搜索资源列表
NATVOIP
- VOIP透明穿透NAT防火墙的方法介绍!硕士学位论文!-VoIP NAT firewall penetration transparent method introduced! Master's degree thesis!
20041113(初建文档)
- 通信机制: 结构C-S-C Relay在中间,为console和agent提供双向服务,承担传递console命令和文件到agent, 返回agent命令执行结果与文件开始接收、接收完成信号的功能。此外relay也接受console的控制(与agent类似,通过DosPipe实现).这样的设计是为解决穿透防火墙或路由器(NAT)障碍――由agent发起连接,即从里到外建立一个通道,然后通过relay达到控制目的。通过一个可预设的relay地址序列文件,由agent轮循查找relay;连接建立
guren
- 再穿透防火墙,因为是网 页,呵呵呵呵。 -further penetrate the firewall, because it is more penetrating network firewall, because it is the website, huh huh. Page, huh huh.
B9B2CFEDDNSCCD7B_1145264085
- 穿透防火墙进行数据传输 利用DNS 可以成功穿透ZA防火墙-penetrate the firewall for data transmission using DNS can successfully penetrate the firewall ZA
rebind
- 端口重绑定代码,防火墙穿透技术中和木马技术中应用比较广泛-port rebinding code, firewall technology penetration and Trojan technology used widely
icmp
- 利用icmp穿透防火墙 对网络编程的人来说是不可多得的代码哦
Dllthroughwall
- 以前弄的Dll穿透防火墙的测试代码,有些代码是在调试的时候注释掉的,可相应去掉注释.
Dllthrough
- 用Dll来穿透防火墙的小例子,现在不一定还有用,只能做参考.
DNSsniffer
- 过防火墙的Shell后门。通过演示介绍了如何穿透防火墙的一个例子。
firewalk-5.0.tar
- 著名的firewalk,可穿透防火墙进行扫描的工具源代码。-Famous firewalk, penetrate the firewall tools to scan the source code.
inject
- 通过进程注入,将CMD.EXE重定向到网络socket 穿透防火墙,好像能被卡巴截获,呵呵,不懂就别玩了吧! 说白了,没事! -Through the process will be redirected to CMD.EXE network socket penetrate the firewall, if Kabbah can be intercepted, huh, huh, do not know how to play a bar on the other! Put it
vc_nat_pc2pc
- 两个在nat后的pc可以直接通讯 MakeTCPHoleNattcp穿透nat的程序代码,是两个在nat后的pc可以直接通讯 -Two in the post-nat pc can communicate directly MakeTCPHoleNattcp through nat the program code is after two in the nat pc can communicate directly
RESEARCH-ON-HTTP-TUNNEL
- 在总结分析应用层的几种防火墙穿透技术基础上,提出了反向 连接结合 HTTP 隧道的防火墙穿透通信方法,设计并实现了 HTTP 隧道 防火墙穿透通信模块。 -after reviewing and analyzing several technologies of application-layer firewall penetration, this paper presents the firewall penetrating technology based on HTT
The-firewall-penetrating-technique
- 基于防火墙的基本原理,通过分析防火墙穿透的主要技术,利用防火墙的可信关系,实现了反 向连接加HTTP隧道和共享DNS套接字句柄来穿透防火墙 -Based on the basic firewall principle, firstly, themain firewall penetrating techniqueswas ana- lysed.Then using inverse connection andHTTP-tunnel to pass through firewallsw
httptunnel-3.3
- 基于防火墙的基本原理,通过分析防火墙穿透的主要技术,利用防火墙的可信关系,实现了反 向连接加HTTP隧道和共享DNS套接字句柄来穿透防火墙-Based on the basic firewall principle, firstly, themain firewall penetrating techniqueswas ana- lysed.Then using inverse connection andHTTP-tunnel to pass through firewallswas prop
stund_0.92_Jun06
- 一个UDP穿透NAT的例子,遵守RFC3489-a UDP penetrate NAT example, compliance with RFC3489-a UDP penetrate NAT example, compliance with RFC3489
HTTP_Tunnel_firewall
- 基于反弹技术及http隧道技术穿透个人防火墙的论文-Papers based on the rebound in technology and http tunneling technology penetration Personal Firewall