User:Ax/Netzwerk
From beggabaur
Beej's Guide to Network Programming: http://beej.us/guide/bgnet/output/html/singlepage/bgnet.html
Contents
Analyse
<i4dnf> dumpcap -q -a duration:180 -i [ethX|any] -w /path/to/mycapturefile <i4dnf> captures 180 seconds of traffic to mycapturefile <Evilham> you can e.g. curl -[4|6] ifconfig.io
Browser
- https://otter-browser.org/
- https://www.seamonkey-project.org/
- https://www.palemoon.org/
- http://www.basilisk-browser.org/
- https://qupzilla.com/
DNS
https://www.youtube.com/watch?v=TZRvO0S-TLU
IPv6
- IPv6 HowTo: http://www.tldp.org/HOWTO/Linux+IPv6-HOWTO/
- Adressbereiche http://www.wasistipv6.de/ipv6-adressbereiche/
- https://en.wikipedia.org/wiki/IPv6_address
- Adressrechner http://www.ipv6calculator.net/
- DHCPv6: http://www.ipv6-ready.de/?p=35
- DNS: http://www.ipv6-ready.de/?p=27
- SLAAC: http://www.heise.de/netze/artikel/IPv6-Privacy-Extensions-einschalten-1204783.html?artikelseite=3
- Stats: http://www.ipv6.bieringer.de/
echo net.ipv6.conf.eth0.use_tempaddr=2 > /etc/sysctl.conf
ULA: fd00::be99:a:ba0a/64
- 255.255.255.255
- /8 /16 /24 /32
- ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
- /16 /32 /48 /64 /80 /96 /112 /128
- IPv6 prefix: /56
SLAAC statt DHCPv6?!
SMB
http://www.magnux.org/doc/howto/en/SMB-HOWTO-8.php
http://www.tldp.org/HOWTO/SMB-HOWTO-8.html
vpn (openvpn)
https://openvpn.net/index.php/open-source/documentation/howto.html
Zertifikate
Paket easy-rsa:
- Scripte in /usr/share/easy-rsa/
- https://openvpn.net/index.php/open-source/documentation/howto.html#pki
vpn (wireguard)
https://www.wireguard.com/ (noch testen)
Server
Server mit bridged networking, Beispiel: bin/BF2.sh
WiFi
https://wiki.debian.org/WiFi/HowToUse#Wicd Router auf WPS-Lücken testen http://heise.de/-2865722
Sonstige netzwerkbezogene Befehle / Notizen
dig mpmap01.flightgear.org @87.118.100.175 dig URL @DNS
ShieldsUP!: https://www.grc.com/default.htm
ip a s (entspricht "ip address show") ip link show brctl show ip route add default via 192.168.77.73 dev br0 ip route show
# Log network traffic iptables -[A|I] INPUT -j LOG --log-prefix "ipchains:" --log-level 4
# Ports scannen nmap -A -T4 -Pn $IPaddress