Kali 分析和管理网络

news2025/2/24 9:30:08

查看网络

ifconfig 命令

┌──(root㉿kali)-[~] # eth0:有线网卡
└─# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 39  bytes 17736 (17.3 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 45  bytes 17169 (16.7 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

 
┌──(root㉿kali)-[~] # ifconfig -a 查看所有的接口
└─# ifconfig -a
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 100  bytes 21639 (21.1 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 51  bytes 17593 (17.1 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

┌──(root㉿kali)-[~]
└─# ifdown eth0
ifdown: unknown interface eth0
                                                                                               
┌──(root㉿kali)-[~] # ifconfig eth0 down 停用eth0这块网卡
└─# ifconfig etho down
etho: ERROR while getting interface flags: 没有那个设备
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 down

  ┌──(root㉿kali)-[~]
└─# ifconfig          
lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
┌──(root㉿kali)-[~] -a 查看所有活动和不活动的网卡
└─# ifconfig -a       
eth0: flags=4098<BROADCAST,MULTICAST>  mtu 1500
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 137  bytes 23889 (23.3 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 55  bytes 17865 (17.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 

┌──(root㉿kali)-[~] #  ifconfig eth0 up 启用这块网卡
└─# ifconfig eth0 up  
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig        
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 142  bytes 24471 (23.8 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 65  bytes 18883 (18.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
    

iwconfig 检查无线网卡

┌──(root㉿kali)-[~]
└─# iwconfig   
lo        no wireless extensions.

eth0      no wireless extensions.

无线网卡

查看ifconfig 参数

# eth0: 网卡名称,不固定
# inet:IP地址
# netmask :子网掩码
# broadcast :广播地址
# inet6 :支持ipv6
# ether :mac地址
# 1000  :传输速率1000M
# RX packets:接收了多少个报文
# TX packets:发送了多少个报文
# RX errors:是否丢包
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.128  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 142  bytes 24471 (23.8 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 65  bytes 18883 (18.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

ip 命令

查看IP地址 不能查看ip的状态 是否丢包


┌──(root㉿kali)-[~] # ip address show
└─# ip address show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1380sec preferred_lft 1380sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever
                                                                                               
┌──(root㉿kali)-[~]
└─# ip a               
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1377sec preferred_lft 1377sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever
                                                                                               
┌──(root㉿kali)-[~]
└─# ip -help
Usage: ip [ OPTIONS ] OBJECT { COMMAND | help }
       ip [ -force ] -batch filename
where  OBJECT := { address | addrlabel | amt | fou | help | ila | ioam | l2tp |
                   link | macsec | maddress | monitor | mptcp | mroute | mrule |
                   neighbor | neighbour | netconf | netns | nexthop | ntable |
                   ntbl | route | rule | sr | tap | tcpmetrics |
                   token | tunnel | tuntap | vrf | xfrm }
       OPTIONS := { -V[ersion] | -s[tatistics] | -d[etails] | -r[esolve] |
                    -h[uman-readable] | -iec | -j[son] | -p[retty] |
                    -f[amily] { inet | inet6 | mpls | bridge | link } |
                    -4 | -6 | -M | -B | -0 |
                    -l[oops] { maximum-addr-flush-attempts } | -br[ief] |
                    -o[neline] | -t[imestamp] | -ts[hort] | -b[atch] [filename] |
                    -rc[vbuf] [size] | -n[etns] name | -N[umeric] | -a[ll] |
                    -c[olor]}

更改IP地址

临时更改

ifconfig eth0 192.168.56.66 使用的是默认子网掩码 应用场景:排错,调试网络

┌──(root㉿kali)-[~]
└─# ip a    
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1202sec preferred_lft 1202sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 192.168.56.66
                                                                                               
┌──(root㉿kali)-[~]
└─# ip a                       
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.66/24 brd 192.168.56.255 scope global noprefixroute eth0
       valid_lft forever preferred_lft forever
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever

## 为什么是临时更改,可以通过停用之后再启用,ip还是之前的

┌──(root㉿kali)-[~]
└─# ifconfig eth0 down         
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 up  
                                                                                               
┌──(root㉿kali)-[~]
└─# ip a              
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:b3:79:91 brd ff:ff:ff:ff:ff:ff
    inet 192.168.56.128/24 brd 192.168.56.255 scope global dynamic noprefixroute eth0
       valid_lft 1797sec preferred_lft 1797sec
    inet6 fe80::20c:29ff:feb3:7991/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever


## 指定IP地址的时候同时指定子网掩码
┌──(root㉿kali)-[~]
└─# ifconfig eth0 10.1.1.1                      
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig               
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.1.1.1  netmask 255.0.0.0  broadcast 10.255.255.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 363  bytes 38409 (37.5 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 89  bytes 20795 (20.3 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0


##
┌──(root㉿kali)-[~]
└─# ifconfig eth0 10.1.1.1 netmask 255.255.255.0
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig                                    
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.1.1.1  netmask 255.255.255.0  broadcast 10.1.1.255
        inet6 fe80::20c:29ff:feb3:7991  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:b3:79:91  txqueuelen 1000  (Ethernet)
        RX packets 388  bytes 39909 (38.9 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 90  bytes 20857 (20.3 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 4  bytes 240 (240.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 4  bytes 240 (240.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

在Kali中如何使用无线网卡连接WiFi

  1. 先在主机中使用无线网卡连接WiFi
  1. 在对应官网下载网卡驱动
  1. 在虚拟机中添加USB控制器
  1. 查看网络接口 ifconfig -a
  1. 如果无线网络处于不活动状态,使用ifconfig wlan0 up 启用无线网卡
  1. 使用iwconfig 收集无线网卡的信息

无线网卡

添加USB控制器
连接
提示
查看连接

使用iwconfig 收集无线网卡的信息数据解析

## IEEE 802.11 : 无线网络的标准 包含 802.11 a/b/g/
## 802.11n(支持2.4GHz和5GHz 理论带宽最高600Mpbs)
## 
wlan0 IEEE 802.11 EssID:off/any
      Mode:Managed Access       Point: Not-Associated Tx-Power=20 dBm
      Retry short limit:7  RTs thr:off Fragment thr:off
      Encryption key:off
      Power Management :off

## 连接上WiFi的数据解析
## ESSID 无线WiFi标识
## Access Point: AP,无线接入点,值为MAC地址
## Mode:Managed :当前无线网卡的模式Managed :客户端模式,连接WiFi通常使用的模式;
## Mode:Monitor(监视)或(promiscuous 混插模式):在破解无线密码时,我们需要使用到混杂模式(promiscuous mode)或Moditor模式;在这种模式下,网卡处于嗅探状态(被成为Passive状态,被动状态)
## Bit Rate=150 Mb/s :传输速率
## Tx-Power:功率


wlan0	IEEE 802.11	ESSID:"Xiaomi 20A8"
		Mode:Managed	Frequency:2.437 GHz Access Point: 88:C3:97:C2:F1:4E
		Bit Rate=150 Mb/s	Tx-Power=20 dBm
		Retry short limit:7	RTS thr:off	Fragment thr:off
		Encryption key:off
		Power Management :off
		Link Quality=70/70 Siqnal level=-36 dBm
		Rx invalid nwid;0 Rx invalid crypt:0 Rx invalid frag:0
		Tx excessive retries:0   Invalid misc:16Missed beacon:0
  1. 连接指定的WiFi:推荐使用图形化界面连接WiFi

PS:前提:NetworkManager 服务要开启(服务名称区分大小写) systemtcl status NetworkManager

在kali中查看你的无线网卡是否可以用于无线攻击

## iw list 查看无线网卡支持的模式
Supported interface modes :
		*IBSS
		*managed
		*AP ()
		*AP/VLANt
		*monitor ()
		*mesh point
		*P2P-client
		*P2P-GO
		*outside context of a BSS

## 查看是否支持数据包的注入功能
aireplay-ng -9 wlan0

数据注入

更改MAC地址

MAC地址的欺骗

MAC地址是全球唯一的,48位,16进制表示;前24位代表厂商地址

防范:通常被用作一种安全措施,以防止黑客进入网络或追踪他们

攻击: 更改MAC地址来伪装成一个不同的MAC地址使得上述安全措施无效

MAC地址
#PS 地址查询 MAC地址
查询

## ncpa.cpl --网络连接
## arp协议 --把IP地址解析成MAC地址 arp -a 查看arp缓存
## arp -d 192.168.56.128 删除arp指定缓存
C:\Users\Administrator>arp -d 192.168.56.128 

## kali中打开嗅探工具

## 更改MAC 地址
## 方法1: ifconfig eth0 hw ether 00:0c:29:76:ad:99
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 down
  
┌──(root㉿kali)-[~]
└─# ifconfig eth0 hw ether 00:0c:29:76:ad:99
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig eth0 up                        
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig        
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.129  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:fe76:ad99  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:76:ad:99  txqueuelen 1000  (Ethernet)
        RX packets 1541  bytes 115390 (112.6 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 185  bytes 30203 (29.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

┌──(root㉿kali)-[~]
└─# macchanger -s eth0
Current MAC:   00:0c:29:76:ad:99 (VMware, Inc.) ## 当前MAC地址
Permanent MAC: 00:0c:29:b3:79:91 (VMware, Inc.) ## 永久MAC地址

网络连接
arp协议

嗅探

打开kali 嗅探工具

嗅探

选择监听

监听

查看捕获数据

捕获数据

方法2:macchager 更改mac地址

┌──(root㉿kali)-[~]
└─# macchanger -h     
GNU MAC Changer
Usage: macchanger [options] device

  -h,  --help                   Print this help
  -V,  --version                Print version and exit
  -s,  --show                   Print the MAC address and exit
  -e,  --ending                 Don't change the vendor bytes
  -a,  --another                Set random vendor MAC of the same kind
  -A                            Set random vendor MAC of any kind
  -p,  --permanent              Reset to original, permanent hardware MAC
  -r,  --random                 Set fully random MAC
  -l,  --list[=keyword]         Print known vendors
  -b,  --bia                    Pretend to be a burned-in-address
  -m,  --mac=XX:XX:XX:XX:XX:XX
       --mac XX:XX:XX:XX:XX:XX  Set the MAC XX:XX:XX:XX:XX:XX

## macchanger eth0 -m  00:0c:29:76:ad:97
┌──(root㉿kali)-[~]
└─# macchanger eth0 -m  00:0c:29:76:ad:97
Current MAC:   00:0c:29:76:ad:99 (VMware, Inc.)
Permanent MAC: 00:0c:29:b3:79:91 (VMware, Inc.)
New MAC:       00:0c:29:76:ad:97 (VMware, Inc.)

通过DHCP服务器获取IP地址

DHCP协议 - 动态主机配置协议

Server:UDP/67 Linux下的DHCP服务(daemon,在后台进行)进程 dhcpd

Client:UDP/68

DHCP 服务器为子网上的所有机器分配 IP 地址,并在随时维护将 IP地址分配给哪台机器的日志文件。这使得它成为取证分析人员在攻击后追踪黑客的绝佳资源。出于这个原因,了解 DHCP 服务器的工作原理对一名黑客很有用。

## Linux下DHCP客户端调试工具 dhclient

┌──(root㉿kali)-[~]
└─# dhclient -h     
Usage: dhclient [-4|-6] [-SNTPRI1dvrxi] [-nw] [-p <port>] [-D LL|LLT]
                [--dad-wait-time <seconds>] [--prefix-len-hint <length>]
                [--decline-wait-time <seconds>]
                [--address-prefix-len <length>]
                [-s server-addr] [-cf config-file]
                [-df duid-file] [-lf lease-file]
                [-pf pid-file] [--no-pid] [-e VAR=val]
                [-sf script-file] [interface]*
       dhclient {--version|--help|-h}


┌──(root㉿kali)-[~] ## dhclient -r 释放IP
└─# dhclient eth0 -r 
Killed old client process


┌──(root㉿kali)-[~]
└─# dhclient eth0
                                                                                               
┌──(root㉿kali)-[~]
└─# ifconfig 
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.56.131  netmask 255.255.255.0  broadcast 192.168.56.255
        inet6 fe80::20c:29ff:fe76:ad97  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:76:ad:97  txqueuelen 1000  (Ethernet)
        RX packets 3121  bytes 216303 (211.2 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 279  bytes 45281 (44.2 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

配合嗅探工具进行分析

嗅探工具
分析

DCHP报文类型

报文类型

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.coloradmin.cn/o/916410.html

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈,一经查实,立即删除!

相关文章

DataFrame.plot函数详解(一)

DataFrame.plot函数详解&#xff08;一&#xff09; 1.函数定义 使用pandas.DataFrame的plot方法绘制图像会按照数据的每一列绘制一条曲线&#xff0c;默认按照列columns的名称在适当的位置展示图例 。 DataFrame.plot(xNone, yNone, kindline, axNone, subplotsFalse, shar…

什么是XGBoost

什么是XGBoost XGBoost是GBDT的优秀版本。XGBoost的整体结构和GBDT一致&#xff0c;都是在训练出一棵树的基础上&#xff0c;再训练下一棵树&#xff0c;预测它与真实分布间的差距&#xff0c;通过不断训练用来弥补差距的树&#xff0c;最终用树的组合实现对真实分布的模拟。 …

怎么把AVI视频转GIF动图?教你几种简单好用方法

将视频转成GIF动图有很多好处。首先&#xff0c;GIF动图可以自动循环播放&#xff0c;这使得它们更易于分享和观看。相比于视频&#xff0c;GIF动图的体积更小&#xff0c;加载速度更快&#xff0c;更利于在社交媒体等平台上分享。此外&#xff0c;GIF动图还可以作为一种有趣的…

【地理图库】世界小麦产量分布

声明&#xff1a;来源网络&#xff0c;仅供学习&#xff01;

Git企业开发控制理论和实操-从入门到深入(二)|Git的基本操作

前言 那么这里博主先安利一些干货满满的专栏了&#xff01; 首先是博主的高质量博客的汇总&#xff0c;这个专栏里面的博客&#xff0c;都是博主最最用心写的一部分&#xff0c;干货满满&#xff0c;希望对大家有帮助。 高质量博客汇总https://blog.csdn.net/yu_cblog/cate…

气传导蓝牙耳机哪款好?推荐几款很不错的气传导耳机

​气传导耳机在音质、舒适度和耐久性方面的表现相当出色&#xff0c;能够满足你的各种需求。然而面对市面上这么多气传导耳机&#xff0c;不知道该如何挑选时&#xff0c;也不用过于担心&#xff0c;我先来安利几款很不错的气传导耳机给大家来参考参考&#xff0c;看看有没有心…

Redis过期数据的删除策略

1 介绍 Redis 是一个kv型数据库&#xff0c;我们所有的数据都是存放在内存中的&#xff0c;但是内存是有大小限制的&#xff0c;不可能无限制的增量。 想要把不需要的数据清理掉&#xff0c;一种办法是直接删除&#xff0c;这个咱们前面章节有详细说过&#xff1b;另外一种就是…

冠达管理:水产、食品检测概念股强势拉升 日本将启动福岛核污染水排海

受日本将发动福岛核污染水排海事情刺激&#xff0c;水产股23日盘中大幅拉升&#xff0c;截至发稿&#xff0c;大湖股份涨停&#xff0c;国联水产涨超6%&#xff0c;獐子岛、百洋股份涨超3%。 核污染防治概念亦走强&#xff0c;截至发稿&#xff0c;中电环保涨超11%&#xff0c;…

删除链表的中间节点

题目&#xff1a; 示例&#xff1a; 思路&#xff1a; 这个题类似于寻找链表中间的数字&#xff0c;slow和fast都指向head&#xff0c;slow走一步&#xff0c;fast走两步&#xff0c;也许你会有疑问&#xff0c;节点数的奇偶不考虑吗&#xff1f;while执行条件写成fast&&…

重磅GPT-3.5 Turbo开放微调功能,专属GPT来了

8月22日&#xff0c;OpenAI官网发布最新公告&#xff1a;GPT-3.5 Turbo 的微调现已推出&#xff0c;GPT-4 的微调将于今年秋天推出。 此更新使开发人员能够自定义更适合其自身的模型&#xff0c;并大规模运行这些自定义模型。早期测试表明&#xff0c;GPT-3.5 Turbo 的微调版本…

flask获取请求对象的get和post参数

前言 get请求参数是在URL里面的&#xff0c;post请求参数是放在请求头里面的 get请求&#xff1a; index_page.route("/get") def get():var_a request.args.get("a", "jarvis")return "request:%s,params:%s,var_a:%s" %(request…

生态经济学领域里的R语言机器学(数据的收集与清洗、综合建模评价、数据的分析与可视化、数据的空间效应、因果推断等)

近年来&#xff0c;人工智能领域已经取得突破性进展&#xff0c;对经济社会各个领域都产生了重大影响&#xff0c;结合了统计学、数据科学和计算机科学的机器学习是人工智能的主流方向之一&#xff0c;目前也在飞快的融入计量经济学研究。表面上机器学习通常使用大数据&#xf…

前端界面设计

目录 1.设计一个兴趣展示网站1.效果2.代码展示 2.设计一个优美的登录网页1.效果2.代码展示 3. 自己写过的一些前端界面设计Demo整理。 1.设计一个兴趣展示网站 1.效果 2.代码展示 工程截图&#xff1a; index.html代码&#xff1a; <!DOCTYPE html> <html lang"…

基于MATLAB开发AUTOSAR软件应用层Code mapping专题-part 6 Data Transfers标签页介绍

这篇文章我们介绍下Data Transfers页的配置,这里边包含的内容是IRV,我之前的文章里有讲解过IRV就是 Inter-Runnable Variables,内部runnable的之间传递数据的变量,在讲解Data Store memory的文章里我们提到了,irv也可以使用Data Store memory的方式来实现,我们先看下IRV如何…

OceanBase:谁动了我得参数?

作者&#xff1a;郑增权 爱可生南区数据库工程师&#xff0c;爱可生 DBA 团队成员&#xff0c;负责数据库相关技术支持。爱好&#xff1a;桌球、羽毛球、咖啡、电影。 本文来源&#xff1a;原创投稿 爱可生开源社区出品&#xff0c;原创内容未经授权不得随意使用&#xff0c;转…

UE4/5Niagara粒子特效之Niagara_Particles官方案例:3.3->4.3

目录 3.3 Visibility Tag 左边的发射器&#xff1a; 发射器更新 粒子生成 粒子更新 右边的发射器 和左边发射器不同的地方 3.4 Texture Sampling 发射器更新 粒子生成 粒子更新 4.1Play Audio Per Particle 系统 第三个发射器 发射器更新 粒子生成 粒子更新 第二个…

C++ 好用的格式化库--fmt

背景 fmt 库是一个开源的 C 格式化库&#xff0c;它提供了一种简洁、安全和高效的方式来进行字符串格式化。该库的设计目标是提供与 Python 的字符串格式化语法类似的功能&#xff0c;同时保持 C 的类型安全性和性能。 下载与安装 官网下载 fmt 官网地址&#xff1a;https:…

OpenEuler 卸载mysql

查询系统是否安装了MySQL rpm -qa | grep -i mysql 关闭mysql 查看MySQL服务运行状态 ps -ef | grep mysql 或者 service mysql status 没有启动 查看rpm包安装的mysql rpm -qa | grep -i mysql 将这些都卸载了 rpm -e mysql5-server rpm -e mysql5-errmsg rpm -e my…

4G WiFi LoRa无线外夹式超声波管道流量计MQTT/http协议 json数据说明

ip&#xff1a;114.128.112.131 port&#xff1a;1883 uname&#xff1a;scwl_flowmeter pwd&#xff1a;b123 topic&#xff1a;iot/data/scwlflowmeter { “deviceId”:“设备序列号”, “flow”:“瞬时流量&#xff08;浮点数&#xff09;”, “heatFlow”:“瞬时热流量&am…

wangzherongyao 2023.08.23

1&#xff09;基本上我都是出制裁&#xff0c;一来够续航&#xff0c;二来死不死都是靠走位&#xff0c;制裁可限制回复英雄以及治疗英雄太多了&#xff1b; 2&#xff09;出个减速冰杖&#xff1b; 3&#xff09;对面威胁大&#xff0c;法师出时之预言&#xff0c;射手出个爆…