mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-23 13:13:41 +00:00
77 lines
5.2 KiB
Markdown
77 lines
5.2 KiB
Markdown
<details>
|
||
|
||
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks云 ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 推特 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summary>
|
||
|
||
- 你在一家**网络安全公司**工作吗?你想在HackTricks中看到你的**公司广告**吗?或者你想获得**PEASS的最新版本或下载PDF格式的HackTricks**吗?请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
||
|
||
- 发现我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品[**The PEASS Family**](https://opensea.io/collection/the-peass-family)
|
||
|
||
- 获取[**官方PEASS和HackTricks周边产品**](https://peass.creator-spring.com)
|
||
|
||
- **加入** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord群组**](https://discord.gg/hRep4RUj7f) 或 [**Telegram群组**](https://t.me/peass) 或 **关注**我在**Twitter**上的[**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
||
|
||
- **通过向[hacktricks repo](https://github.com/carlospolop/hacktricks)和[hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)提交PR来分享你的黑客技巧**。
|
||
|
||
</details>
|
||
|
||
|
||
# 基本信息
|
||
|
||
此主机上运行着一个回显服务。回显服务旨在用于测试和测量目的,可以监听TCP和UDP协议。服务器会原样发送接收到的任何数据。\
|
||
**通过将回显服务连接到同一台或另一台机器上的回显服务,可能会导致拒绝服务**。由于产生的数据包数量过多,受影响的机器可能会被有效地停止服务。\
|
||
信息来自[https://www.acunetix.com/vulnerabilities/web/echo-service-running/](https://www.acunetix.com/vulnerabilities/web/echo-service-running/)
|
||
|
||
**默认端口:** 7/tcp/udp
|
||
```
|
||
PORT STATE SERVICE
|
||
7/udp open echo
|
||
7/tcp open echo
|
||
```
|
||
## 联系回显服务(UDP)
|
||
|
||
The Echo service is a simple network service that allows a client to send a message to the server, and the server will send the same message back to the client. This service is commonly used for testing and debugging network connectivity.
|
||
|
||
To contact the Echo service using UDP, you can use the `nc` command with the `-u` flag followed by the IP address and port number of the server. For example:
|
||
|
||
```
|
||
nc -u <server_ip> <port_number>
|
||
```
|
||
|
||
Replace `<server_ip>` with the IP address of the server running the Echo service, and `<port_number>` with the port number on which the service is listening.
|
||
|
||
Once the connection is established, you can send a message to the server, and it will echo the same message back to you. This can be useful for verifying that UDP packets are being properly transmitted and received.
|
||
|
||
Remember that UDP is a connectionless protocol, so there is no guarantee of delivery or order of packets. If you don't receive a response from the server, it could be due to network issues or firewall restrictions.
|
||
|
||
It's also worth noting that the Echo service is often disabled or restricted on production networks due to security concerns. Therefore, it's important to only use this service for testing purposes on authorized systems.
|
||
```bash
|
||
nc -uvn <IP> 7
|
||
Hello echo #This is wat you send
|
||
Hello echo #This is the response
|
||
```
|
||
## Shodan
|
||
|
||
* `port:7 echo`
|
||
|
||
# 参考资料
|
||
|
||
[Wikipedia echo](http://en.wikipedia.org/wiki/ECHO_protocol)
|
||
|
||
[CA-1996-01 UDP Port Denial-of-Service Attack](http://www.cert.org/advisories/CA-1996-01.html)
|
||
|
||
|
||
<details>
|
||
|
||
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summary>
|
||
|
||
- 你在一个**网络安全公司**工作吗?想要在HackTricks中**宣传你的公司**吗?或者你想要**获取PEASS的最新版本或下载PDF格式的HackTricks**吗?请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
||
|
||
- 发现我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品——[**The PEASS Family**](https://opensea.io/collection/the-peass-family)
|
||
|
||
- 获得[**官方PEASS和HackTricks周边产品**](https://peass.creator-spring.com)
|
||
|
||
- **加入**[**💬**](https://emojipedia.org/speech-balloon/) [**Discord群组**](https://discord.gg/hRep4RUj7f)或[**电报群组**](https://t.me/peass),或者**关注**我在**Twitter**上的[**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks_live)**。**
|
||
|
||
- **通过向[hacktricks repo](https://github.com/carlospolop/hacktricks)和[hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)提交PR来分享你的黑客技巧**。
|
||
|
||
</details>
|