报文。 3) 不能通过raw socket发送IP碎片。做此尝试时会得到10004号错误。 微软在tcpip.sys中固化了这些限制,没有注册表项对之调整。惟一已知解决方案是修理tcpip.sys.微软做了这些限制,目的是防止限制恶意代码将主机作为DDoS的工具,而且限制发送伪造IP包的能力。 -windows platform vc6 project, run in win2000. Winxp sp2 and can not be above the windows system to run the program, because: XP SP2 on the raw socket done some restrictions, XP SP2 is still raw socket support the reception, but the raw socket sent by limiting: 1) can not be raw Send TCP packet socket. Attempt to do this would be an error No. 10004. 2) can not send raw socket forged source IP of the UDP packet. 3) can not be raw socket to send IP fragments. Attempt to do this would be an error No. 10004. Microsoft tcpip.sys in curing these restrictions, there is no registry entries for the adjustment. The only known solution is to repair tcpip.sys. Microsoft has done these constraints, the purpose is to prevent malicious code restrictions on the host as a DDoS tools, and a restriction of sending fake IP packet capabilities.
Platform: | Size: 19456 | Author: 莫松成 | Hits:

[TCP/IP stackCode

Description: 此程序为 发送tcp udp 本程序需要安装Winpcap,版本为3.1,其他版本可能造成程序无法正常使用。 开发平台: windows XP SP2 Visual Studio.net 2003-This procedure to send tcp udp This procedure will need to install Winpcap, version 3.1, other versions may result in the procedure not work properly. Development platform: windows XP SP2 Visual Studio.net 2003
Platform: | Size: 630784 | Author: 黎明 | Hits:

[TCP/IP stackTCPS

Description: 计算机网络+课程设计源代码和实验报告+帧封装、IP数据包解析和发送TCP数据包-Computer Network+ curriculum design source code and test reports+ frame encapsulation, IP packet analysis and send TCP packets
Platform: | Size: 2048 | Author: 成军 | Hits:

[.netcSharpddoscode

Description: 自己写的C# DOSS攻击实例 通过tcp 协议是3次握手的方式连接的,第一次客户机向服务器发送一个标志为syn的数据包,这个数据包的tcp部分有个16位随即序列号,而且ip部分和tcp部 分各有一个校验码,发送出去只有校验码正确才会视为合法的数据包,然后如果那个机器那个端口有服务器,比如http服务,就会把序列号+1,然后再生成一 个16位随机序列号,标志syn+ack的数据包返回,服务器就会占着一个信道等待第三次握手了,如果超过预定时间等不到就超时去掉了,这时如果开始那个 syn的源ip地址和源端口是伪造的并大量发送,服务器就会大量的向假ip端口返回syn+ack并等待,这样就大量占着信道了,如果超过了连接限制,别 的机器就连不上了,就拒绝服务了。原理大体就是这个样子了。-Write your own C# DOSS attack instance handshake connection through tcp protocol, the first time the client sends to the server a flag for the syn packet, this packet tcp part of a 16 then the serial number, and ip part and tcp part one on each check code sent only correct checksum will be regarded as the legitimate packets, and then if that machine that port server, such as http service serial number will+1, then regenerated into a 16-bit random serial number, logo syn+ack packet returns, the server will occupy a channel exceeds a predetermined time less than a timeout to remove the wait for the third handshake, then if you start the syn source ip address and the source port and send a large number of forged server will be a lot of to fake ip port to return syn+ack and waiting for, so that a large number of occupied channel, if the connection limit is exceeded, the other machines on the crawl denial of service. Principle roughly like this.
Platform: | Size: 7168 | Author: mjr | Hits:

[Software EngineeringBased-on-the-computer-network-design

Description: 利用Wireshark软件的抓取网络通讯数据并查看网络通讯数据包中每一层的内容的能力,以及NKPP软件发送MAC帧的作用,设计实验。第一步实验中,先打开Wireshark软件开始捕获网络数据包,再登陆校园网关,回到Wireshark软件中筛选出以实验机算机IP为源的数据包,继而查看到登陆网关的用户名和密码以及其通信代码,并验证其在TCP/IP模型中的封装关系。第二步实验中,先重启宿舍交换机,分别在3台计算机上运行Wireshark软件捕获数据包,利用NKPP软件互相发送MAC帧,发现当交换机不知道目的MAC地址对应的端口号时,进行洪泛。-Wireshark software using the network traffic data capture and view network traffic packet contents of each layer' s ability, as well as software to send MAC frames NKPP role design experiments. The first step experiment, first open the Wireshark software to start capturing network packets, and then landing on campus gateway, back to Wireshark software to filter out experimental aircraft as the source computer IP packets, and then view the landing gateway user name and password, and its communication code, and verify the TCP/IP model package relationships. Step two experiments, the first reboot dormitory switches, respectively, in three computer running Wireshark software to capture data packets sent to each other using the NKPP software MAC frames, found that when the switch does not know the destination MAC address corresponding to the port number for flooding.
Platform: | Size: 3785728 | Author: 钱李 | Hits:

[Internet-NetworkINdy10TCP

Description: 用delphi做的TCP的测试程序,主要介绍idTcpclient和idTcpServer的使用。此包两个程序,一个是tcp客户端向服务端发送普通的字符串。服务端对客户端发来的字符串进行显示,并返回信息给客户端。另一个程序介绍TCP客户端如何发送由多个记录组成的数据包到服务端。服务端如何校验消息头和提取消息内容,并返回应答消息包给客户端。代码中每句都有解释,并且有一篇本人自己写的关于本程序的思路和代码意思。目的是希望大家能够互相学习。 程序是使用delphixe3写的,indy版本是indy10.5.9-Delphi do with TCP test procedures, introduces idTcpclient and idTcpServer use. This package two programs, one is tcp client sends to the service of ordinary strings. Server sent to the client to display a string and returns the information to the client. Another procedure describes how to send TCP client multiple records of data packets to the server. How to check the server message header and extract the message content, and returns a response packet to the client. Code each sentence are explained, and there is a I wrote about the idea of ​ ​ this program and code meant. In the hope that we can learn from each other. Procedure is to use delphixe3 written, indy version is indy10.5.9
Platform: | Size: 513024 | Author: jonahking | Hits:

[Driver DevelopDNS_Redirect.ZIP

Description: 驱动级域名劫持 就是访问A.com转到b.com,当然如果改成访问A就丢包,那就变成拦截指定网站了。首先用抓包工具发现,访问某网站时,(如果本地没有该网站的DNS缓存)首先会发DNS查询包(UDP),然后会与该网站建立连接,然后,发http请求包。 观察包内容,需要把发出的包的目标改成我们的目标,然后把响应的包中我们改过的东西改回来,就是欺上瞒下。代码不多,重点是演示了如何获取TCP与UDP的接收到包的内容。仅适用于XP: bin会将www.baidu.com劫持到ip138.com-Drive level domain hijacking is to visit A.com to b.com, of course, if A is dropping into access, it becomes blocked designated site. First discovered by capturing tool, visit a website, (if there is no local DNS cache of the site) will first send a DNS query packets (UDP), then establish a connection with the site, and then send http request packet. Observe the contents of the package, we need to change the target packet sent our goal, then put the package in response to the things we turn to come back, that is, superiors and subordinates. Code much focus is to demonstrate how to get the contents of TCP and UDP packets received. Only applies to XP: bin will www.baidu.com hijacked to ip138.com
Platform: | Size: 5120 | Author: ssss | Hits:

CodeBus www.codebus.net