이것은 페이지 Ephemeral Ports assigment
를 삭제할 것입니다. 다시 한번 확인하세요.
To select source-ports for bot-connections of the botnet-attack, ID2T offers 3 strategies widely used in operating systems:
(Port selection strategies from newer systems are not available because they're closed source and reverse engineering them is out of the scope of this project)
By default the MembersMgmtCommAttack uses the linux-implementation. Keep in mind operating systems have one epehemeral port range for TCP and UDP but may have different selection strategies for those two. MembersMgmtCommAttack only creates UDP packets for now, but this might change in the future and with this the selection strategy might too.
To save developers some time the file code/ID2TLib/Ports.py
contains two enumeration-classes containing ephemeral port ranges and port-selection-combinations for several operation systems, along with a link to the source of this information. Yet this list is far from complete and adding to this list would a great contribution.
이것은 페이지 Ephemeral Ports assigment
를 삭제할 것입니다. 다시 한번 확인하세요.