Monday, June 13, 2011

Introduction to Netstat tutorial

information. This helps the user by the person know which ports are open, closed and/or listen for incoming connections, which can give you accurate assumption of how vulnerable your computer is to attack the respective ports. For example, a common attack that can be avoided if actually include basic vulnerability linked to ports such as 139, which a hacker or a novice user can use effectively using the consecutive amount of standard Windows commands, which mainly include the "net", or port 21 (ftp), 23 (telnet) in which the user can connect and receive a banner on your system, a detailed description of your operating system or even if they Guess the password correctly, contact your system for the receipt of full control. Netstat consider and two major TCP and UDP connections and has the ability to filter between the two, or a selection of different protocols (including IP, ICMP, TCPv6, UDPv6, etc.). Ability to complete the above filters based on one of the main features of almost all quite analytical commands this creature, the switches in the command. Parameters related to netstat are described further in this tutorial in both points 3 and 4 (operation of netstat in Windows/Linux). The functioning of the netstat in Windows ...


Website: www.securitydocs.com | File size: 325 kb
Number of pages: 6
Download introduction to Netstat pdf Tutorial.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.