Questions about this topic? Sign up to ask in the talk tab.

Search results

From NetSec
Jump to: navigation, search
  • ...r your most basic query, do something like: whois -h whois.arin.net "4.2.2.1" # "n 4.2.2.1"
    9 KB (1,390 words) - 00:32, 16 June 2012
  • | 1 | 1
    873 B (114 words) - 07:18, 19 July 2012
  • .... In our example, we will make an is_integer function that returns either 1 or undef depending on whether the scalar passed is an integer or not. return 1 if (int($scalar) == $scalar);
    765 B (120 words) - 04:18, 16 July 2012
  • $switch = 1 if ($counter > 100); It is possible to create an infinite loop using '''while (1) { ... }'''.
    364 B (48 words) - 03:58, 16 July 2012
  • $switch = 1 if ($counter > 100);
    294 B (37 words) - 03:58, 16 July 2012
  • print $messages[1];
    354 B (52 words) - 01:16, 19 July 2012
  • print $messages[1];
    693 B (96 words) - 01:33, 19 July 2012
  • $array[$#array] = 1;
    472 B (69 words) - 08:26, 22 October 2012
  • ...et there be two integers n, m, n > m so that d[n](d[n-1](...(d[m](e[n](e[n-1](...e[m](code))...) == code #!/usr/bin/env ruby1.9.1
    5 KB (775 words) - 05:29, 13 May 2013
  • tmpfs 1.5G 0 1.5G 0% /dev/shm 0 -r--r--r-- 1 root root 0 2010-12-02 20:50 buddyinfo
    11 KB (1,655 words) - 20:10, 27 June 2016
  • ...xample, to indicate anything from the internl network, you can use 192.168.1.0/24. You can also prepend an IP address with the ! operator to indicate an alert tcp !192.168.1.0/24 any -> !192.168.1.0/24 31337 (OPTION DETAILS GO HERE)
    6 KB (1,006 words) - 01:59, 16 May 2012
  • ...red in variable 'hi', you could reference the letter 'e' by referring to h[1]. However, python does not allow you to assign values to elements in a stri Python 2.7.3 (default, Aug 1 2012, 05:14:39)
    37 KB (5,994 words) - 20:09, 31 May 2015
  • curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
    757 B (93 words) - 15:33, 4 June 2012
  • ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 1 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0
    6 KB (775 words) - 12:02, 15 June 2012
  • 1. Do several "Scans" of the target. Break your scans up into chunks of "port | robots.txt: has 1 disallowed entry
    16 KB (2,706 words) - 18:19, 23 September 2012
  • Snmp version 1 and 2 do not support usernames and it is a completely unencrypted protocol. ...sically trees of numbers. An oid will look something like this: .1.3.6.1.2.1. Each level defines an attribute of the OID.
    9 KB (1,432 words) - 08:44, 19 May 2012
  • =Lesson 1= ...s '''peering'''. In most cases, smaller organizations peer with large Tier 1 ISPs or smaller Tier 2 ISPs.
    8 KB (1,388 words) - 10:53, 25 August 2012
  • ...bits, but can also be split into 4 octets, with an octet being 8 bits (or 1 [[byte]]). The easiest way to use a table is to simply start from right to left, 1 and then doubling up continuously, so an 8 bit [[Binary|binary]] table is l
    7 KB (1,002 words) - 03:36, 16 May 2012
  • 1) 3 TCP ports hit in a certain order within 10 seconds, ports 1337, 31337 an /* ethernet headers are always exactly 14 bytes [1] */
    9 KB (1,296 words) - 06:10, 8 July 2012
  • ==1.0 - Introduction== ...4) * 5''', I would have written '''3 4 - 5 *'''. This would reduce to '''-1 5 *''', so that makes '''-5'''.
    9 KB (1,326 words) - 00:19, 19 October 2011

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)