netsh

Windows git和cmd代理设置

假如想象 提交于 2019-12-05 09:48:51
linux的比较简单,直接修改配置文件即可,这里就不再赘述 设置Git代理 http代理: 临时代理: export http_proxy= http://127.0.0.1:7777 export https_proxy= http://127.0.0.1:7777 永久代理: 命令方式: git config --global http.proxy http://127.0.0.1:50015 git config --global https.proxy http://127.0.0.1:50015 修改配置文件方式 进入用户名根路径,找到 .gitconfig 文件,修改( 地址和端口换成自己的 )为: [http] proxy = http://127.0.0.1:50015 [https] proxy = http://127.0.0.1:50015 查看http (s)代理情况: git config --get --global http.proxy git config --get --global https.proxy 永久代理 - SOCKS5 代理设置 命令方式: git config --global http.proxy socks5://127.0.0.1:50014 git config --global https.proxy socks5:/

querying netsh in c#

落花浮王杯 提交于 2019-12-04 19:47:36
I've been trying to come up with an ideal way to query WiFi information using C#. I've tried the netsh method but was unsure how to separate the information. I notice that Vistumbler uses netsh . Is there a way that these developers would have separated the information when querying netsh or have they just performed a lot of string manipulation to cut out the irrelevant stuff. GETah That is what I do usually. Call netsh , get the output and parse it. Process p = new Process(); p.StartInfo.FileName = "netsh.exe"; p.StartInfo.Arguments = "netsh arguments..."; p.StartInfo.UseShellExecute = false;

Use netsh advfirewall to Add windows 7 firewall exception [closed]

不羁岁月 提交于 2019-12-04 15:14:12
Hi I am adding a firewall exception to Windows 7 using netsh. The simple rule i am adding is: netsh advfirewall firewall add rule name = "The Test App3" dir = in action = allow description = "Smart Cipher inbound messages" program = "C:\temp\a.exe" The problem is that after executing this command a new rule is added to the firewall and is displayed within the firewall console - but it seems it is not properly configured for two reasons: 1. The Remove button in the firewall console is disabled 2. Clicking the Details... button show no details for the rule, unlike other "good rules", but only

windows电脑cmd查看wifi密码

时间秒杀一切 提交于 2019-12-04 08:02:06
参考:https://www.lmdouble.com/0103002365.html 1.用管理员权限运行cmd 2.查看某一具体wifi的密码——密码显示在关键内容后边 netsh wlan show profile name="wifi名称" key=clear 如:netsh wlan show profile name="CMCC-edu" key=clear 3.查看历史连接过的所有密码 for /f "skip=9 tokens=1,2 delims=:" %i in ('netsh wlan show profiles') do @echo %j | findstr -i -v echo | netsh wlan show profiles %j key=clear 4.使用bat快速查看 在桌面新建一个记事本文件,将其名字改为“Wifi密码.bat” (将txt文件改为.bat文件) 将下列脚本复制到文件中 @echo off echo. echo. echo. echo -------win10中已保存的wifi密码查看------ echo. echo. echo. set /p wifi_name="请输入要查看密码的wifi名称:" netsh wlan show profile name=%wifi_name% key=clear >%wifi_name

Command netsh using C#

情到浓时终转凉″ 提交于 2019-12-04 02:35:31
问题 I want to create a C# application to create a WLAN network. I currently use netsh using command prompt. My application should do this in button click. Here is the command I use in command prompt in admin mode "netsh wlan set hostednetwork mode=allow ssid=sha key=12345678" after that I enter "netsh wlan start hostednetwork". When I do this i can create a wifi local area network. In C# I coded like below private void button1_Click(object sender, EventArgs e) { Process p = new Process(); p

通过Windows实现端口转发

依然范特西╮ 提交于 2019-12-03 23:12:23
转自:月光博客《 通过Windows实现端口转发 》 这里介绍一个使用两台云服务器访问外网的方法,一台国内服务器,一台国外服务器,国内服务器通过端口转发来用于中转,中转的好处是,服务器对服务器是很快的,国内对国内也很快,国内服务器对国外也快一些,这种方法比直接访问国外服务器的速度要快一些。 首先要找到你国内云服务器的内网ip,不是你的公网IP,使用命令ipconfig即可找到。 对于 Windows Server 2008以下版本的系统,需要安装IPV6才行,如果是Windows Server 2008或者以上的系统则默认已经支持。 之后,使用Portproxy模式下的Netsh命令即能实现Windows系统中的端口转发,转发命令如下 netsh interface portproxy add v4tov4 listenaddress=localaddress listenport=localport connectaddress=destaddress 解释一下这其中的参数意义 1.listenaddress -- 等待连接的本地ip地址 2.listenport -- 本地监听的TCP端口(待转发) 3.connectaddress -- 被转发端口的本地或者远程主机的ip地址 4.connectport -- 被转发的端口 这里举个例子,服务器内网IP是172.16.0.4

windows 端口转发 netsh

拜拜、爱过 提交于 2019-12-03 13:28:32
原文地址 listenaddress # 本地监听的ip listenport # 本地监听的端口 connectaddress # 转发请求接收的主机ip connectport # 转发请求接收的主机的端口 # 执行命令 netsh interface portproxy add v4tov4 listenaddress=localip listenport=localport connectaddress=remoteip connectport=remoteport # 查看现有的配置 netsh interface portproxy show all # 删除原有的端口转发 netsh interface portproxy delete v4tov4 listenaddress=localip listenport=localport 示例 #添加 netsh interface portproxy add v4tov4 listenaddress=192.168.15.89 listenport=2222 connectaddress=192.168.15.35 connectport=22 #删除 netsh interface portproxy delete v4tov4 listenaddress=192.168.15.89 listenport=2222

内网渗透中常用的隧道工具

拈花ヽ惹草 提交于 2019-12-03 04:50:42
frp 项目地址 https://github.com/fatedier/frp/ 简介 frp 是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp 协议,为 http 和 https 应用协议提供了额外的能力,且尝试性支持了点对点穿透 跨平台支持linux,win,mac 类似于ngrok,运维、开发人员经常使用它管理内网机器和调试程序,例如将内网的22,3389转发到公网,开发人员将本地web服务转发到公网调试,msf/rat远控的内网上线,可以代替前几年流行的”内网通”服务 优点:不需要免杀,支持加密传输 基本用法 在有公网ip的vps上部署服务端,然后在目标的内网机器上运行客户端即可反连公网机器,根据配置把内网中的目的端口转发到公网的那台机器上。网上也有一些免费和收费frp服务,可以免去自己部署服务端。 简单示例: 服务端和客户端均支持配置文件ini运行和命令行运行,下面示例为命令行。 12 服务端:./frps -p <服务监听端口> -t <token>客户端:./frpc tcp -s <服务端ip>:<服务端端口> -r <在服务端监听的对应端口> -i <内网地址> -l <内网端口> -t <token> --ue --uc –ue –uc 分别为加密和压缩(use_encryption && use_compression)

Set proxy through windows command line including login parameters

那年仲夏 提交于 2019-12-03 03:15:36
问题 I want to set a proxy throught the command line, first thing I found out is that you have to run command line with administrator rights - then the basic proxy set would be: netsh winhttp set proxy SERVER:PORT This works nice, but I also want to add a login. As you can see I've tried using netsh->winhttp, however manual does not say anything about the login part so I just tried: netsh winhttp set proxy user:password@SERVER:PORT This unfortunately does not work. Is it even possible to achieve