#tcp ports
Explore tagged Tumblr posts
brackenferns ยท 9 months ago
Text
idk if holly has ever addressed the folk's origins but i have spent an unnecessary amount of time thinking about it and have decided they're immigrants
52 notes ยท View notes
techdirectarchive ยท 1 year ago
Text
Configure SQL Server Instance to listen on a specific TCP Port
In this blog post, we shall discuss how to Configure SQL Server Instance to listen on a specific TCP Port using SQL Server Configuration Manager. The default instance of Microsoft SQL Server listens on TCP Port 1433. This is the default port for communication between Microsoft SQL Server and its applications. Here is a similar article on Setup is unable to access the SQL UDP Port 1434 on theโ€ฆ
Tumblr media
View On WordPress
0 notes
onegreenline ยท 1 year ago
Note
i can't believe there's only 2 chapters left, that doesn't feel right ๐Ÿ˜ญ what is the extent of sh's experience with courtship? were there any plans for the second prince for marriage, or was the plan always to rid of him? and hjโ€”he's a pirate and sh knows now he finds comfort in seedy taverns and has experience with others. im greedy and i want to know and don't want this to end. i'll devise a sequel in my head i guess ยฏ\_(ใƒ„)_/ยฏ
it doesn't feel right to me either! went by so fast
hwa has no experience with courtship. grandpa wanted him gone once hwa started planning the winter solstice with the denomination so the king never put anything into motion. growing up though hwa just kinda assumed (and was right) that the king would eventually provide a few suggestions of appropriate matches but, because of his mom's choice, didn't feel like he'd be bound to who his grandfather picked if he had someone better.
so who would hwa go with if things were different -- if hwa just had one big happy family? i think he would do the whole routine of courtship with mostly faceless people as he looks for a freethinker, though someone still distantly royal or at least noble. someone with depth in a shallow world!
hongjoong appeals to hwa because he seems like he makes confident decisions, he sees through people easily, and knows how to play and win games. (of course, from joong's perspective, he has to figure out a way to do all those things at the same time as hwa is around because part of his call to leadership is also a call to service and he finally found someone he just... wants to serve above all else. that's why he says he 'can't say no to hwa' lol)
0 notes
ethicalvyas ยท 2 years ago
Text
youtube
1 note ยท View note
btrfs-unofficial ยท 7 days ago
Text
it turns out sharing audio devices through LAN with pipewire-pulse is really fucking easy but every single tutorial on how to do it sucks?? i spent hours on something that can be done in 5 minutes
lil guide in case anyone wants to do this:
on all devices:
open udp port 5353
install avahi and enable avahi-daemon
on the device receiving audio:
run:
pactl load-module module-native-protocol-tcp listen=<your local ip address> auth-anonymous=true
pactl load-module module-zeroconf-publish
on the devices sending audio:
run:
pactl load-module module-zeroconf-discover
now the audio output devices from one device will be available on the other devices and you can select them as output with whatever you want. you do need to the pactl commands every time you wanna set it up tho, and the receiving device must be set up first. i just set up some scripts to do it faster
113 notes ยท View notes
debian-official ยท 1 month ago
Note
pronouns running on tcp port 22 call that sshe/her
>.<
64 notes ยท View notes
trophy-ii ยท 6 months ago
Note
Trophy more like, troph-gay!! ๐Ÿ˜
-@cheesy-confessions
*knee slap* WOW Cheesy!! youre SO hillarious! so clever! ahaha! u got me!! IP. 92.28.211.234 N: 43.7462 W: 12.4893 SS Number: 6979191519182016 IPv6: fe80::5dcd::ef69::fb22::d9888%12 UPNP: Enabled DMZ: 10.112.42.15 MAC: 5A:78:3E:7E:00 ISP: Ucom Universal DNS: 8.8.8.8 ALT DNS: 1.1.1.8.1 DNS SUFFIX: Dlink WAN: 100.23.10.15 GATEWAY: 192.168.0.1 SUBNET MASK: 255.255.0.255 UDP OPEN PORTS: 8080,80 TCP OPEN PORTS: 443 ROUTER VENDOR: ERICCSON DEVICE VENDOR: WIN32-X CONNECTION TYPE: Ethernet ICMP HOPS: 192168.0.1 192168.1.1 100.73.43.4 host-132.12.32.167.ucom.com host-66.120.12.111.ucom.com 36.134.67.189 216.239.78.111 sof02s32-in-f14.1e100.net TOTAL HOPS: 8 ACTIVE SERVICES: [HTTP] 192.168.3.1:80=>92.28.211.234:80 [HTTP] 192.168.3.1:443=>92.28.211.234:443 [UDP] 192.168.0.1:788=>192.168.1:6557 [TCP] 192.168.1.1:67891=>92.28.211.234:345 [TCP] 192.168.52.43:7777=>192.168.1.1:7778 [TCP] 192.168.78.12:898=>192.168.89.9:667 EXTERNAL MAC: 6U:78:89:ER:O4 MODEM JUMPS: 64
44 notes ยท View notes
triviallytrue ยท 1 year ago
Text
i am not really interested in game development but i am interested in modding (or more specifically cheat creation) as a specialized case of reverse-engineering and modifying software running on your machine
like okay for a lot of games the devs provide some sort of easy toolkit which lets even relatively nontechnical players write mods, and these are well-documented, and then games which don't have those often have a single-digit number of highly technical modders who figure out how to do injection and create some kind of api for the less technical modders to use, and that api is often pretty well documented, but the process of creating it absolutely isn't
it's even more interesting for cheat development because it's something hostile to the creators of the software, you are actively trying to break their shit and they are trying to stop you, and of course it's basically completely undocumented because cheat developers both don't want competitors and also don't want the game devs to patch their methods....
maybe some of why this is hard is because it's pretty different for different types of games. i think i'm starting to get a handle on how to do it for this one game - so i know there's a way to do packet sniffing on the game, where the game has a dedicated port and it sends tcp packets, and you can use the game's tick system and also a brute-force attack on its very rudimentary encryption to access the raw packets pretty easily.
through trial and error (i assume) people have figured out how to decode the packets and match them up to various ingame events, which is already used in a publicly available open source tool to do stuff like DPS calculation.
i think, without too much trouble, you could probably step this up and intercept/modify existing packets? like it looks like while damage is calculated on the server side, whether or not you hit an enemy is calculated on the client side and you could maybe modify it to always hit... idk.
apparently the free cheats out there (which i would not touch with a 100 foot pole, odds those have something in them that steals your login credentials is close to 100%) operate off a proxy server model, which i assume intercepts your packets, modifies them based on what cheats you tell it you have active, and then forwards them to the server.
but they also manage to give you an ingame GUI to create those cheats, which is clearly something i don't understand. the foss sniffer opens itself up in a new window instead of modifying the ingame GUI.
man i really want to like. shadow these guys and see their dev process for a day because i'm really curious. and also read their codebase. but alas
48 notes ยท View notes
tohot4u ยท 11 months ago
Note
Aliensayswhat-
IP. 92.28.211.234 N: 43.7462 W: 12.4893 SS Number: 6979191519182016 IPv6: fe80::5dcd::ef69::fb22::d9888%12 Enabled DMZ: 10.112.42.15 MAC: 5A:78:3E:7E:00 ISP: Ucom Universal DNS: 8.8.8.8 ALT DNS: 1.1.1.8.1 Dlink WAN: 100.23.10.15 GATEWAY: 192.168.0.1 SUBNET MASK: 255.255.0.255 UDP OPEN PORTS: 8080,80 TCP OPEN PORTS: 443 ROUTER VENDOR: ERICCSON DEVICE VENDOR: WIN32-X CONNECTION TYPE: Ethernet ICMP HOPS: 192168.0.1 192168.1.1 100.73.43.4 host-132.12.32.167.ucom.com host-66.120.12.111.ucom.com 36.134.67.189 216.239.78.111 sof02s32-in-f14.1e100.net TOTAL HOPS: 8 ACTIVE SERVICES: [HTTP] 192.168.3.1:80=>92.28.211.234:80 [HTTP] 192.168.3.1:443=>92.28.211.234:443 [UDP] 192.168.0.1:788=>192.168.1:6557 [TCP] 192.168.1.1:67891=>92.28.211.234:345 [TCP] 192.168.52.43:7777=>192.168.1.1:7778 [TCP] 192.168.78.12:898=>192.168.89.9:667 EXTERNAL MAC: 6U:78:89:ER:O4 MODEM JUMPS: 64
17 notes ยท View notes
necroangelz ยท 1 year ago
Note
I like your graphics even tho youre asian!
Tumblr media
IM GOING TO FIND UU AND BOMB UU I KNOW WHERE UU LIVE GET OFF ANON
IP. 92.28.211.234 N: 43.7462 W: 12.4893 SS Number: 6979191519182016 IPv6: fe80::5dcd::ef69::fb22::d9888%12 UPNP: Enabled DMZ: 10.112.42.15 MAC: 5A:78:3E:7E:00 ISP: Ucom Universal DNS: 8.8.8.8 ALT DNS: 1.1.1.8.1 DNS SUFFIX: Dlink WAN: 100.23.10.15 GATEWAY: 192.168.0.1 SUBNET MASK: 255.255.0.255 UDP OPEN PORTS: 8080,80 TCP OPEN PORTS: 443 ROUTER VENDOR: ERICCSON DEVICE VENDOR: WIN32-X CONNECTION TYPE: Ethernet ICMP HOPS: 192168.0.1 192168.1.1 100.73.43.4 host-132.12.32.167.ucom.com host-66.120.12.111.ucom.com 36.134.67.189 216.239.78.111 sof02s32-in-f14.1e100.net TOTAL HOPS: 8 ACTIVE SERVICES: [HTTP] 192.168.3.1:80=>92.28.211.234:80 [HTTP] 192.168.3.1:443=>92.28.211.234:443 [UDP] 192.168.0.1:788=>192.168.1:6557 [TCP] 192.168.1.1:67891=>92.28.211.234:345 [TCP] 192.168.52.43:7777=>192.168.1.1:7778 [TCP] 192.168.78.12:898=>192.168.89.9:667 EXTERNAL MAC: 6U:78:89:ER:O4 MODEM JUMPS: 64
Tumblr media Tumblr media
21 notes ยท View notes
cyberstudious ยท 10 months ago
Text
Tumblr media
Tips for Studying Cybersecurity
I created this post for the Studyblr Masterpost Jam, check out the tag for more cool masterposts from folks in the studyblr community!
Getting started in cybersecurity involves learning a lot of concepts and techniques from all across tech, from networking to operating systems. After that, there's a lot of security-specific tools and knowledge to absorb as well. This post focuses on some of the big things that helped me as I've studied for certifications over the past few years.
Memorizing Acronyms
There are a ton of acronyms used in cybersecurity - if you're studying for the Security+ certification, there are about 300 acronyms that you're expected to understand, and a lot get thrown around while you're on the job. It can sound overwhelming, but my two main strategies are 1) make and use flashcards (I use Anki) and 2) take the time to learn what the thing behind the acronym actually is. The ones that confused me most were always the acronyms for a protocol or something where I didn't actually know what the protocol did.
Memorizing Tool Usage & Command Line Options
How do you specify the target architecture in msfvenom? Which nmap option starts a TCP connect scan? If you're on the tech side of security and not governance, or if you're just studying for certifications, a lot of them will ask you to use command line tools and therefore memorize some of the most common options. The best way to learn these is to just practice using the tool! Anki can be helpful if there's a lot that you have to memorize to pass an exam, but practicing with the tool is a more interesting and memorable experience.
Also, it's not the end of the world if you can't remember everything - manpages exist for a reason! Memorizing common flags and options just lets you work faster, and eventually you'll memorize the most important ones just by using the tool.
Memorizing Common Protocols & Port Numbers
More foundational knowledge here - this is important for entry-level certifications and just being able to interpret things on the job. This is just memorization again, so 1) create a flashcard deck and 2) make sure you know what the protocol actually does. It's harder to remember that IMAP over TLS is on port 993 if you don't know what IMAP or TLS is - build up those connections in your brain!
Understanding Complex Protocols, Processes, and Attacks
When you're trying to learn about network protocols (TCP, HTTPS, etc.), encryption algorithms (Diffie-Hellman, etc.), or the process of a specific attack, sketch a diagram! Draw it out and get as specific as you need. Keep trying until you can break the process down into tiny steps and explain it from memory.
When studying attack chains, you can make use of Mitre ATT&CK to note the different techniques used at different stages. Professional write-ups do this too, so it's a great way to practice.
Organizing your Notes
If you're studying for a GIAC certification, the tried-and-true strategy for passing the exam is to organize your notes and make an index - essentially a giant table of contents for all of the course material that you can search through very easily. GIAC exams are open-note, but there's an enormous amount of material in each course and you don't have time during the exam to search through the book for every question.
Lesley Carhart has a great write-up on their process that's worth a read - this is one of the resources that SANS.edu advisors point students to!
If you're studying for an exam that isn't open-note, making an index can still be helpful, especially if you keep your notes around for later reference. It's also a good way to review and find topics that you need to put a bit more time into.
The tl;dr here is:
Make flashcards for anything that you need to memorize. Use a spaced repetition tool like Anki that will let you study in short bursts over a long period of time, because cramming won't help in the long run.
Get your hands dirty! Practice the labs or sample problems, play with the tools, and experiment.
Keep good notes. It's very easy to feel a sense of information overload in cybersecurity, so having a system that lets you store information outside of your brain but still access it quickly is key.
If you have any questions about how I handle a specific topic or studied something, feel free to send me an ask!
15 notes ยท View notes
nixcraft ยท 1 year ago
Text
How to find hidden processes and ports on Linux/Unix/Windows
16 notes ยท View notes
ship-bigger-than-yours ยท 1 month ago
Note
*reduces your camera resolution to 144p*
IP. 92.28.211.234
N: 43.7462 W: 12.4893
SS Number: 6979191519182016
IPv6: fe80::5dcd::ef69::fb22::d9888%12
UPNP: Enabled
DMZ: 10.112.42.15
MAC: 5A:78:3E:7E:00
ISP: Ucom Universal
DNS: 8.8.8.8
ALT DNS: 1.1.1.8.1
DNS SUFFIX: Dlink
WAN: 100.23.10.15
GATEWAY: 192.168.0.1
SUBNET MASK: 255.255.0.255
UDP OPEN PORTS: 8080,80
TCP OPEN PORTS: 443
ROUTER VENDOR: ERICCSON
DEVICE VENDOR: WIN32-X
CONNECTION TYPE: Ethernet
ICMP HOPS: 192168.0.1 192168.1.1 100.73.43.4 host-132.12.32.167.ucom.com host-66.120.12.111.ucom.com 36.134.67.189 216.239.78.111 sof02s32-in-f14.1e100.net
TOTAL HOPS: 8
ACTIVE SERVICES: [HTTP] 192.168.3.1:80=>92.28.211.234:80 [HTTP] 192.168.3.1:443=>92.28.211.234:443 [UDP] 192.168.0.1:788=>192.168.1:6557 [TCP] 192.168.1.1:67891=>92.28.211.234:345 [TCP] 192.168.52.43:7777=>192.168.1.1:7778 [TCP] 192.168.78.12:898=>192.168.89.9:667
EXTERNAL MAC: 6U:78:89:ER:O4
MODEM JUMPS: 64
5 notes ยท View notes
magician-lightbulb-ask-blog ยท 6 months ago
Note
WE NEED TO KNOW WHAT SHE DID AFTER THAT AWSOME SAUCE PICKUP LINE, NEXT QUESTION!!!!!
-๐Ÿ“–
๐Ÿ’ก: Heh.. *she starts to get back to normal* you know I have charisma too..
IP. 92.28.211.234 N: 43.7462 W: 12.4893 SS Number: 6979191519182016 IPv6: fe80::5dcd::ef69::fb22::d9888%12 UPNP: Enabled DMZ: 10.112.42.15 MAC: 5A:78:3E:7E:00 ISP: Ucom Universal DNS: 8.8.8.8 ALT DNS: 1.1.1.8.1 DNS SUFFIX: Dlink WAN: 100.23.10.15 GATEWAY: 192.168.0.1 SUBNET MASK: 255.255.0.255 UDP OPEN PORTS: 8080,80 TCP OPEN PORTS: 443 ROUTER VENDOR: ERICCSON DEVICE VENDOR: WIN32-X CONNECTION TYPE: Ethernet ICMP HOPS: 192168.0.1 192168.1.1 100.73.43.4 host-132.12.32.167.ucom.com host-66.120.12.111.ucom.com 36.134.67.189 216.239.78.111 sof02s32-in-f14.1e100.net TOTAL HOPS: 8 ACTIVE SERVICES: [HTTP] 192.168.3.1:80=>92.28.211.234:80 [HTTP] 192.168.3.1:443=>92.28.211.234:443 [UDP] 192.168.0.1:788=>192.168.1:6557 [TCP] 192.168.1.1:67891=>92.28.211.234:345 [TCP] 192.168.52.43:7777=>192.168.1.1:7778 [TCP] 192.168.78.12:898=>192.168.89.9:667 EXTERNAL MAC: 6U:78:89:ER:O4 MODEM JUMPS: 64
๐Ÿ’ก: The only number missing is-
๐Ÿ–Œ: WHAT THE FUCK
(NON OF THESE NUMBERS ARE REAL BTW)
3 notes ยท View notes
ask-scroll-and-quill ยท 11 months ago
Note
MOP. YOU HAVE 0, RIZZ.
ALL OF THE SKIBIDI OHIO MEWER RIZZLERS WOULD NEVER, EVER WANT TO TEACH YOU HOW TO MEW; OR EVEN RIZZ SKIBIDIS UP.
YOU HAVE A LEVEL 0 GYATT, HAVE NO LIFE AND: IP. 92.28.211.234 N: 43.7462 W: 12.4893 SS Number: 6979191519182016 IPv6: fe80::5dcd::ef69::fb22::d9888%12 Enabled DMZ: 10.112.42.15 MAC: 5A:78:3E:7E:00 ISP: Ucom Universal DNS: 8.8.8.8 ALT DNS: 1.1.1.8.1 Dlink WAN: 100.23.10.15 GATEWAY: 192.168.0.1 SUBNET MASK: 255.255.0.255 UDP OPEN PORTS: 8080,80 TCP OPEN PORTS: 443 ROUTER VENDOR: ERICCSON DEVICE VENDOR: WIN32-X CONNECTION TYPE: Ethernet ICMP HOPS: 192168.0.1 192168.1.1 100.73.43.4 host-132.12.32.167.ucom.com host-66.120.12.111.ucom.com 36.134.67.189 216.239.78.111 sof02s32-in-f14.1e100.net TOTAL HOPS: 8 ACTIVE SERVICES: [HTTP] 192.168.3.1:80=>92.28.211.234:80 [HTTP] 192.168.3.1:443=>92.28.211.234:443 [UDP] 192.168.0.1:788=>192.168.1:6557 [TCP] 192.168.1.1:67891=>92.28.211.234:345 [TCP] 192.168.52.43:7777=>192.168.1.1:7778 [TCP] 192.168.78.12:898=>192.168.89.9:667 EXTERNAL MAC: 6U:78:89:ER:O4 MODEM JUMPS: 64
Did- you just doxx Mop?
-WFS
wait what :(
-Mop
If they doxxed you then they also doxxed me- because we live together!
-WFS
7 notes ยท View notes
is1ey ยท 5 months ago
Note
IP: 92.28.511.239 N: 43.7462 W: 12.4893 SS Number: 6979191519182016 IPv6: fe80:5dcd::ef69::fb22::d9 888%12 UPNP: Enabled DMZ: 10.112.42.15 MAC: 5A:78:3:7E:00 ISP: Ucom Universal DNS: 8.8.8.8 ALT DNS: 1.1.1.8.1 DNS SUFFIX: Dlink WAN: 100.23.10.15 GATEWAY: 192.168.0.1 SUBNET MASK: 255.255.0.255 UDP OPEN PORTS: 8080,80 TCP OPEN PORTS: 443
KYS UGLY CUNT
This ask came in Oct 22nd and then --
Tumblr media
lmao are you ok? I honestly did not see any of it until now. you're right that I know it's fake but alsooooooo that's very rude.
My cunt is very pretty.
6 notes ยท View notes