Location:
Search - packet block
Search list
Description: Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wireless cards, automatic network IP block detection via UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak cryptographic packet logging, and Ethereal and tcpdump compatible packet dump files. It also includes the ability to plot detected networks and estimated network ranges on downloaded maps or user supplied image files.
Kismet是一个针对IEEE802.11b无线局域网的嗅探和包分析器,支持大多数无线网卡,支持自动检测UDP、ARP和DHCP的数据包,支持通过CDP协议检测思科网络设备,支持加密数据包记录,采用与Ethereal和Tcpdump兼容的的数据包记录文件,支持通过用户提供地图来检测和评估无线网络范围。
-Kismet is an 802.11b network sniffers and network dissector. It is capable of sniffing using most wireless cards, automatic network detection via IP block UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak cryptographic packet logging, Ethereal and tcpdump and compatible packet dump files. It also includes the ability to plot detected networks and network estimated ranges on downloaded maps or user supplied image files. Kismet was an IEEE802.11b wireless LAN analyzer and packet sniffer, the majority of wireless LAN support, automatic detection support UDP, DHCP and ARP packets of data to support the agreement through CDP detection Cisco networking equipment, supports encrypted data packets records, and used Ethereal Tcpdump compatible data packets document
Platform: |
Size: 692537 |
Author: 李飞 |
Hits:
Description: 截包的需求一般来自于过滤、转换协议、截取报文分析等。 过滤型的应用比较多,典型为包过滤型防火墙。 转换协议的应用局限于一些特定环境。比如第三方开发网络协议软件,不能够与原有操作系统软件融合,只好采取“嵌入协议栈的块”(BITS)方式实施。比如IPSEC在Windows上的第三方实现,无法和操作系统厂商提供的IP软件融合,只好实现在IP层与链路层之间,作为协议栈的一层来实现。第三方PPPOE软件也是通过这种方式实现。 截取包用于分析的目的,用“抓包”描述更恰当一些,“截包”一般表示有截断的能力,“抓包”只需要能够获取即可。实现上一般作为协议层实现。 本文所说的“应用层截包”特指在驱动程序中截包,然后送到应用层处理的工作模式-cut the demand for general packet from the filter, change the agreement, reported the interception of text analysis. Filter - type applications are more typical for packet filtering firewall. The conversion agreement was limited to a specific application environment. For example, third-party development of network protocol software, not the original operating system software integration, they take "embedded protocol stack block" (BITS) implementation. For instance, IPSEC on Windows third-party realized, unable and operating system vendors to provide IP software integration, but to achieve the IP layer and link layer between as the layer protocol stack to achieve. PPPOE third-party software is achieving in this way. Packet interception for the purpose of analysis, "capturing
Platform: |
Size: 564302 |
Author: 叶红 |
Hits:
Description: 自己做的qq连连看外挂,采用图片分析实现,而不是修改封包(我不知道怎么改,会的朋友教我)-do for myself qq 1000 block of Terry Avenue store, using photo analysis realized, rather than amending the packet (I do not know how changed, the friends taught me)
Platform: |
Size: 30154 |
Author: 祥子 |
Hits:
Description: 一个阻断tcp连接的程序。可以实时的抓包并且经过分析后阻断已建立的tcp联接。-a block tcp connections procedures. Real-time capturing Packet can be analyzed and established blocking tcp connectivity.
Platform: |
Size: 5728 |
Author: 花兮酒兮 |
Hits:
Description: IDEA是一个分组长度为64位的分组密码算法,密钥长度为128位(抗强力攻击能力比DES强),同一算法既可加密也可解密。
IDEA的“混淆”和“扩散”设计原则来自三种运算,它们易于软、硬件实现(加密速度快):
-IDEA is a packet length of the 64 block cipher algorithms, key length of 128 (anti strong offensive capability than-DES), the same encryption algorithm can be declassified. IDEA's "confusion" and "proliferation" design principles from the three operators, easy software and hardware to achieve (encryption speed) :
Platform: |
Size: 8375 |
Author: HCJ |
Hits:
Description: The basic parts of the BFSK transmitter are the preamble and the data input circuit. The preamble sequence is positioned in front of each packet of 122 bits for a total of 128 bits packet. The main purpose of the preamble is to facilitate the reception, providing both bit and packet synchronization. The data input circuit mainly consists from memory elements and a convolutional encoder with r=1/2. Thus, the input bits must be stored in a temporary memory and be partitioned in blocks of 61 bits. Then the convolutional encoder doubles the bits and adds two more trail bits at the end of the message. A multiplexer makes sure that that the correct sequence, choosing between preamble and encoded bit, is propagating to the next stage. The next stage of the transmitter consists of two direct digital synthesizers (DDS), and a multiplexer that is fed with zeros and ones to choose between the two frequencies. For each bit, we allow 64 samples of the respective frequency to be transmitted. Although the implementation of the selection between the two frequencies is strait forward, the enable port of the multiplexer should be used along with a Matlab Code (MCode) block in order to prevent the propagation of some initial undefined states during initialization. The only functionality of the MCode block is to enable the multiplexer after the first bit of the preamble is detected. Finally, pulse shaping is not used and the addition of a single filter after the last multiplexer would suffice to implement this functionality.
Platform: |
Size: 31381 |
Author: publicxz |
Hits:
Description: Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wireless cards, automatic network IP block detection via UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak cryptographic packet logging, and Ethereal and tcpdump compatible packet dump files. It also includes the ability to plot detected networks and estimated network ranges on downloaded maps or user supplied image files.
Kismet是一个针对IEEE802.11b无线局域网的嗅探和包分析器,支持大多数无线网卡,支持自动检测UDP、ARP和DHCP的数据包,支持通过CDP协议检测思科网络设备,支持加密数据包记录,采用与Ethereal和Tcpdump兼容的的数据包记录文件,支持通过用户提供地图来检测和评估无线网络范围。
-Kismet is an 802.11b network sniffers and network dissector. It is capable of sniffing using most wireless cards, automatic network detection via IP block UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak cryptographic packet logging, Ethereal and tcpdump and compatible packet dump files. It also includes the ability to plot detected networks and network estimated ranges on downloaded maps or user supplied image files. Kismet was an IEEE802.11b wireless LAN analyzer and packet sniffer, the majority of wireless LAN support, automatic detection support UDP, DHCP and ARP packets of data to support the agreement through CDP detection Cisco networking equipment, supports encrypted data packets records, and used Ethereal Tcpdump compatible data packets document
Platform: |
Size: 692224 |
Author: 李飞 |
Hits:
Description: 截包的需求一般来自于过滤、转换协议、截取报文分析等。 过滤型的应用比较多,典型为包过滤型防火墙。 转换协议的应用局限于一些特定环境。比如第三方开发网络协议软件,不能够与原有操作系统软件融合,只好采取“嵌入协议栈的块”(BITS)方式实施。比如IPSEC在Windows上的第三方实现,无法和操作系统厂商提供的IP软件融合,只好实现在IP层与链路层之间,作为协议栈的一层来实现。第三方PPPOE软件也是通过这种方式实现。 截取包用于分析的目的,用“抓包”描述更恰当一些,“截包”一般表示有截断的能力,“抓包”只需要能够获取即可。实现上一般作为协议层实现。 本文所说的“应用层截包”特指在驱动程序中截包,然后送到应用层处理的工作模式-cut the demand for general packet from the filter, change the agreement, reported the interception of text analysis. Filter- type applications are more typical for packet filtering firewall. The conversion agreement was limited to a specific application environment. For example, third-party development of network protocol software, not the original operating system software integration, they take "embedded protocol stack block" (BITS) implementation. For instance, IPSEC on Windows third-party realized, unable and operating system vendors to provide IP software integration, but to achieve the IP layer and link layer between as the layer protocol stack to achieve. PPPOE third-party software is achieving in this way. Packet interception for the purpose of analysis, "capturing
Platform: |
Size: 564224 |
Author: 叶红 |
Hits:
Description: 自己做的qq连连看外挂,采用图片分析实现,而不是修改封包(我不知道怎么改,会的朋友教我)-do for myself qq 1000 block of Terry Avenue store, using photo analysis realized, rather than amending the packet (I do not know how changed, the friends taught me)
Platform: |
Size: 29696 |
Author: 祥子 |
Hits:
Description: 一个阻断tcp连接的程序。可以实时的抓包并且经过分析后阻断已建立的tcp联接。-a block tcp connections procedures. Real-time capturing Packet can be analyzed and established blocking tcp connectivity.
Platform: |
Size: 5120 |
Author: 花兮酒兮 |
Hits:
Description: IDEA是一个分组长度为64位的分组密码算法,密钥长度为128位(抗强力攻击能力比DES强),同一算法既可加密也可解密。
IDEA的“混淆”和“扩散”设计原则来自三种运算,它们易于软、硬件实现(加密速度快):
-IDEA is a packet length of the 64 block cipher algorithms, key length of 128 (anti strong offensive capability than-DES), the same encryption algorithm can be declassified. IDEA's "confusion" and "proliferation" design principles from the three operators, easy software and hardware to achieve (encryption speed) :
Platform: |
Size: 8192 |
Author: HCJ |
Hits:
Description: AES的基本要求是,采用对称分组密码体制,密钥长度的最少支持为128、192、256,分组长度128位,算法应易于各种硬件和软件实现。1998年NIST开始AES第一轮分析、测试和征集,共产生了15个候选算法。1999年3月完成了第二轮AES2的分析、测试。美国标准与技术研究院(NIST)于2002年5月26日制定了新的高级加密标准(AES)规范。-AES s basic requirement is that the use of symmetric block cipher system, key length of at least support for the 128,192,256, packet length of 128, the algorithm should be easy to achieve a variety of hardware and software. NIST began in 1998 the first round of AES analysis, testing and assembly, produced a total of 15 candidates algorithm. In March 1999 completed the second round AES2 analysis, testing. United States Institute of Standards and Technology (NIST) in May 26, 2002 to develop a new Advanced Encryption Standard (AES) norms.
Platform: |
Size: 1925120 |
Author: 赖作砰 |
Hits:
Description: 对称/分组密码一般分为流加密(如OFB、CFB等)和块加密(如ECB、CBC等)。对于流加密,需要将分组密码转化为流模式工作。对于块加密(或称分组加密),如果要加密超过块大小的数据,就需要涉及填充和链加密模式,文中提到的ECB和CBC等就是指链加密模式。 本文将要介绍了AES对称加密/分组加密/流密码及其ECB、CBC、CFB、OFB和CTR五种对称加密模式。-Symmetric/block ciphers are generally divided into stream encryption (eg, OFB, CFB, etc.) and block encryption (such as ECB, CBC, etc.). For streaming encryption, block cipher needs to be translated into the work flow model. The encryption block (or block cipher), If you want to encrypt the data block size more than on the need to involve filling and chain encryption mode, the text referred to, such as ECB and CBC encryption mode refers chain. This paper will be introduced the AES symmetric encryption/packet encryption/stream cipher and the ECB, CBC, CFB, OFB and CTR mode in five symmetric encryption.
Platform: |
Size: 382976 |
Author: 王纪 |
Hits:
Description: 《网络安全技术》
实验报告DES是Data Encryption Standard(数据加密标准)的缩写。它是由IBM公司研制的一种加密算法,美国国家标准局于1977年公布把它作为非机要部门使用的数据加密标准,二十年来,它一直活跃在国际保密通信的舞台上,扮演了十分重要的角色。DES是一个分组加密算法,分组长度为64b,密钥长度也为64b,但因为含有8个奇偶校验比特,所以实际密钥长度为56b。DES算法是迄今为止使用最为广泛的加密算法。
有关算法的详细介绍请参阅教材。- Network security technology, the report experimental DES is Data Encryption Standard (Data Encryption Standard) abbreviation. It is developed by IBM as a encryption algorithm, the United States National Bureau of Standards published in 1977 as the use of non-confidential data encryption standard, the last two decades, it has been active in the international arena and secure communication played a a very important role. DES is a block cipher algorithm, packet length 64b, key length for 64b, but because containing eight parity bits, so the actual length of the key 56b. DES algorithm is by far the most widely used encryption algorithm. Details on the algorithm please refer to materials.
Platform: |
Size: 750592 |
Author: ssiy |
Hits:
Description: ES(The Advanced Encryption Standard)是美国国家标准与技术研究所用于加密电子数据的规范。它被预期能成为人们公认的加密包括金融、电信和政府数字信息的方法。
AES 是一个新的可以用于保护电子数据的加密算法。明确地说,AES 是一个迭代的、对称密钥分组的密码,它可以使用128、192 和 256 位密钥,并且用 128 位(16字节)分组加密和解密数据。与公共密钥密码使用密钥对不同,对称密钥密码使用相同的密钥加密和解密数据。通过分组密码返回的加密数据 的位数与输入数据相同。迭代加密使用一个循环结构,在该循环中重复置换(permutations )和替换(substitutions)输入数据。Figure 1 显示了 AES 用192位密钥对一个16位字节数据块进行加密和解密的情形。-ES (The Advanced Encryption Standard) are the United States National Institute of Standards and Technology for encrypting electronic data specification. It is expected to become the recognized encryption including financial, telecommunications and government figure information.
AES is a new electronic data can be used to protect the encryption algorithm. Specifically, AES is an iterative, symmetric-key password packet, it can use the keys 128,192 and 256, and with 128 (16 bytes) packet encryption and decryption of data. Password and public key to use of different keys, symmetric keys use the same password key encryption and decryption of data. Back through the block cipher encryption of data and input data the same as the median. Encrypted using a cycle of iterative structure, in the replacement cycle to repeat (permutations) and replacement (substitutions) input data. Figure 1 shows the AES with 192 keys on a 16-byte data block for encryption and decryption case.
Platform: |
Size: 1024 |
Author: 皮艾尔 |
Hits:
Description: DES是一个分组加密算法,他以64位为分组对数据加密。同时DES也是一个对称算法:加密和解密用的是同一个算法。它的密匙长度是56位(因为每个第8位都用作奇偶校验),密匙可以是任意的56位的数,而且可以任意时候改变。-DES is a block cipher algorithm, his 64-bit data encryption for the packet. At the same time, DES is a symmetric algorithm: encryption and decryption using the same algorithm. Its key length is 56 (since each section are used as 8-bit parity), keys can be arbitrary number of 56, but the time can change.
Platform: |
Size: 495616 |
Author: huhanzhong |
Hits:
Description: Rijndael加密算法是分组长度可变的分组密码。分组长度,密钥长度可以为128,192,256比特。
假设加密的中间结果为状态State。状态State可以用类似于元素为一字节的矩阵来表示,矩阵的行数为4,列数为Nb,Nb等于分组长度除以32。
-Rijndael encryption algorithm is the grouping variable length block cipher. Packet length, key length for the bit 128,192,256. The assumption that an encrypted intermediate results for the state of State. State status is similar to the elements can be used as a matrix of bytes expressed as the number of rows for the matrix 4, the number of rows for the Nb, Nb equal to packet length divided by 32.
Platform: |
Size: 25600 |
Author: 钟惠民 |
Hits:
Description: Simple Packet Filtering Firewall
Developed a firewall for Windows2000
Features:
Start
Stop
Block All
Block Ping
Allow All
Add Rule
View Registered rules
Technology used: Packet Filtering
Platform: |
Size: 11264 |
Author: behrooz |
Hits:
Description: DEMODULATOR: This function performs demodulation of the forward Channel packet, based on RAKE Receiver
Block Diagram
Input Signal -> [Matched Filter] -> [Sampler] -> [RAKE Receiver] -> [Walsh] -> [DeSpreading]
Inputs: RxIn - input signal (I/Q) analoge PN - PN sequence (used for De-spreading) MF - matched filter taps Walsh - Used row of Walsh matrix for recovering
-DEMODULATOR: This function performs demodulation of the forward Channel packet, based on RAKE Receiver
Block Diagram
Input Signal -> [Matched Filter] -> [Sampler] -> [RAKE Receiver] -> [Walsh] -> [DeSpreading]
Inputs: RxIn - input signal (I/Q) analoge PN - PN sequence (used for De-spreading) MF - matched filter taps Walsh - Used row of Walsh matrix for recovering
Platform: |
Size: 2048 |
Author: Roshdy |
Hits:
Description: MIMO系统研究,MIMO系统中空时分组技术的研究-MIMO systems, MIMO systems hollow packet technology
Platform: |
Size: 187392 |
Author: linxiaozhen |
Hits: