CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - ICMP
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - ICMP - List
[
Process-Thread
]
PingThread
DL : 1
采用多线程编写的Ping的源代码。对于研究ICMP协议的开发人员有意思
Date
: 2008-10-13
Size
: 4.55kb
User
:
安杰伦
[
Process-Thread
]
爱虫病毒
DL : 0
病毒吧~因为该变种病毒不但要攻击RPC漏洞,还会将自身复制到%system%\\Wins文件夹下,创建FTP服务和Wins Client服务。其中FTP服务开启系统的FTP功能用于传播病毒。“冲击波杀手”感染一台机器后就会使用Ping命令或ICMP echo方式探测随机产生的IP地址是否有效,如果有效便开始进行攻击。该病毒会在受感染的系统中随机使用666-765端口与攻击系统进行连接。该病毒还会检查系统版本和微软补丁包的版本号,然后根据不同的操作系统尝试从微软下载有关RPC漏洞的补丁程序,并自动运行补丁程序,给系统打上RPC漏洞的补丁-virus because it was not only the variant of the virus to attack RPC vulnerability, but also copies itself into% system% \\ Wins folder, FTP services and the creation Wins Client services. FTP services which opened the FTP function for the transmission of the virus. "Shock killer" an infected machine will be used after the Ping orders or ICMP echo mode detection randomly generated IP address whether and, if they start to attack. The virus in infected systems use random ports 666-765 and attack systems for the connection. The virus will also inspect system version and Microsoft patch version, then under different operating systems to try to download the Microsoft RPC vulnerability patches, and automatically patch to the RPC loopholes permitting system patches
Date
: 2008-10-13
Size
: 2.19kb
User
:
美美
[
Process-Thread
]
爱虫病毒
DL : 0
病毒吧~因为该变种病毒不但要攻击RPC漏洞,还会将自身复制到%system%\Wins文件夹下,创建FTP服务和Wins Client服务。其中FTP服务开启系统的FTP功能用于传播病毒。“冲击波杀手”感染一台机器后就会使用Ping命令或ICMP echo方式探测随机产生的IP地址是否有效,如果有效便开始进行攻击。该病毒会在受感染的系统中随机使用666-765端口与攻击系统进行连接。该病毒还会检查系统版本和微软补丁包的版本号,然后根据不同的操作系统尝试从微软下载有关RPC漏洞的补丁程序,并自动运行补丁程序,给系统打上RPC漏洞的补丁-virus because it was not only the variant of the virus to attack RPC vulnerability, but also copies itself into% system% \ Wins folder, FTP services and the creation Wins Client services. FTP services which opened the FTP function for the transmission of the virus. "Shock killer" an infected machine will be used after the Ping orders or ICMP echo mode detection randomly generated IP address whether and, if they start to attack. The virus in infected systems use random ports 666-765 and attack systems for the connection. The virus will also inspect system version and Microsoft patch version, then under different operating systems to try to download the Microsoft RPC vulnerability patches, and automatically patch to the RPC loopholes permitting system patches
Date
: 2025-12-28
Size
: 2kb
User
:
美美
[
Process-Thread
]
PingThread
DL : 1
采用多线程编写的Ping的源代码。对于研究ICMP协议的开发人员有意思-Prepared using multi-threaded source code of Ping. ICMP protocol for studying the development of staff interesting
Date
: 2025-12-28
Size
: 5kb
User
:
安杰伦
[
Process-Thread
]
ww
DL : 0
可以发现网络中的活动主机,利用的是ICMP报文-discover pc
Date
: 2025-12-28
Size
: 255kb
User
:
张政
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.