diff --git a/m239/40 - Protokolle/Protokoll HTTP/05 - WebFilius.fls b/m239/40 - Protokolle/Protokoll HTTP/05 - WebFilius.fls deleted file mode 100644 index a549a00..0000000 Binary files a/m239/40 - Protokolle/Protokoll HTTP/05 - WebFilius.fls and /dev/null differ diff --git a/m239/40 - Protokolle/readme.md b/m239/40 - Protokolle/readme.md index 552ef30..31987bf 100644 --- a/m239/40 - Protokolle/readme.md +++ b/m239/40 - Protokolle/readme.md @@ -84,6 +84,15 @@ Verweis: https://http2.github.io/ 9:03 min, E, YouTube, 1.11.2016 Verweis: https://www.youtube.com/watch?v=2G1ueMDgwxw +### Aufgaben/Arbeitsblatt zu HTTP und URL + + +- Arbeitsblatt mit 17 Aufgaben zum selber (im Team zu 2 Pers) bearbeiten. Dauer ca. 100 min. +
[x-ressources/16%20-%20m239_URL_Spez.pdf](x-ressources/16%20-%20m239_URL_Spez.pdf) + +- Arbeitsblatt "HTTP Protokoll" +
Ablauf, Client-Anfrage, GET-Methode, POST-Methode, Laborübung: Network Analyzer / Packet Sniffer +
[](x-ressources/15 - HTTP-Protokoll mit Labor.pdf) ## WebDAV diff --git a/m239/40 - Protokolle/Protokolle SMTP, IMAP, POP3 (E-Mail-Protokolle)/02 - M239_mail_tecchannel_V0.3.pdf b/m239/40 - Protokolle/x-ressources/02 - M239_mail_tecchannel_V0.3.pdf similarity index 100% rename from m239/40 - Protokolle/Protokolle SMTP, IMAP, POP3 (E-Mail-Protokolle)/02 - M239_mail_tecchannel_V0.3.pdf rename to m239/40 - Protokolle/x-ressources/02 - M239_mail_tecchannel_V0.3.pdf diff --git a/m239/40 - Protokolle/Protokoll HTTP/13 - M239_hands-on_HTTP_v1.6.pdf b/m239/40 - Protokolle/x-ressources/13 - M239_hands-on_HTTP_v1.6.pdf similarity index 100% rename from m239/40 - Protokolle/Protokoll HTTP/13 - M239_hands-on_HTTP_v1.6.pdf rename to m239/40 - Protokolle/x-ressources/13 - M239_hands-on_HTTP_v1.6.pdf diff --git a/m239/40 - Protokolle/Protokolle SMTP, IMAP, POP3 (E-Mail-Protokolle)/14 - TelnetSMTP-TestTool.exe b/m239/40 - Protokolle/x-ressources/14 - TelnetSMTP-TestTool.exe similarity index 100% rename from m239/40 - Protokolle/Protokolle SMTP, IMAP, POP3 (E-Mail-Protokolle)/14 - TelnetSMTP-TestTool.exe rename to m239/40 - Protokolle/x-ressources/14 - TelnetSMTP-TestTool.exe diff --git a/m239/40 - Protokolle/Protokoll HTTP/15 - HTTP-Protokoll mit Labor.pdf b/m239/40 - Protokolle/x-ressources/15 - HTTP-Protokoll mit Labor.pdf similarity index 100% rename from m239/40 - Protokolle/Protokoll HTTP/15 - HTTP-Protokoll mit Labor.pdf rename to m239/40 - Protokolle/x-ressources/15 - HTTP-Protokoll mit Labor.pdf diff --git a/m239/40 - Protokolle/Protokoll HTTP/16 - m239_URL_Spez.pdf b/m239/40 - Protokolle/x-ressources/16 - m239_URL_Spez.pdf similarity index 100% rename from m239/40 - Protokolle/Protokoll HTTP/16 - m239_URL_Spez.pdf rename to m239/40 - Protokolle/x-ressources/16 - m239_URL_Spez.pdf diff --git a/m239/40 - Protokolle/bitKinex-ohnePW.ds.txt b/m239/40 - Protokolle/x-ressources/bitKinex-ohnePW.ds.txt similarity index 100% rename from m239/40 - Protokolle/bitKinex-ohnePW.ds.txt rename to m239/40 - Protokolle/x-ressources/bitKinex-ohnePW.ds.txt diff --git a/m239/70 - Tests/README.md b/m239/70 - Tests/README.md index d593ae2..df266c0 100644 --- a/m239/70 - Tests/README.md +++ b/m239/70 - Tests/README.md @@ -7,7 +7,7 @@ - Dokumentation verschiedener Testarten (die Mind-Map wurde aus diesem Text erstellt) -
Verweis: [../ 02 - Unterlagen Theorie/M239 Compendio B 7 - Systemtest und Dokumentation vorbereiten.pdf](../02%20-%20Unterlagen%20Theorie/M239%20Compendio%20B%207%20-%20Systemtest%20und%20Dokumentation%20vorbereiten.pdf) +
Verweis: [../02 - Unterlagen Theorie/M239 Compendio B 7 - Systemtest und Dokumentation vorbereiten.pdf](../02%20-%20Unterlagen%20Theorie/M239%20Compendio%20B%207%20-%20Systemtest%20und%20Dokumentation%20vorbereiten.pdf) ![M239_Internetserver_Tests_Mindmap.png](M239_Internetserver_Tests_Mindmap.png) diff --git a/m239/90 - Tools/99 - Weitere/Netcat b/m239/90 - Tools/99 - Weitere/Netcat deleted file mode 100644 index 5b05144..0000000 --- a/m239/90 - Tools/99 - Weitere/Netcat +++ /dev/null @@ -1,439 +0,0 @@ - - - - -Netcat – Wikipedia - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
-
- -
-
-
-

Netcat

-
-
aus Wikipedia, der freien Enzyklopädie
-
-
- -
- Zur Navigation springen - Zur Suche springen -
Screenshot einer Anwendungsmöglichkeit von Netcat
-

Netcat, auch nc genannt, ist ein einfaches Werkzeug, um Daten von der Standardein- oder -ausgabe über Netzwerkverbindungen zu transportieren. Es arbeitet als Server oder Client mit den Protokollen TCP und UDP. Die Manpage bezeichnet es als TCP/IP swiss army knife (Schweizer Taschenmesser für TCP/IP). -

Das ursprüngliche Programm wurde 1996 von einer unbekannten Person mit dem Pseudonym Hobbit für die Unix-Plattform geschrieben und ist inzwischen auf praktisch alle Plattformen portiert worden. -

- - -

Anwendung[Bearbeiten | Quelltext bearbeiten]

-

Netcat ist ein typisches Unix-Programm, das die grundlegende Unix-Philosophie implementiert. Insbesondere arbeitet Netcat mit der universellen Schnittstelle von Datenströmen, ohne dabei deren Inhalt weiter klassifizieren zu müssen. -Da Netcat ganz abstrakt mit sämtlichen Datenströmen arbeiten kann, lassen sich beliebig komplexe Arbeitsabläufe mit Netcat realisieren, vom einfachen Kopieren von Dateien über Streamen von Datenbeständen bis hin zu komplexen Proxy- oder Gateway-Diensten über Netzwerkgrenzen hinweg. -

-

Syntax[Bearbeiten | Quelltext bearbeiten]

-
Netcat kann beliebigen Anwendungen zu „Netzwerkfähigkeit“ verhelfen
-

Es gibt unterschiedliche Implementierungen von netcat, welche sich unter anderem in der Syntax unterscheiden. Im Folgenden ist die ursprüngliche Variante von Hobbit beschrieben. -

Grundsätzlich unterscheidet Netcat zwischen zwei verschiedenen Modi: -

-
Server
-
netcat -l -p lokalport (lokalport ist ein lokaler Port)
-
Nach dem Aufruf wartet („lauscht“: -l) Netcat auf dem mit -p angegebenen Port für unbegrenzte Zeit auf eine eingehende Verbindung. Nachdem eine Verbindung aufgebaut und wieder geschlossen wurde, beendet Netcat sich.
-
Client
-
netcat zielserver zielport
-
Hier ist zielserver der Hostname oder die IP-Adresse eines Hosts, mit dem Netcat sich verbinden soll, und zielport eine Portnummer, zum Beispiel 80 bei HTTP-Server. Unter Angabe des Flags -u verwendet Netcat statt TCP das verbindungslose UDP. In diesem Client-Modus muss auf dem Zielrechner und -port schon eine Server-Anwendung warten, andernfalls beendet sich Netcat mit einem Fehler.
-

In beiden Fällen gibt Netcat über Netzwerk einkommende Daten auf der Standardausgabe aus, während per Standardeingabe eingelesene Daten über das Netzwerk an den Kommunikationspartner geschickt werden. Werden diese Ein- und Ausgaben nicht umgeleitet, kann der Anwender diese eingeben und lesen, d. h. hier fungieren die zwei Netcat-Aufrufe als ein einfaches Chat-Programm. -Durch Umleitung oder Verwendung von Pipes oder FIFOs kann Netcat in vielen Fällen Netzwerkkommunikationsfähigkeiten ermöglichen, wo sie nicht implementiert sind, zum Beispiel in Shells. So ist die oben rechts dargestellte Illustration allgemein gültig, da stdin und stdout beliebig angepasst werden können. -

-

Anwendungsbeispiele[Bearbeiten | Quelltext bearbeiten]

-

Einfaches Dateikopieren[Bearbeiten | Quelltext bearbeiten]

-

Die Datei mit dem Namen original vom Computer start soll unter dem Namen kopie auf einem Computer ziel abgelegt werden, wobei der Transfer via TCP-Port 2000 abgewickelt wird. Auf einer Shell am Computer ziel wird dafür Netcat im Server-Modus gestartet. Die Standardausgabe wird mit dem Umleitungsoperator in die Datei kopie umgeleitet: -

-
$ netcat -l -p 2000 > kopie
-
-

Nachdem der Server auf Computer ziel läuft, kann auf Computer start in einer Shell Netcat im Client-Modus gestartet werden. Mithilfe eines Umleitungsoperators liest die Shell den Inhalt der Datei original aus und schreibt ihn in die Standardeingabe des aufgerufenen netcat-Prozesses: -

-
$ netcat ziel 2000 < original
-
-

Im fehlerlosen Fall erzeugt weder die Netcat-Instanz auf Computer start, noch auf Computer ziel irgendwelche Ausgaben auf der Shell. Sie beenden sich nach Fertigstellung des Transfers (da die Shell durch den '<'-Operator bedingt automatisch ein EOF-Zeichen sendet). -Auf weitere eingehende Daten wartet die Instanz auf dem Computer ziel, wenn sie mit dem Parameter -k gestartet wird. In diesem Fall muss sie zum Beispiel per Tastenkombination Strg + C beendet werden. -

-

Mehrere Dateien kopieren[Bearbeiten | Quelltext bearbeiten]

-

Nach demselben Schema laufen die meisten Dateiübertragungsszenarien, die sich Netcat zunutze machen. Eine alltäglichere Abwandlung dieses Szenarios ist die zusätzliche Verwendung des Packerprogramms tar, mit welchem komplette Verzeichnisstrukturen über Netzwerk kopiert werden können. Typischerweise kommt es in diesen Szenarien zu regelrechten Kaskaden von Programmen, die mittels Pipes miteinander verbunden sind, zum Beispiel in Anlehnung an das obige Beispiel ein Kommando auf dem Client-Rechner: -

-
$ tar vc * | gzip | netcat ziel 2000
-
-

sowie dazugehörig ein analoges Kommando auf dem Zielrechner: -

-
$ netcat -l -p 2000 | gunzip | tar vx
-
-

In diesem Beispiel werden alle Dateien im aktuellen Arbeitsverzeichnis von tar zu einem Stream gepackt, der über die Standardausgabe ausgegeben wird, von dem Kompressionsprogramm gzip komprimiert wird und dann über Netcat an eine Netcat-Serverinstanz auf dem Zielrechner geschickt wird, von gzip wieder dekomprimiert wird und von tar wieder zu einer Verzeichnisstruktur entpackt wird. -

-

Einmal-Webserver zum Dateitransfer[Bearbeiten | Quelltext bearbeiten]

-

Statt eines Netcat-zu-Netcat Transfers kann Netcat auch die Sprache höherer Protokolle sprechen, wie zum Beispiel HTTP. Folgendes Kommando startet einen Webserver auf dem lokalen Computer, welcher dem ersten Webbrowser die Datei hallo.txt präsentiert. -

-
$ ( echo "HTTP/1.0 200 Ok"; echo; cat hallo.txt; ) | netcat -l 8090
-
-

Zum Abrufen wird im Webbrowser die URL http://localhost:8090/ eingegeben. Dieser zeigt dann einen Speicherdialog oder die Datei direkt an. -

-

Komplexes Firewallumgehen[Bearbeiten | Quelltext bearbeiten]

-

Netcat lässt sich ähnlich leicht dazu verwenden, Ports umzuleiten und so beispielsweise gezielt unzureichende Firewalls zu umgehen. Solche Anwendungsszenarien können schnell in eine rechtliche Grauzone gelangen, siehe dazu Missbrauch durch Netcat. -

-
Netcat in der Verwendung mit inetd
-

Die obige Grafik illustriert die Verwendung von Netcat als offenen Proxyserver, in Kombination mit inetd.[1] Wenn beispielsweise der mit Client beschriftete Host keine direkte Verbindung mit einem speziellen TCP-Port des mit Server beschrifteten Hosts aufbauen kann, so kann er sich den obigen Aufbau zunutze machen, in dem er statt der direkten Verbindung zum Server eine Verbindung zu einem speziellen TCP-Port des mit Proxy beschrifteten Host aufbaut, an dem inetd lauscht. Dieser ruft daraufhin eine Netcat-Clientinstanz auf, die ihrerseits (voreingestellt) eine Verbindung zu dem TCP-Port des eigentlichen Servers aufbaut. Nun werden alle Ausgaben des eigentlichen Servers unverändert über Netcat und Inetd an den Client durchgereicht und umgekehrt. Auf diese Weise kann der Client völlig transparent mit dem eigentlichen Server kommunizieren, als wäre der Proxy gar nicht vorhanden. -

-

Sicherheit[Bearbeiten | Quelltext bearbeiten]

-

Netcat wird oft mit sicherheitsrelevanten Fragen in Verbindung gebracht. Hierbei treten üblicherweise zwei essentielle Fragestellungen auf. -

-

Verschlüsselung[Bearbeiten | Quelltext bearbeiten]

-

Netcat ändert grundsätzlich nicht den Datenstrom. Daher verschlüsselt Netcat auch die zu übertragenden Daten nicht, bevor sie den Computer verlassen. Eine Verschlüsselung lässt sich im Anwendungsszenario beispielsweise durch Pipes vorschalten (siehe oben) oder es muss eine der Netcat-Weiterentwicklungen verwendet werden. Alternativ muss von vorneherein zu Programmen gegriffen werden, bei denen Verschlüsselung ein zentraler Bestandteil ist, zum Beispiel der OpenSSL-Client/Server als SSL-Implementierung oder SSH bzw. Secure Copy (SCP) zum sicheren Streamen oder Kopieren von Daten. -

-

Missbrauch[Bearbeiten | Quelltext bearbeiten]

-

Durch seine Universalität kann Netcat auch verwendet werden, um beispielsweise Backdoors auf einem System einzurichten. So stufen diverse Antivirenprogramme, unter anderem McAfee VirusScan, Ikarus, Avira AntiVir, AVG Antivirus, Norton AntiVirus, Kaspersky Anti-Virus, Sophos AntiVirus und G Data Antivirus, das Programm nc.exe als schädliches oder potentiell unerwünschtes Programm ein und verhindern dessen Ausführung.[2] -

-

Ports und Weiterentwicklungen[Bearbeiten | Quelltext bearbeiten]

-

Chris Wysopal hat Netcat auf Windows portiert. GNU Netcat ist eine komplette Reimplementierung und wird von Giovanni Giacobbi betreut.[3] OpenBSD Netcat ist eine weitere Reimplementierung, die aber nicht komplett kompatibel zum Ur-netcat ist, da die Syntax an OpenBSD-Standards angepasst wurde.[4] Andreas Bischoff hat die Windows-Version auf Windows CE (Pocket PC und Handheld PC) portiert.[5] -

Cryptcat ist eine Weiterentwicklung von Netcat, die Verschlüsselung implementiert.[6] Socat ist eine Reimplementation und kann außer TCP und UDP auch SCTP verwenden, über Proxyserver arbeiten und unterstützt ebenfalls Verschlüsselung.[7] Eine weitere nicht vollständig kompatible Variante ist Netcat6, das auch IPv6 unterstützt und diverse Performance-Optimierungen enthält, unter anderem den Nagle-Algorithmus.[8] -

Auch der Portscanner Nmap liefert eine um viele Features ergänzte Netcat-Reimplementierung namens Ncat mit. Diese kann auch über IPv6, SCTP und Unix Domain Sockets kommunizieren und HTTP- und SOCKS-Proxys verwenden (ersteres auch serverseitig). An Sicherheits-Features unterstützt Ncat SSL für Verschlüsselung und Authentifizierung sowie Zugangsbeschränkungen auf Hostname-Basis. Des Weiteren sind ein zum Datenaustausch zwischen mehreren Clients dienender Connection-Brokering-Modus und ein darauf aufbauender einfacher Chat-Server enthalten.[9] -

-

Weblinks[Bearbeiten | Quelltext bearbeiten]

- -

Einzelnachweise[Bearbeiten | Quelltext bearbeiten]

-
    -
  1. Angemerkt sei, dass die Verwendung von inetd in dem Beispiel nicht notwendig wäre, eine (zweite) Netcat-Serverinstanz könnte die gleiche Aufgabe übernehmen. -
  2. -
  3. Signatur von Netcat Symantec -
  4. -
  5. GNU Netcat -
  6. -
  7. OpenBSD netcat -
  8. -
  9. Netcat 4 wince -
  10. -
  11. Cryptcat -
  12. -
  13. Socat -
  14. -
  15. Netcat6 -
  16. -
  17. Ncat -
  18. -
-
- -
-
- -
-

Navigationsmenü

-
- - - - -
- - - - - - - - -
-
- - - - - - - - - - - -
-
- -
- - - - - - - - - - - - - - - - - - - -
- -
- - - - - - - - \ No newline at end of file diff --git a/m239/90 - Tools/99 - Weitere/SysInternals - Div. Tools (Netzwerk, Dateien, Prozesse, etc.) b/m239/90 - Tools/99 - Weitere/SysInternals - Div. Tools (Netzwerk, Dateien, Prozesse, etc.) deleted file mode 100644 index 9a9669d..0000000 --- a/m239/90 - Tools/99 - Weitere/SysInternals - Div. Tools (Netzwerk, Dateien, Prozesse, etc.) +++ /dev/null @@ -1,816 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Sysinternals Networking Utilities - Sysinternals | Microsoft Learn - - - - - - - - - - - - - - -
- Skip to main content - - - - - -
-
- - -
- - -
-
- - -
-
- -
- -
-
- -
- -
- -
- -
- - -
- -
- - -
- -
- -
-
-
- - - - - -
- -
-
- - -
- - - - - - - - - - - -
- - - -
- - - - - - - - - Edit - - - - - - - - - - - - -
-
- -
-
-
- - - -
- -
- - - -
- - -

Sysinternals Networking Utilities

- - - - - - - -

AD Explorer
-Active Directory Explorer is an advanced Active Directory (AD) viewer -and editor.

-

AD Insight
-AD Insight is an LDAP (Light-weight Directory Access Protocol) real-time -monitoring tool aimed at troubleshooting Active Directory client -applications.

-

AdRestore
-Undelete Server 2003 Active Directory objects.

-

PipeList
-Displays the named pipes on your system, including the number of maximum -instances and active instances for each pipe.

-

PsFile
-See what files are opened remotely.

-

PsPing
-Measures network performance.

-

PsTools
-The PsTools suite includes command-line utilities for listing the -processes running on local or remote computers, running processes -remotely, rebooting computers, dumping event logs, and more.

-

ShareEnum
-Scan file shares on your network and view their security settings to -close security holes.

-

TCPView
-Active socket command-line viewer.

-

Whois
-See who owns an Internet address.

- -
- - -
- - -
- - - - - -
- - - - - - - - - - -
- - - - -
- -
- - - -
- - -
- - - - - -
- -
- - -
- - - - -
- -
- - diff --git a/m239/90 - Tools/CURL - command line tool and library for transferring data with URLs b/m239/90 - Tools/CURL - command line tool and library for transferring data with URLs deleted file mode 100644 index 8a8be6b..0000000 --- a/m239/90 - Tools/CURL - command line tool and library for transferring data with URLs +++ /dev/null @@ -1,205 +0,0 @@ - - - -curl - - - - - - - - -
- -
-
curl logo -
-

-


-

- command line tool and -library -
for transferring data with URLs -
(since 1998)

-
-
- Top Sponsors

- - - - - - -

-
- Time to donate to the curl project? -
-
- Commercial support available! -
-
- Everything curl is a detailed and - totally free book that explains basically everything there is to know about - curl, libcurl and the associated project. -
-
-

Supports... -

DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, -LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP, SCP, SFTP, SMB, SMBS, SMTP, -SMTPS, TELNET and TFTP. curl supports SSL certificates, HTTP POST, HTTP PUT, -FTP uploading, HTTP form based upload, proxies (SOCKS4, SOCKS5, HTTP and -HTTPS), HTTP/2, HTTP/3, cookies, user+password authentication (Basic, Plain, -Digest, CRAM-MD5, SCRAM-SHA, NTLM, Negotiate, Kerberos, Bearer tokens and AWS -Sigv4), file transfer resume, proxy tunneling, HSTS, Alt-Svc, unix domain -sockets, HTTP compression (gzip, brotli and zstd), etags, parallel transfers, -DNS-over-HTTPS and more. -

What's curl used for? -

-curl is used in command lines or scripts to transfer data. curl is also used -in cars, television sets, routers, printers, audio equipment, mobile phones, -tablets, settop boxes, media players and is the Internet transfer engine for -thousands of software applications in over ten billion installations. -

-curl is used daily by virtually every Internet-using human on the globe. -

Who makes curl? -

-curl is free and open source software and exists -thanks to thousands of contributors and our -awesome sponsors. The curl -project follows well -established open source best practices. You too -can help us improve! -

What's the latest curl? -

-The most recent stable version is 7.87.0, released on 2022-12-21. -Currently, 76 of the listed downloads are of the latest version. -

Where's the code? -

- Check out the latest source code from GitHub. -

-
- - - diff --git a/m239/90 - Tools/CertMgr.msc - Zertifikate verwalten b/m239/90 - Tools/CertMgr.msc - Zertifikate verwalten deleted file mode 100644 index 4aaa973..0000000 --- a/m239/90 - Tools/CertMgr.msc - Zertifikate verwalten +++ /dev/null @@ -1,866 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CertMgr - Windows drivers | Microsoft Learn - - - - - - - - - - - - - - -
- Skip to main content - - - - - -
-
- - -
- - -
-
- - -
-
- -
- -
-
- -
- -
- -
- -
- - -
- -
- - -
- -
- -
-
-
- - - - - -
- -
-
- - -
- - - - - - - - - - - -
- - - -
- - - - - - - - - Edit - - - - - - - - - - - - -
-
- -
-
-
- - - -
- -
- - - -
- - -

CertMgr

- - - - - - - -

CertMgr (Certmgr.exe) is a command-line CryptoAPI tool that manages certificates, certificate trust lists (CTLs), and certificate revocation lists (CRLs).

-

CertMgr supports a large number of switches, but this section describes only those that are relevant to managing test certificates within a certificate store.

-
    CertMgr [/add|/del|/put] [Switches] [/s [/r RegistryLocation ] ] SourceName [/s [/r RegistryLocation] ] [DestinationName]
-
-

Partial list of operations, switches, and arguments

-

Operations

-

add
-Configures CertMgr to add certificates, CTLs, or CRLs from the file specified by SourceName to the certificate store specified by DestinationName.

-

del
-Configures CertMgr to delete certificates, CTLs, or CRLs in the certificate store specified by SourceName from the certificate store specified by DestinationName. If DestinationName is not specified, SourceName will also serve as the destination store and will be modified.

-

put
-Configures CertMgr to save certificates, CTLs, or CRLs from the certificate store specified by SourceName to a file specified by DestinationName.

-

none
-If no command is specified, CertMgr displays all the certificates, CTLs, or CRLs in the certificate store or file specified by SourceName.

-

Switches and Arguments

-

/c
-Configures CertMgr to only process certificates from the file specified by SourceName.

-

/CTL
-Configures CertMgr to only process CTLs from the file specified by SourceName.

-

/CRL
-Configures CertMgr to only process CRLs from the file specified by SourceName.

-

/s
-Configures CertMgr to access the certificate store specified by SourceName or DestinationName as a system store.

-

/r registryLocation
-Specifies the registry location of the system certificate store. The /r switch is only valid when used with the /s switch. The registryLocation argument must be either:

-

currentUser
-Specifies the registry location HKEY_CURRENT_USER.

-

localMachine
-Specifies the registry location HKEY_LOCAL_MACHINE.

-

If the /r switch is not specified along with the /s switch, currentUser is the default.

-

For more information about these certificate stores, see Certificate Stores.

-

/v
-Configures CertMgr to display detailed information about certificates, CTLs, and CRLs. If this switch is not specified, CertMgr only displays brief information.

-

Comments

-

To use CertMgr, the user must be a member of the Administrators group on the system and run the command from an elevated command prompt.

-

For a complete list of CertMgr parameters, see the Certificate Manager Tool website.

-

A 32-bit version of the CertMgr tool is located in the bin\i386 folder of the WDK. A 64-bit version of the tool is located in the bin\amd64 and bin\ia64 folders of the WDK.

-

Example

-

The following two CertMgr commands add the certificate in the file OutputFile.cer to the Trusted Root Certification Authorities certificate store and the Trusted Publishers certificate store.

-
CertMgr /add OutputFile.cer /s /r localMachine root 
-CertMgr /add OutputFile.cer /s /r localMachine trustedpublisher
-
- -
- - -
- - -
- - - - - -
- - - - - - - - - - - -
- - - - -
- -
- - - -
- - -
- - - - - -
- -
- - -
- - - - -
- -
- - diff --git a/m239/90 - Tools/Nagios - Zur Überwachung von Webservern b/m239/90 - Tools/Nagios - Zur Überwachung von Webservern deleted file mode 100644 index 40a9cb8..0000000 --- a/m239/90 - Tools/Nagios - Zur Überwachung von Webservern +++ /dev/null @@ -1,1423 +0,0 @@ - - - - - - - - - - - Nagios - The Industry Standard In IT Infrastructure Monitoring - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- -
- - -
- - -
-
-
-
-
- - - - - - -
-

What can Nagios help you do?

-
- -
-
-
- - -
-
-

Windows
Monitoring

-
-
-
-
- - -
-
-

Linux
Monitoring

-
-
-
-
- - -
-
-

Server
Monitoring

-
-
-
-
- - -
-
-

Application Monitoring

-
-
-
- - -
-
-

SNMP
Monitoring

-
-
-
-
- - -
-
-

Log Monitoring

-
-
-
-  - -

 

- -
-
- -
-
-
- - - - - - - - - - - - - - -
-
-
- - - -
-
-
-
-

-

Nagios XI provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure. Hundreds of third-party addons provide for monitoring of virtually all in-house and external applications, services, and systems.

-
-
-

-

Nagios Log Server greatly simplifies the process of searching your log data. Set up alerts to notify you when potential threats arise, or simply query your log data to quickly audit any system. With Nagios Log Server, you get all of your log data in one location, with high availability and fail-over built right in. Did we mention no data limits?

-
-
-

-

Nagios Fusion offers your network a high degree of visibility and scalability, helping solve problems that come with multiple networks and geographical separation. By allowing you to visualize multiple Nagios XI and Core servers in one location, network management becomes simplified by centralization.

-
-
- -
-
- -
-
-
- - - -
- - - - - -
-
-
-
-
-
-
-

Network Monitoring

-

When it comes to open source network monitoring tools, the World’s largest organizations turn to Nagios. Nagios monitors the network for problems caused by overloaded data links or network connections, as well as monitoring routers, switches and more. Easily able to monitor availability, uptime and response time of every node on the network, Nagios can deliver the results in a variety of visual representations and reports.

-

More Info:

- -
-
-
-
-
-
-
-
-
-
-
-
- -
-
-
- - - - - - - - -
-
-
-
-
-
-
-

Server Monitoring

-

Nagios is known for being the best server monitoring software on the market. Server monitoring is made easy in Nagios because of the flexibility to monitor your servers with both agent-based and agentless monitoring. With over 5000 different addons available to monitor your servers, the community at the Nagios Exchange have left no stone unturned.

-

More Info:

- -
-
-
-
-
-
-
-
-
-
-
-
- -
-
-
- - - - - - - - -
-
-
-
-
-
-
-

Application Monitoring

-

Implementing effective application monitoring with Nagios allows your organization to quickly detect application, service, or process problems, and take action to eliminate downtime for your application users. Nagios provides tools for monitoring of applications and application state – including Windows applications, Linux applications, UNIX applications, and Web applications.

-

More Info:

- -
-
-
-
-
-
-
-
-
-
-
-
- -
-
-
- - - -
- - - - - - - - -
-
-
- -
-
-

See how we help thousands of companies save money and eliminate downtime

-

See more Nagios Case Studies here

-
-
- - -
-
- - - - - - - - - -

-
-
bitnetix-computer
-
-

Bitnetix

-

Nagios helps e-commerce retail giant reach $125,000,000 in additional sales

-

Read More

-
-
-
-

-
-
computer
-
-

Astiostech

-

Single-point monitoring and high availability for 2,500+ servers and 5,000+ network devices

-

Read More

-
-
-
-

-
-
university-st-thomas-campus
-
-

The University of St. Thomas

-

University uses better data to improve purchasing decisions, bandwidth allocation, and reaction to anomalies

-

Read More

-
-
-
-

-
-
pipeline-image
-
-

Petrofac

-

Energy solutions giant sees increased capabilities, productivity by deploying Nagios

-

Read More

-
-
-
-
-
-
- -
-
-
- - - - - - - - -
-
-
- - -
- - - - - - - - - - -
-
-
-
- - - - - - - - - - -
-
-
- - - -
-
-
-
-
-

Nagios Open Source

-
-

Nagios Core

-

Download the core monitoring engine and a basic web interface.

-

Download

-
-
-

Nagios Core Plugins

-

Download the latest Nagios Core plugins package (50 plugins).

-

Download

-
-
-

Nagios Core Frontends

-

See a variety of Open Source front-ends by the community.

-

Download

-
-
-

Nagios Core Addons

-

See additional projects that extend Nagios Core functionality.

-

Download

-
-
-
-
-
-

Migrate to Nagios XI!

-

Get Nagios XI, our fully supported solution for monitoring, alerting, graphing and reporting. Moving core data is easier than ever!

-

Learn more

-
-
-
-
-
-
-
-
- -
- -
- - - - - - - - - - -
-
-
- - - -
-
-
-
-

Ready to Try Nagios?

-

You can try any of our solutions free for 30 days with no restrictions. Monitor your entire IT infrastructure, quickly sort log data, or analyze your bandwidth with Nagios. Nagios is helping organizations around the world make better business decisions with proven IT infrastructure monitoring, data collection, and netflow analysis solutions.

-Request a Demo Download Free Trial -
-
-
-
-
-
-
- -
-
-
- - - - -
-
- - -
-
-
- - - - -
-
- - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/m239/90 - Tools/OpenSSL - Toolkit für TLS-Unterstützung b/m239/90 - Tools/OpenSSL - Toolkit für TLS-Unterstützung deleted file mode 100644 index 286dedc..0000000 --- a/m239/90 - Tools/OpenSSL - Toolkit für TLS-Unterstützung +++ /dev/null @@ -1,159 +0,0 @@ - - - - - - - - /index.html - - - - - - - - - - - - - - - - - - - - - - - -
-
-

- - OpenSSL - -

-

Cryptography and SSL/TLS Toolkit

-
-
- - - -
-
-
-
- -

Welcome to OpenSSL!

-

The OpenSSL Project develops and maintains the OpenSSL software - a robust, commercial-grade, full-featured toolkit for general-purpose cryptography and secure communication. The project’s technical decision making is managed by the OpenSSL Technical Committee (OTC) and the project governance is managed by the OpenSSL Management Committee (OMC). The project operates under formal Bylaws.

-

For more information about the team and community around the project, or to start making your own contributions, start with the community page. To get the latest news, download the source, and so on, please see the sidebar or the buttons at the top of every page.

-

OpenSSL is licensed under an Apache-style license, which basically means that you are free to get and use it for commercial and non-commercial purposes subject to some simple license conditions.

-

For a list of vulnerabilities, and the releases in which they were found and fixes, see our Vulnerabilities page.

-

Latest News

-

- - - - - - - - - - - - - -
DateItem
21-Dec-2022Beta 1 of OpenSSL 3.1 is now available. This is a release candidate: please download and test it
13-Dec-2022Security Advisory: one low severity fix
01-Dec-2022Alpha 1 of OpenSSL 3.1 is now available: please download and test it
01-Nov-2022New Blog post: CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows
01-Nov-2022Security Advisory: two high severity fixes
-More… - -
-

-

Legalities

-

-Please remember that export/import and/or use of strong -cryptography software, providing cryptography hooks, or even just -communicating technical details about cryptography software is -illegal in some parts of the world. So when you import this -package to your country, re-distribute it from there or even -just email technical suggestions or even source patches to the -authors or other people you are strongly advised to pay close -attention to any laws or regulations which apply to -you. The authors of OpenSSL are not liable for any violations -you make here. So be careful, it is your responsibility. -

- - -
-
- -
-
- - - - - diff --git a/m239/90 - Tools/README.md b/m239/90 - Tools/README.md index e1d2621..3681338 100644 --- a/m239/90 - Tools/README.md +++ b/m239/90 - Tools/README.md @@ -1,5 +1,8 @@ # 90 - Tools +Zusammengestellt 2020 von Th. Kälin + + ## Vorinstallierte Tools - Bereits standardmässig vorhandene Tools @@ -81,3 +84,15 @@ Verweis: https://de.wikipedia.org/wiki/Traceroute - Wireshark
Netzwerkprotokoll-Analyzer
Verweis: https://www.wireshark.org/ + + +-- + +- Netcat +
Arbeitet als Server oder Client mit den Protokollen TCP und UDP (TCP/IP swiss army knife) +
Verweis: https://de.wikipedia.org/wiki/Netcat + + +- SysInternals - Div. Tools (Netzwerk, Dateien, Prozesse, etc.) +
Ausgesprochen nützliche Tools!!! (v.a. ProcExp und ProcMon) +
Verweis: https://technet.microsoft.com/en-us/sysinternals/bb795532 \ No newline at end of file diff --git a/m239/90 - Tools/Wireshark - Netzwerkprotokoll-Analyzer b/m239/90 - Tools/Wireshark - Netzwerkprotokoll-Analyzer deleted file mode 100644 index 6d0dff5..0000000 --- a/m239/90 - Tools/Wireshark - Netzwerkprotokoll-Analyzer +++ /dev/null @@ -1,952 +0,0 @@ - - - - - - - Wireshark · Go Deep. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- -
- -

The Wireshark Foundation is now a non-profit! Support the project with a donation.

-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - - -
-

- Download -

-

Get Started Now

-
-
-
-
-
-
- - - -
-

- Learn -

-

Knowledge is Power

-
-
-
-
-
-
- - - -
-

- Go Beyond -

-

With Wireshark Sponsors

-
-
-
-
- -
-
-
-
- -
-
-
-
- -
-

About Wireshark - -

- -
-
-
-
- -
- -
-
-

- Wireshark is the world’s foremost and widely-used - network protocol analyzer. It lets you see what’s happening on your - network at a microscopic level and is the de facto (and often de jure) - standard across many commercial and non-profit enterprises, government - agencies, and educational institutions. Wireshark development thrives - thanks to the volunteer contributions of networking experts around the - globe and is the continuation of a project started by Gerald Combs in - 1998. -

-

- Wireshark has a rich feature set which includes the - following: -

-
    -
  • Deep inspection of hundreds of protocols, with more being added all - the time
  • -
  • Live capture and offline analysis
  • -
  • Standard three-pane packet browser
  • -
  • Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, - NetBSD, and many others
  • -
  • Captured network data can be browsed via a GUI, or via the TTY-mode - TShark utility
  • -
  • The most powerful display filters in the industry
  • -
  • Rich VoIP analysis
  • -
  • Read/write many different capture file formats: tcpdump (libpcap), - Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network - Monitor, Network General Sniffer® (compressed and uncompressed), - Sniffer® Pro, and NetXray®, Network Instruments Observer, NetScreen - snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar - Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, - WildPackets EtherPeek/TokenPeek/AiroPeek, and many others
  • -
  • Capture files compressed with gzip can be decompressed on the fly -
  • -
  • Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, - Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending - on your platform)
  • -
  • Decryption support for many protocols, including IPsec, ISAKMP, - Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
  • -
  • Coloring rules can be applied to the packet list for quick, - intuitive analysis
  • -
  • Output can be exported to XML, PostScript®, CSV, or plain text
  • -
- -
-
- - -
-
- -

What is SharkFest?

-

SharkFest™, launched in - 2008, is a series of annual educational conferences staged in various - parts of the globe and focused on sharing knowledge, experience and best - practices among the Wireshark® - developer and user communities. -

- -

SharkFest attendees hone their skills in the art of packet analysis by - attending lecture and lab-based sessions delivered by the most seasoned - experts in the industry. Wireshark core code contributors also gather - during the conference days to enrich and evolve the tool to maintain its - relevance in ensuring the productivity of modern networks.

-

Learn more about SharkFest in our FAQ - PDF.

-

SharkFest Mission

-

SharkFest’s aim is to support ongoing Wireshark development, to educate - and inspire current and future generations of computer science and IT - professionals responsible for managing, troubleshooting, diagnosing and - securing legacy and modern networks, and to encourage widespread use of - the free analysis tool. Per Gerald Combs, Wireshark project Founder - …“Wireshark is a tool and a community. My job is to support both”.

-

SharkFest GOALS

-
    -
  1. To educate current and future generations of network engineers, - network architects, application engineers, network consultants, and - other IT professionals in best practices for troubleshooting, - securing, analyzing, and maintaining productive, efficient - networking infrastructures through use of the Wireshark free, open - source analysis tool.
  2. -
  3. To share use cases and knowledge among members of the Wireshark user - and developer communities in a relaxed, informal milieu.
  4. -
  5. To remain a self-funded, independent, educational conference hosted - by a corporate sponsor.
  6. -
-

SharkFest Conferences

-

SharkFest'23

-
    -
  • TBD
  • -
  • Location: TBD
  • -
-
-
- -
-
-
-
-

The Wireshark Foundation is profoundly grateful to the - organizations that have generously supported SharkFest™ - educational conferences over the years. Please join us in - thanking them by reviewing their Wireshark use-enhancing - technology, training, and services either at a SharkFest event, - or through clicking on their ads below.

- - - - -
-
-
-
-
- -
- - -
- -
-
-
-
-
-
-
-
-
-
- -
-

Learn Wireshark - -

- -
-
-
-
-
-

- Wireshark Training -

-
-
-
-

SharkFest™ Wireshark Educational Conferences

-

Join Gerald Combs, Hansang Bae, Kary Rogers, Sake Blok, Jasper Bongertz, Christian - Landström, Phill Shade, and many other packet analysis experts at SharkFest, an immersive - Wireshark training experience.

- -

Contact [email protected] for more - info.

- - -

Wireshark University USA Training - Packet Pioneer - Chris Greer

- -

Wireshark University Europe/EMEA - SCOS Training - Europe

- -

Classroom and Virtual Courses:

- -

For in-company and Special Law Enforcement/Forensics Courses, contact [email protected]

-
-
-
- -
-
-
-

- User Documentation -

-
-
-
-

User's Guide

-

- The Wireshark User's Guide is available in several formats: -
- Web pages (browseable): One - huge page or multiple - pages
- Web pages (ZIP file): One huge - page or multiple - pages
- EPUB
- PDF -

-

Command-line Manual Pages

-

UNIX-style man pages for Wireshark, TShark, dumpcap, and other utilities

-

Display Filter Reference

-

All of Wireshark's display filters, from version 1.0.0 to present.

-

Release Notes

-

Version 0.99.2 to present. -

Security Advisories

-

Information about vulnerabilities in past releases and how to report a - vulnerability

-

Bibliography

-

Books, articles, videos and more!

-

Mirroring Instructions

-

How to set up a wireshark.org mirror

-

Export Regulations

-

Our primary distribution point and how it affects you

-
-
- -
-
-
-
-
-
-

- Videos and Presentations -

-
-
-
-

SharkFest Retrospective Pages

-

- SharkFest features presentations from - a variety of knowledgeable, informative speakers. -

- -

Videos

-

Take the free “Introduction to Wireshark” Tutorial series with - Chris

- - -

Top 10 Wireshark Filters Follow Chris as he shows you the top - filters you need to know to start shredding

- - -

TCP Fundamentals Part 1 - SharkFest Talks Join Chris at SharkFest - when he covered the core concepts of TCP Analysis - shredding

- - -

How I Learned to Stop Worrying and Love the PCAPs (Kary Rogers) -

- -
-
-
- - -
- -
-
-
-
-
-
-
- -
-

- News and Events -

-
-
-
-
- - Devices - -
    -
  • -

    - SharkFest'23 -

    -

    Wireshark Developer and User Conference
    - Dates: TBD
    - Location: TBD

    -
  • -
-
-
-
-
-
-
-
- -
-
-
-
-
-
- - -
-

- Download Wireshark - -

-
-

- The current stable release of Wireshark is 4.0.2. -

- - - - -
-
-
- -
-
-
-
- - -
-
- - -
-
- - -
-
- - -
-
- - DigitalOcean - -
-
-
-
-
-
-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/m239/90 - Tools/ab - Apache HTTP server benchmarking tool b/m239/90 - Tools/ab - Apache HTTP server benchmarking tool deleted file mode 100644 index c6964fc..0000000 --- a/m239/90 - Tools/ab - Apache HTTP server benchmarking tool +++ /dev/null @@ -1,360 +0,0 @@ - - - - - -ab - Apache HTTP server benchmarking tool - Apache HTTP Server Version 2.4 - - - - - - - -
<-
-

ab - Apache HTTP server benchmarking tool

-
-

Available Languages:  en  | - fr  | - ko  | - tr 

-
- -

ab is a tool for benchmarking your Apache Hypertext - Transfer Protocol (HTTP) server. It is designed to give you an impression - of how your current Apache installation performs. This especially shows - you how many requests per second your Apache installation is capable of - serving.

-
- -
top
-
-

Synopsis

-

ab - [ -A auth-username:password ] - [ -b windowsize ] - [ -B local-address ] - [ -c concurrency ] - [ -C cookie-name=value ] - [ -d ] - [ -e csv-file ] - [ -E client-certificate file ] - [ -f protocol ] - [ -g gnuplot-file ] - [ -h ] - [ -H custom-header ] - [ -i ] - [ -k ] - [ -l ] - [ -m HTTP-method ] - [ -n requests ] - [ -p POST-file ] - [ -P proxy-auth-username:password ] - [ -q ] - [ -r ] - [ -s timeout ] - [ -S ] - [ -t timelimit ] - [ -T content-type ] - [ -u PUT-file ] - [ -v verbosity] - [ -V ] - [ -w ] - [ -x <table>-attributes ] - [ -X proxy[:port] ] - [ -y <tr>-attributes ] - [ -z <td>-attributes ] - [ -Z ciphersuite ] - [http[s]://]hostname[:port]/path

-
top
-
-

Options

-
-
-A auth-username:password
-
Supply BASIC Authentication credentials to the server. The username and - password are separated by a single : and sent on the wire - base64 encoded. The string is sent regardless of whether the server needs - it (i.e., has sent an 401 authentication needed).
- -
-b windowsize
-
Size of TCP send/receive buffer, in bytes.
- -
-B local-address
-
Address to bind to when making outgoing connections.
- -
-c concurrency
-
Number of multiple requests to perform at a time. Default is one - request at a time.
- -
-C cookie-name=value
-
Add a Cookie: line to the request. The argument is - typically in the form of a name=value - pair. This field is repeatable.
- -
-d
-
Do not display the "percentage served within XX [ms] table". (legacy - support).
- -
-e csv-file
-
Write a Comma separated value (CSV) file which contains for each - percentage (from 1% to 100%) the time (in milliseconds) it took to serve - that percentage of the requests. This is usually more useful than the - 'gnuplot' file; as the results are already 'binned'.
- -
-E client-certificate-file
-
When connecting to an SSL website, use the provided client certificate - in PEM format to authenticate with the server. The file is expected to - contain the client certificate, followed by intermediate certificates, - followed by the private key. Available in 2.4.36 and later.
- -
-f protocol
-
Specify SSL/TLS protocol (SSL2, SSL3, TLS1, TLS1.1, TLS1.2, or ALL). - TLS1.1 and TLS1.2 support available in 2.4.4 and later.
- -
-g gnuplot-file
-
Write all measured values out as a 'gnuplot' or TSV (Tab separate - values) file. This file can easily be imported into packages like Gnuplot, - IDL, Mathematica, Igor or even Excel. The labels are on the first line of - the file.
- -
-h
-
Display usage information.
- -
-H custom-header
-
Append extra headers to the request. The argument is typically in - the form of a valid header line, containing a colon-separated field-value - pair (i.e., "Accept-Encoding: zip/zop;8bit").
- -
-i
-
Do HEAD requests instead of GET.
- -
-k
-
Enable the HTTP KeepAlive feature, i.e., perform multiple - requests within one HTTP session. Default is no KeepAlive.
- -
-l
-
Do not report errors if the length of the responses is not constant. This - can be useful for dynamic pages. - Available in 2.4.7 and later. -
- -
-m HTTP-method
-
Custom HTTP method for the requests. - Available in 2.4.10 and later.
- -
-n requests
-
Number of requests to perform for the benchmarking session. The default - is to just perform a single request which usually leads to - non-representative benchmarking results.
- -
-p POST-file
-
File containing data to POST. Remember to also set -T.
- -
-P proxy-auth-username:password
-
Supply BASIC Authentication credentials to a proxy en-route. The - username and password are separated by a single : and sent on - the wire base64 encoded. The string is sent regardless of whether the - proxy needs it (i.e., has sent an 407 proxy authentication - needed).
- -
-q
-
When processing more than 150 requests, ab outputs a - progress count on stderr every 10% or 100 requests or so. The - -q flag will suppress these messages.
- -
-r
-
Don't exit on socket receive errors.
- -
-s timeout
-
Maximum number of seconds to wait before the socket times out. - Default is 30 seconds. - Available in 2.4.4 and later.
- -
-S
-
Do not display the median and standard deviation values, nor display - the warning/error messages when the average and median are more than - one or two times the standard deviation apart. And default to the - min/avg/max values. (legacy support).
- -
-t timelimit
-
Maximum number of seconds to spend for benchmarking. This implies a - -n 50000 internally. Use this to benchmark the server within a - fixed total amount of time. Per default there is no timelimit.
- -
-T content-type
-
Content-type header to use for POST/PUT data, eg. - application/x-www-form-urlencoded. - Default is text/plain.
- -
-u PUT-file
-
File containing data to PUT. Remember to also set -T.
- -
-v verbosity
-
Set verbosity level - 4 and above prints information on - headers, 3 and above prints response codes (404, 200, etc.), - 2 and above prints warnings and info.
- -
-V
-
Display version number and exit.
- -
-w
-
Print out results in HTML tables. Default table is two columns wide, - with a white background.
- -
-x <table>-attributes
-
String to use as attributes for <table>. Attributes - are inserted <table here >.
- -
-X proxy[:port]
-
Use a proxy server for the requests.
- -
-y <tr>-attributes
-
String to use as attributes for <tr>.
- -
-z <td>-attributes
-
String to use as attributes for <td>.
- -
-Z ciphersuite
-
Specify SSL/TLS cipher suite (See openssl ciphers)
-
-
top
-
-

Output

-

The following list describes the values returned by ab: -

- -
-
Server Software
-
The value, if any, returned in the server HTTP header - of the first successful response. This includes all characters in the - header from beginning to the point a character with decimal value of 32 - (most notably: a space or CR/LF) is detected.
- -
Server Hostname
-
The DNS or IP address given on the command line
- -
Server Port
-
The port to which ab is connecting. If no port is given on the - command line, this will default to 80 for http and 443 for - https.
- -
SSL/TLS Protocol
-
The protocol parameters negotiated between the client and server. - This will only be printed if SSL is used.
- -
Document Path
-
The request URI parsed from the command line string.
- -
Document Length
-
This is the size in bytes of the first successfully returned document. - If the document length changes during testing, the response is - considered an error.
- -
Concurrency Level
-
The number of concurrent clients used during the test
- -
Time taken for tests
-
This is the time taken from the moment the first socket connection - is created to the moment the last response is received
- -
Complete requests
-
The number of successful responses received
- -
Failed requests
-
The number of requests that were considered a failure. If the - number is greater than zero, another line will be printed showing the - number of requests that failed due to connecting, reading, incorrect - content length, or exceptions.
- -
Write errors
-
The number of errors that failed during write (broken pipe).
- -
Non-2xx responses
-
The number of responses that were not in the 200 series of response - codes. If all responses were 200, this field is not printed.
- -
Keep-Alive requests
-
The number of connections that resulted in Keep-Alive requests
- -
Total body sent
-
If configured to send data as part of the test, this is the total - number of bytes sent during the tests. This field is omitted if the test - did not include a body to send.
- -
Total transferred
-
The total number of bytes received from the server. This number - is essentially the number of bytes sent over the wire.
- -
HTML transferred
-
The total number of document bytes received from the server. This - number excludes bytes received in HTTP headers
- -
Requests per second
-
This is the number of requests per second. This value is the result - of dividing the number of requests by the total time taken
- -
Time per request
-
The average time spent per request. The first value is calculated - with the formula concurrency * timetaken * 1000 / done - while the second value is calculated with the formula - timetaken * 1000 / done
- -
Transfer rate
-
The rate of transfer as calculated by the formula - totalread / 1024 / timetaken
-
-
top
-
-

Bugs

-

There are various statically declared buffers of fixed length. Combined - with the lazy parsing of the command line arguments, the response headers - from the server and other external inputs, this might bite you.

- -

It does not implement HTTP/1.x fully; only accepts some 'expected' forms - of responses. The rather heavy use of strstr(3) shows up top - in profile, which might indicate a performance problem; i.e., you - would measure the ab performance rather than the server's.

-
-
-

Available Languages:  en  | - fr  | - ko  | - tr 

-
top

Comments

Notice:
This is not a Q&A section. Comments placed here should be pointed towards suggestions on improving the documentation or server, and may be removed by our moderators if they are either implemented or considered invalid/off-topic. Questions on how to manage the Apache HTTP Server should be directed at either our IRC channel, #httpd, on Libera.chat, or sent to our mailing lists.
-
- \ No newline at end of file