Welcome![Sign In][Sign Up]
Location:
Search - b-mac

Search list

[Otherfreeradius.tar

Description: RADIUS 服务器介绍 RADIUS服务器支持标准的RADIUS协议,并支持设备提供商自己定义的扩展RADIUS属性,具有高稳定性、高性能、高度可配置性、高负荷量等特点,是宽带网络运营商理想的认证、授权、计费服务器。 特 点 ◆ 支持多种接入方式 PPPoE接入、DHCP+Web接入、专线接入、无线和有线LAN或WAN基于IEEE802.1x的接入 ◆ 支持多种认证类型 PPPoE用户帐号认证、计算机网卡MAC地址认证、计算机IP地址认证、卡用户认证、专线用户认证、 用户VLAN ID认证等等。 ◆ 支持多种认证方式 PPP PAP认证、PPP CHAP认证、PPP MS-CHAP认证、Unix系统认证、PAM认证、ARAP认证、LDAP认证、EAP/MD5和EAP/TLS认证。 ◆ 支持多种上网控制方式 上网时长控制、上网时段控制、累积时长控制、空闲时长控制、带宽控制。 ◆ 支持漫游特性 A城市的用户在B城市上网,可将用户计费信息发往A城市的RADIUS服务器。 -RADIUS server on the server supports standard RADIUS agreement and support equipment providers to expand their definition of RADIUS attributes, with high stability, high performance, highly configurable, high-load characteristics, is a broadband network operators an ideal authentication, authorization, billing server . features support for multiple access methods PPPoE access, DHCP Web access, leased lines, wireless and cable-based LAN or WAN access IEEE802.1x supports multiple authentication type PPPoE user account authentication, the computer network card MAC address authentication, the computer IP address authentication, the card users certification, green user authentication, user authentication, etc. VLAN ID. supports multiple authentication methods PPP PAP authentication, P
Platform: | Size: 1844720 | Author: 刘先生 | Hits:

[OtherB-MAC

Description: 无线传感网络MAC层代码,适用树状的网络拓扑图以及信息收集-wireless sensor networks MAC layer code, the applicable tree network topology map and information collection
Platform: | Size: 226051 | Author: 夏雪 | Hits:

[OS programSnifferPro

Description: 1.能够侦听所有进出本主机的数据包完整显示数据包头信息和内容 MAC层支持:以太帧 网络层支持:IP,ARP,RARP,ICMP 传输层支持:TCP,UDP 2. 以十六进制显示报文每个字节内容(包括头和数据),指定某个字段时,使相应字节高亮显示。如点击IP Source Address(在解析树中),则相应的四个字节高亮。 3. 可以设置过滤,指定IP地址,指定报文类型(TCP,UDP,ICMP,ARP,RARP),指定方向(A地址->B地址,B地址->A地址,A地址<->B地址),侦探相应的数据包。 4. 统计过滤后收到的报文个数和总字节数,并显示整个网络建议状况(以进度条显示流量,状态栏显示数据) 5. 对分成多个TCP传输的文件重组,去除头信息,得到数据内容,并可以显示或输出到文件。例如,FTP传输RM时,可以将探测到的TCP包重组并保存至文件,就可以观看了。-1. Monitors all access to the mainframe data packet integrity of the data shows that the information and content Baotou MAC layer support : Ethernet frame network layer support : IP, ARP, RARP, ICMP transport layer support : TCP, UDP 2. 16 to 229 shows each byte packet content (including the first and data), a designated field, so that the corresponding byte highlighter. If it IP Source Address (analytic tree), the corresponding 4 byte highlighter. 3. Can provide filtration, the designated IP address, designated packet type (TCP, UDP, ICMP, ARP, RARP), the designated direction (address A -
Platform: | Size: 477390 | Author: 徐新 | Hits:

[DocumentsRT2880

Description: The Ralink 802.11n Chipset family provides solutions for PCI, PCIe and USB interfaces with both 2.4 and 2.4/5GHz suppport. Each chipset consists of two highly integrated ICs (RFIC and BB/MAC IC) that fully comply with current draft IEEE 802.11n and IEEE 802.11a/b/g standards.
Platform: | Size: 4527573 | Author: chenq | Hits:

[DocumentsARP欺骗原理

Description: 一,什么是ARP协议? ARP协议是“Address Resolution Protocol”(地址解析协议)的缩写。在局域网中,网络中实际传输的是“帧”,帧里面是有目标主机的MAC地址的。在以太网中,一个主机要和另一个主机进行直接通信,必须要知道目标主机的MAC地址。但这个目标MAC地址是如何获得的呢?它就是通过地址解析协议获得的。所谓“地址解析”就是主机在发送帧前将目标IP地址转换成目标MAC地址的过程。ARP协议的基本功能就是通过目标设备的IP地址,查询目标设备的MAC地址,以保证通信的顺利进行。所以说从某种意义上讲ARP协议是工作在更低于IP协议的协议层。这也是为什么ARP欺骗更能够让人在神不知鬼不觉的情况下出现网络故障,他的危害更加隐蔽。 二,ARP欺骗的原理: 首先我们可以肯定一点的就是发送ARP欺骗包是通过一个恶毒的程序自动发送的,正常的TCP/IP网络是不会有这样的错误包发送的,而人工发送又比较麻烦。也就是说当黑客没有运行这个恶毒程序的话,网络上通信应该是一切正常的,保留在各个连接网络计算机上的ARP缓存表也应该是正确的,只有程序启动开始发送错误ARP信息以及ARP欺骗包时才会让某些计算机访问网络出现问题。接下来我们来阐述下ARP欺骗的原理。 第一步:假设这样一个网络,一个Hub或交换机连接了3台机器,依次是计算机A,B,C。 A的地址为:IP:192.168.1.1 MAC: AA-AA-AA-AA-AA-AA B的地址为:IP:192.168.1.2 MAC: BB-BB-BB-BB-BB-BB C的地址为:IP:192.168.1.3 MAC: CC-CC-CC-CC-CC-CC 第二步:正常情况下在A计算机上运行ARP -A查询ARP缓存表应该出现如下信息。 Interface: 192.168.1.1 on Interface 0x1000003 Internet Address Physical Address Type 192.168.1.3 CC-CC-CC-CC-CC-CC dynamic 第三步:在计算机B上运行ARP欺骗程序,来发送ARP欺骗包。 B向A发送一个自己伪造的ARP应答,而这个应答中的数据为发送方IP地址是192.168.10.3(C的IP地址),MAC地址是DD-DD-DD-DD-DD-DD(C的MAC地址本来应该是CC-CC-CC-CC-CC-CC,这里被伪造了)。当A接收到B伪造的ARP应答,就会更新本地的ARP缓存(A可不知道被伪造了)。而且A不知道其实是从B发送过来的,A这里只有192.168.10.3(C的IP地址)和无效的DD-DD-DD-DD-DD-DD mac地址。 第四步:欺骗完毕我们在A计算机上运行ARP -A来查询ARP缓存信息。你会发现原来正确的信息现在已经出现了错误。 Interface: 192.168.1.1 on Interface 0x1000003 Internet Address Physical Address Type 192.168.1.3 DD-DD-DD-DD-DD-DD dynamic 从上面的介绍我们可以清楚的明白原来网络中传输数据包最后都是要根据MAC地址信息的,也就是说虽然我们日常通讯都是通过IP地址,但是最后还是需要通过ARP协议进行地址转换,将IP地址变为MAC地址。而上面例子中在计算机A上的关于计算机C的MAC地址已经错误了,所以即使以后从A计算机访问C计算机这个192.168.1.3这个地址也会被ARP协议错误的解析成MAC地址为DD-DD-DD-DD-DD-DD的。 问题也会随着ARP欺骗包针对网关而变本加厉,当局域网中一台机器,反复向其他机器,特别是向网关,发送这样无效假冒的ARP应答信息包时,严重的网络堵塞就会开始。由于网关MAC地址错误,所以从网络中计算机发来的数据无法正常发到网关,自然无法正常上网。这就造成了无法访问外网的问题,另外由于很多时候网关还控制着我们的局域网LAN上网,所以这时我们的LAN访问也就出现问题了。 三,ARP欺骗的危害: 前面也提到了ARP欺骗可以造成内部网络的混乱,让某些被欺骗的计算机无法正常访问内外网,让网关无法和客户端正常通信。实际上他的危害还不仅仅如此,一般来说IP地址的冲突我们可以通过多种方法和手段来避免,而ARP协议工作在更低层,隐蔽性更高。系统并不会判断ARP缓存的正确与否,无法像IP地址冲突那样给出提示。而且很多黑客工具例如网络剪刀手等,可以随时发送ARP欺骗数据包和ARP恢复数据包,这样就可以实现在一台普通计算机上通过发送ARP数据包的方法来控制网络中任何一台计算机的上网与否,甚至还可以直接对网关进行攻击,让所有连接网络的计算机都无法正常上网。这点在以前是不可能的,因为普通计算机没有管理权限来控制网关,而现在却成为可能,所以说ARP欺骗的危害是巨大的,而且非常难对付,非法用户和恶意用户可以随时发送ARP欺骗和恢复数据包,这样就增加了网络管理员查找真凶的难度。
Platform: | Size: 2123 | Author: duohao163 | Hits:

[OtherB-MAC

Description: 无线传感网络MAC层代码,适用树状的网络拓扑图以及信息收集-wireless sensor networks MAC layer code, the applicable tree network topology map and information collection
Platform: | Size: 225280 | Author: 夏雪 | Hits:

[Sniffer Package captureSnifferPro

Description: 1.能够侦听所有进出本主机的数据包完整显示数据包头信息和内容 MAC层支持:以太帧 网络层支持:IP,ARP,RARP,ICMP 传输层支持:TCP,UDP 2. 以十六进制显示报文每个字节内容(包括头和数据),指定某个字段时,使相应字节高亮显示。如点击IP Source Address(在解析树中),则相应的四个字节高亮。 3. 可以设置过滤,指定IP地址,指定报文类型(TCP,UDP,ICMP,ARP,RARP),指定方向(A地址->B地址,B地址->A地址,A地址<->B地址),侦探相应的数据包。 4. 统计过滤后收到的报文个数和总字节数,并显示整个网络建议状况(以进度条显示流量,状态栏显示数据) 5. 对分成多个TCP传输的文件重组,去除头信息,得到数据内容,并可以显示或输出到文件。例如,FTP传输RM时,可以将探测到的TCP包重组并保存至文件,就可以观看了。-1. Monitors all access to the mainframe data packet integrity of the data shows that the information and content Baotou MAC layer support : Ethernet frame network layer support : IP, ARP, RARP, ICMP transport layer support : TCP, UDP 2. 16 to 229 shows each byte packet content (including the first and data), a designated field, so that the corresponding byte highlighter. If it IP Source Address (analytic tree), the corresponding 4 byte highlighter. 3. Can provide filtration, the designated IP address, designated packet type (TCP, UDP, ICMP, ARP, RARP), the designated direction (address A-
Platform: | Size: 477184 | Author: 虚心 | Hits:

[BooksRT2880

Description: The Ralink 802.11n Chipset family provides solutions for PCI, PCIe and USB interfaces with both 2.4 and 2.4/5GHz suppport. Each chipset consists of two highly integrated ICs (RFIC and BB/MAC IC) that fully comply with current draft IEEE 802.11n and IEEE 802.11a/b/g standards.
Platform: | Size: 4527104 | Author: chenq | Hits:

[SCMtime

Description: FIQ有FIQ_PWM、FIQ_TMA和FIQ_TMB三个中断源,当定时器A或B计满溢出时产生中断请求信号TA_TIMEOUT_INT或TA_TIMEOUT_INT,CPU响应后进入中断执行相应的子程序控制二极管发光。A口的低四位接LED灯,B口的低四位接LED灯.-FIQ has FIQ_PWM, FIQ_TMA and FIQ_TMB three interrupt sources, when the timer A or B when the expiration overflow interrupt request signal TA_TIMEOUT_INT or TA_TIMEOUT_INT, CPU response after interruption of the implementation of the corresponding subprogram control light-emitting diodes. A low population of four LED lights then, B I take the low four LED lights.
Platform: | Size: 2048 | Author: hhxxttxs | Hits:

[Graph RecognizeOCR-B10BT

Description: 二代身份证号码字体文件,由Mac字体文件转换得来-Second-generation ID card number of font files, font files from Mac to convert a
Platform: | Size: 14336 | Author: kkroy | Hits:

[Graph programmatchgame

Description: 两个乒乓球队进行比赛,各出三人。甲队为a,b,c三人,乙队为x,y,z三人。已抽签决定 比赛名单。有人向队员打听比赛的名单。a说他不和x比,c说他不和x,z比,请编程序找出 三队赛手的名单。 -2 table tennis team to compete, each offering three. A team of a, b, c three-, B team for the x, y, z three. Match list has been determined by lot. The game was made to inquire about the list of players. a said he did not and the x ratio, c said he did not, and x, z ratio, please programmed to identify a list of three teams racing.
Platform: | Size: 2048 | Author: zhang | Hits:

[OtherB-MACandXMesh

Description: 自己做的演示用的PPT,讲crossbow的WSN平台用的低功耗MAC协议和XMesh路由协议的。对研究crossbow平台很有帮助-Make their own presentation using PPT, speaking crossbow used in the WSN platform, low-power MAC protocols and routing protocols XMesh. Useful platform for the study of crossbow
Platform: | Size: 536576 | Author: 张道远 | Hits:

[Internet-NetworkArpingTest

Description: 此程序可以发现网络中的主机,检测某一给定IP是否被启用,若存在此IP,可以获取该IP对应的MAC地址,该程序实现的功能类似于PING,用ARP协议来探测网内主机。-This program can be found in the host network to detect whether a given IP is enabled, if the existence of this IP, you can get the IP corresponding to the MAC address, the program is similar in function to implement PING, with the ARP protocol to detect intra-host .
Platform: | Size: 186368 | Author: pop | Hits:

[Internet-Networkarp

Description: ARP欺骗攻击程序。Hacker发送伪装的ARP Reply告诉A,计算机B的MAC地址是Hacker计算机的MAC地址。 Hacker发送伪装的ARP Reply告诉B,计算机A的MAC地址是Hacker计算机的MAC地址。 这样A与B之间的通讯都将先经过Hacker,然后由Hacker进行转发。于是Hacker可以捕获到所有A与B之间的数据传输(如用户名和密码)。 -ARP spoofing attack program. Hacker sends fake ARP Reply told A, Computer B' s MAC address is the MAC address of a computer Hacker. Hacker sends fake ARP Reply told B, computer A' s MAC address is the MAC address of a computer Hacker. This communication between A and B will go through Hacker, and then carried forward by the Hacker. Hacker can then capture all the data between A and B transmission (such as user name and password).
Platform: | Size: 8192 | Author: yoyo | Hits:

[Communicationieee.std_802.15.4-2006

Description: 802.15.4 doc, include z-mac,t-mac,s-mac, etc-802.15.4 doc, include z-mac,t-mac,s-mac, etc..
Platform: | Size: 14295040 | Author: mr.jeon | Hits:

[ARM-PowerPC-ColdFire-MIPSrvds4.crack

Description: 将所有文件解压到RVDS的安装目录下(如:f:\ARM\),执行crack.bat license是rvds.dat,把别忘了替换网卡MAC 会有fail提示,正常。 只能执行一次,多了会出问题-Extract all the files to the installation directory RVDS (eg: f: \ ARM \), the implementation of crack.bat license is rvds.dat, the MAC do not forget to replace the card will fail tips, normal. Can only be executed once, more will go wrong
Platform: | Size: 20563968 | Author: ljb | Hits:

[Communication-MobileB-MAC

Description: mac layer wireless sensor network
Platform: | Size: 225280 | Author: rajdeep | Hits:

[Otherseminar

Description: 无线传感器网络MAC协议介绍,主要介绍b-MAC和x-mesh路由协议-The introduction of b-mac in wireless sensor network
Platform: | Size: 540672 | Author: 王晓 | Hits:

[Linux-UnixB-MAC

Description: implement B-MAC protocol in NS2
Platform: | Size: 3072 | Author: khalil | Hits:

[Program docMAC-Protocols-for-WSNs-Survey

Description: MAC Protocols for WSNs Survey(X-MAc, B-MAC,...)
Platform: | Size: 470016 | Author: Nader | Hits:
« 12 »

CodeBus www.codebus.net