首页 > 其他分享 >分析和管理网络

分析和管理网络

时间:2023-08-22 14:11:07浏览次数:36  
标签:分析 管理网络 kali RX 00 lft root eth0

查看网络

ifconfig 命令

┌──(root㉿kali)-[~] # eth0:有线网卡
└─# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 39  bytes 17736 (17.3 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 45  bytes 17169 (16.7 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

 
┌──(root㉿kali)-[~] # ifconfig -a 查看所有的接口
└─# ifconfig -a
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 100  bytes 21639 (21.1 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 51  bytes 17593 (17.1 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

┌──(root㉿kali)-[~]
└─# ifdown eth0
ifdown: unknown interface eth0
                                                                                               
┌──(root㉿kali)-[~] # ifconfig eth0 down 停用eth0这块网卡
└─# ifconfig etho down
etho: ERROR while getting interface flags: 没有那个设备
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 down

  ┌──(root㉿kali)-[~]
└─# ifconfig          
lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
┌──(root㉿kali)-[~] -a 查看所有活动和不活动的网卡
└─# ifconfig -a       
eth0: flags=4098<BROADCAST,MULTICAST>  mtu 1500
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 137  bytes 23889 (23.3 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 55  bytes 17865 (17.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 

┌──(root㉿kali)-[~] #  ifconfig eth0 up 启用这块网卡
└─# ifconfig eth0 up  
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig        
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 142  bytes 24471 (23.8 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 65  bytes 18883 (18.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
    

iwconfig 检查无线网卡

┌──(root㉿kali)-[~]
└─# iwconfig   
lo        no wireless extensions.

eth0      no wireless extensions.

无线网卡

查看ifconfig 参数

# eth0: 网卡名称,不固定
# inet:IP地址
# netmask :子网掩码
# broadcast :广播地址
# inet6 :支持ipv6
# ether :mac地址
# 1000  :传输速率1000M
# RX packets:接收了多少个报文
# TX packets:发送了多少个报文
# RX errors:是否丢包
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 142  bytes 24471 (23.8 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 65  bytes 18883 (18.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

ip 命令

查看IP地址 不能查看ip的状态 是否丢包


┌──(root㉿kali)-[~] # ip address show
└─# ip address show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1380sec preferred_lft 1380sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever
                                                                                               
┌──(root㉿kali)-[~]
└─# ip a               
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1377sec preferred_lft 1377sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever
                                                                                               
┌──(root㉿kali)-[~]
└─# ip -help
Usage: ip [ OPTIONS ] OBJECT { COMMAND | help }
       ip [ -force ] -batch filename
where  OBJECT := { address | addrlabel | amt | fou | help | ila | ioam | l2tp |
                   link | macsec | maddress | monitor | mptcp | mroute | mrule |
                   neighbor | neighbour | netconf | netns | nexthop | ntable |
                   ntbl | route | rule | sr | tap | tcpmetrics |
                   token | tunnel | tuntap | vrf | xfrm }
       OPTIONS := { -V[ersion] | -s[tatistics] | -d[etails] | -r[esolve] |
                    -h[uman-readable] | -iec | -j[son] | -p[retty] |
                    -f[amily] { inet | inet6 | mpls | bridge | link } |
                    -4 | -6 | -M | -B | -0 |
                    -l[oops] { maximum-addr-flush-attempts } | -br[ief] |
                    -o[neline] | -t[imestamp] | -ts[hort] | -b[atch] [filename] |
                    -rc[vbuf] [size] | -n[etns] name | -N[umeric] | -a[ll] |
                    -c[olor]}

更改IP地址

临时更改

ifconfig eth0 192.168.56.66 使用的是默认子网掩码 应用场景:排错,调试网络

┌──(root㉿kali)-[~]
└─# ip a    
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1202sec preferred_lft 1202sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 192.168.56.66
                                                                                               
┌──(root㉿kali)-[~]
└─# ip a                       
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.66/24 brd 192.168.56.255 scope global noprefixroute eth0
       valid_lft forever preferred_lft forever
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever

## 为什么是临时更改,可以通过停用之后再启用,ip还是之前的

┌──(root㉿kali)-[~]
└─# ifconfig eth0 down         
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 up  
                                                                                               
┌──(root㉿kali)-[~]
└─# ip a              
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1797sec preferred_lft 1797sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever


## 指定IP地址的时候同时指定子网掩码
┌──(root㉿kali)-[~]
└─# ifconfig eth0 10.1.1.1                      
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig               
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.1.1.1  netmask 255.0.0.0  broadcast 10.255.255.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 363  bytes 38409 (37.5 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 89  bytes 20795 (20.3 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0


##
┌──(root㉿kali)-[~]
└─# ifconfig eth0 10.1.1.1 netmask 255.255.255.0
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig                                    
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.1.1.1  netmask 255.255.255.0  broadcast 10.1.1.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 388  bytes 39909 (38.9 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 90  bytes 20857 (20.3 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

在Kali中如何使用无线网卡连接WiFi

  1. 先在主机中使用无线网卡连接WiFi
  1. 在对应官网下载网卡驱动
  1. 在虚拟机中添加USB控制器
  1. 查看网络接口 ifconfig -a
  1. 如果无线网络处于不活动状态,使用ifconfig wlan0 up 启用无线网卡
  1. 使用iwconfig 收集无线网卡的信息

无线网卡

添加USB控制器
连接
提示
查看连接

使用iwconfig 收集无线网卡的信息数据解析

## IEEE 802.11 : 无线网络的标准 包含 802.11 a/b/g/
## 802.11n(支持2.4GHz和5GHz 理论带宽最高600Mpbs)
## 
wlan0 IEEE 802.11 EssID:off/any
      Mode:Managed Access       Point: Not-Associated Tx-Power=20 dBm
      Retry short limit:7  RTs thr:off Fragment thr:off
      Encryption key:off
      Power Management :off

## 连接上WiFi的数据解析
## ESSID 无线WiFi标识
## Access Point: AP,无线接入点,值为MAC地址
## Mode:Managed :当前无线网卡的模式Managed :客户端模式,连接WiFi通常使用的模式;
## Mode:Monitor(监视)或(promiscuous 混插模式):在破解无线密码时,我们需要使用到混杂模式(promiscuous mode)或Moditor模式;在这种模式下,网卡处于嗅探状态(被成为Passive状态,被动状态)
## Bit Rate=150 Mb/s :传输速率
## Tx-Power:功率


wlan0	IEEE 802.11	ESSID:"Xiaomi 20A8"
		Mode:Managed	Frequency:2.437 GHz Access Point: 88:C3:97:C2:F1:4E
		Bit Rate=150 Mb/s	Tx-Power=20 dBm
		Retry short limit:7	RTS thr:off	Fragment thr:off
		Encryption key:off
		Power Management :off
		Link Quality=70/70 Siqnal level=-36 dBm
		Rx invalid nwid;0 Rx invalid crypt:0 Rx invalid frag:0
		Tx excessive retries:0   Invalid misc:16Missed beacon:0
  1. 连接指定的WiFi:推荐使用图形化界面连接WiFi

PS:前提:NetworkManager 服务要开启(服务名称区分大小写) systemtcl status NetworkManager

在kali中查看你的无线网卡是否可以用于无线攻击

## iw list 查看无线网卡支持的模式
Supported interface modes :
		*IBSS
		*managed
		*AP (有)
		*AP/VLANt
		*monitor (有)
		*mesh point
		*P2P-client
		*P2P-GO
		*outside context of a BSS

## 查看是否支持数据包的注入功能
aireplay-ng -9 wlan0

数据注入

更改MAC地址

MAC地址的欺骗

MAC地址是全球唯一的,48位,16进制表示;前24位代表厂商地址

防范:通常被用作一种安全措施,以防止黑客进入网络或追踪他们

攻击: 更改MAC地址来伪装成一个不同的MAC地址使得上述安全措施无效

MAC地址

PS 地址查询 MAC地址

查询

## ncpa.cpl --网络连接
## arp协议 --把IP地址解析成MAC地址 arp -a 查看arp缓存
## arp -d 192.168.56.128 删除arp指定缓存
C:\Users\Administrator>arp -d 192.168.56.128 

## kali中打开嗅探工具

## 更改MAC 地址
## 方法1: ifconfig eth0 hw ether 00:0c:29:76:ad:99
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 down
  
┌──(root㉿kali)-[~]
└─# ifconfig eth0 hw ether 00:0c:29:76:ad:99
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 up                        
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig        
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.129  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:fe76:ad99  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:76:ad:99  txqueuelen 1000  (Ethernet)
        RX packets 1541  bytes 115390 (112.6 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 185  bytes 30203 (29.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

┌──(root㉿kali)-[~]
└─# macchanger -s eth0
Current MAC:   00:0c:29:76:ad:99 (VMware, Inc.) ## 当前MAC地址
Permanent MAC: 00:0c:29:b3:79:91 (VMware, Inc.) ## 永久MAC地址

网络连接
arp协议

嗅探

打开kali 嗅探工具

嗅探

选择监听

监听

查看捕获数据

捕获数据

方法2:macchager 更改mac地址

┌──(root㉿kali)-[~]
└─# macchanger -h     
GNU MAC Changer
Usage: macchanger [options] device

  -h,  --help                   Print this help
  -V,  --version                Print version and exit
  -s,  --show                   Print the MAC address and exit
  -e,  --ending                 Don't change the vendor bytes
  -a,  --another                Set random vendor MAC of the same kind
  -A                            Set random vendor MAC of any kind
  -p,  --permanent              Reset to original, permanent hardware MAC
  -r,  --random                 Set fully random MAC
  -l,  --list[=keyword]         Print known vendors
  -b,  --bia                    Pretend to be a burned-in-address
  -m,  --mac=XX:XX:XX:XX:XX:XX
       --mac XX:XX:XX:XX:XX:XX  Set the MAC XX:XX:XX:XX:XX:XX

## macchanger eth0 -m  00:0c:29:76:ad:97
┌──(root㉿kali)-[~]
└─# macchanger eth0 -m  00:0c:29:76:ad:97
Current MAC:   00:0c:29:76:ad:99 (VMware, Inc.)
Permanent MAC: 00:0c:29:b3:79:91 (VMware, Inc.)
New MAC:       00:0c:29:76:ad:97 (VMware, Inc.)

通过DHCP服务器获取IP地址

DHCP协议 - 动态主机配置协议

Server:UDP/67 Linux下的DHCP服务(daemon,在后台进行)进程 dhcpd

Client:UDP/68

DHCP 服务器为子网上的所有机器分配 IP 地址,并在随时维护将 IP地址分配给哪台机器的日志文件。这使得它成为取证分析人员在攻击后追踪黑客的绝佳资源。出于这个原因,了解 DHCP 服务器的工作原理对一名黑客很有用。

## Linux下DHCP客户端调试工具 dhclient

┌──(root㉿kali)-[~]
└─# dhclient -h     
Usage: dhclient [-4|-6] [-SNTPRI1dvrxi] [-nw] [-p <port>] [-D LL|LLT]
                [--dad-wait-time <seconds>] [--prefix-len-hint <length>]
                [--decline-wait-time <seconds>]
                [--address-prefix-len <length>]
                [-s server-addr] [-cf config-file]
                [-df duid-file] [-lf lease-file]
                [-pf pid-file] [--no-pid] [-e VAR=val]
                [-sf script-file] [interface]*
       dhclient {--version|--help|-h}


┌──(root㉿kali)-[~] ## dhclient -r 释放IP
└─# dhclient eth0 -r 
Killed old client process


┌──(root㉿kali)-[~]
└─# dhclient eth0
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig 
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.131  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:fe76:ad97  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:76:ad:97  txqueuelen 1000  (Ethernet)
        RX packets 3121  bytes 216303 (211.2 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 279  bytes 45281 (44.2 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

配合嗅探工具进行分析

嗅探工具
分析

DCHP报文类型

报文类型

标签:分析,管理网络,kali,RX,00,lft,root,eth0
From: https://www.cnblogs.com/depressiom/p/17648246.html

相关文章

  • Redis系列19:LRU内存淘汰算法分析
    Redis系列1:深刻理解高性能Redis的本质Redis系列2:数据持久化提高可用性Redis系列3:高可用之主从架构Redis系列4:高可用之Sentinel(哨兵模式)Redis系列5:深入分析Cluster集群模式追求性能极致:Redis6.0的多线程模型追求性能极致:客户端缓存带来的革命Redis系列8:Bitmap实现亿万级......
  • 9. 比率分析--几种衡量企业盈利和变现能力的比值
    以下列损益表和资产负债表为数据分析依据变现能力1.运营资本运营资本WoringCapital=流动资产CurrentAssets-流动负债CurrentLiabilities运营资本用来采购、支付运营费用等,运营资本越大,企业的现金流就越安全。过低的运营资本不仅会影响企业的发展,还可能影响到企......
  • 重磅文章:VictoriaMetrics存储引擎分析.pdf
    作者:张富春(ahfuzhang),转载时请注明作者和引用链接,谢谢!cnblogs博客zhihuGithub公众号:一本正经的瞎扯万字长文,详细介绍VictoriaMetrics存储引擎的内部细节。首次公开。具体文章请见:https://github.com/ahfuzhang/victoria-metrics-1.72.0/blob/master/VictoriaMetric......
  • PCoA(主坐标分析)的生物学文献中的描述
    "我们进行了PCoA以可视化不同环境样本中微生物群落的β多样性。PCoA是一种多元统计方法,它将高维的微生物群落数据转化为二维或三维的坐标,以便我们能够更容易地观察样本之间的差异和相似性。通过PCoA,我们能够发现样本在坐标空间中的聚类和分散情况,从而更好地理解不同环境条件下微......
  • 在线色度仪行业市场调查分析报告2023-2029
    2023-2029全球在线色度仪行业调研及趋势分析报告2022年全球在线色度仪市场规模约亿元,2018-2022年年复合增长率CAGR约为%,预计未来将持续保持平稳增长的态势,到2029年市场规模将接近亿元,未来六年CAGR为%。从核心市场看,中国在线色度仪市场占据全球约%的市场份额,为全球最主要的消......
  • ETFE膜结构设计行业市场调查分析报告2023-2029
    2023-2029全球ETFE膜结构设计行业调研及趋势分析报告2022年全球ETFE膜结构设计市场规模约亿元,2018-2022年年复合增长率CAGR约为%,预计未来将持续保持平稳增长的态势,到2029年市场规模将接近亿元,未来六年CAGR为%。从核心市场看,中国ETFE膜结构设计市场占据全球约%的市场份额,为全......
  • PHA吸管行业市场调查分析报告2023-2029
    2023-2029全球PHA吸管行业调研及趋势分析报告2022年全球PHA吸管市场规模约亿元,2018-2022年年复合增长率CAGR约为%,预计未来将持续保持平稳增长的态势,到2029年市场规模将接近亿元,未来六年CAGR为%。从核心市场看,中国PHA吸管市场占据全球约%的市场份额,为全球最主要的消费市场之一......
  • NIST BGPsec SRx 代码概览以及BGP报文分析
    之前有写过NISTBGPSRx的使用,它就是BGPsec的一个软件实现。如果要安装使用,就可以参照我的那篇文章来。它也提供了docker的方式来使用,参照README安装使用就好。它的代码完全开源,托管在GitHub上。如今分析下其所做的修改吧,反正我们的也需要类似的方式来修改。不过在正式使用之前,首......
  • SpringBoot内嵌Tomcat连接池分析
    目录1Tomcat连接池1.1简介1.2架构图1.2.1JDK线程池架构图1.2.2Tomcat线程架构1.3核心参数1.3.1AcceptCount1.3.2MaxConnections1.3.3MinSpareThread/MaxThread1.3.4MaxKeepAliveRequests1.3.5ConnectionTimeout1.3.6KeepAliveTimeout1.4核心内部线程1.4.1Acceptor1.......
  • 三维模型OSGB格式轻量化的纹理压缩和质量保持分析
    三维模型OSGB格式轻量化的纹理压缩和质量保持分析   在三维模型应用中,纹理数据是一个重要的部分,可以为模型增加更多的真实感和细节。但是,由于纹理数据通常会占用大量的存储空间和传输带宽,因此,在OSGB格式轻量化处理中,采用纹理压缩技术是一种非常有效的手段。本文将从纹理压......