SlideShare a Scribd company logo
ROUTER/GATEWAY tplinkwifi.net
192.168.0.1 username : admin
password : admin
CLIENT
192.168.0.4
SERVER
192.168.0.3
ACCESS POINT tplinkwifi.net
192.168.0.2 username : admin
password : admin
ROUTER/GATEWAY tplinkwifi.net
192.168.0.1 username : admin
password : admin
CLIENT
192.168.0.4
SERVER
192.168.0.3
ACCESS POINT tplinkwifi.net
192.168.0.2 username : admin
password : admin
ROUTER/GATEWAY tplinkwifi.net
192.168.0.1 username : admin
password : admin
CLIENT
192.168.0.4
SERVER
192.168.0.3
ACCESS POINT tplinkwifi.net
192.168.0.2 username : admin
password : admin
ROUTER/GATEWAY tplinkwifi.net
192.168.0.1 username : admin
password : admin
CLIENT
192.168.0.4
SERVER
192.168.0.3
ACCESS POINT tplinkwifi.net
192.168.0.2 username : admin
password : admin
ROUTER/GATEWAY tplinkwifi.net
192.168.0.1 username : admin
password : admin
CLIENT
192.168.0.4
SERVER
192.168.0.3
ACCESS POINT tplinkwifi.net
192.168.0.2 username : admin
password : admin

More Related Content

Similar to Ip

CIsco ACL- Network and host security
CIsco ACL- Network and host securityCIsco ACL- Network and host security
CIsco ACL- Network and host security
Shiv Koppad
 
Complete squid & firewall configuration. plus easy mac binding
Complete squid & firewall configuration. plus easy mac bindingComplete squid & firewall configuration. plus easy mac binding
Complete squid & firewall configuration. plus easy mac binding
Chanaka Lasantha
 
List of default router admin passwords and ip addresses
List of default router admin passwords and ip addressesList of default router admin passwords and ip addresses
List of default router admin passwords and ip addresses
abnmi
 

Similar to Ip (20)

Xb30330.xb30350 management guide
Xb30330.xb30350 management guideXb30330.xb30350 management guide
Xb30330.xb30350 management guide
 
CIsco ACL- Network and host security
CIsco ACL- Network and host securityCIsco ACL- Network and host security
CIsco ACL- Network and host security
 
Manual linksys router_rv082
Manual linksys router_rv082Manual linksys router_rv082
Manual linksys router_rv082
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014
 
Cmd
CmdCmd
Cmd
 
Cmd
CmdCmd
Cmd
 
Complete squid & firewall configuration. plus easy mac binding
Complete squid & firewall configuration. plus easy mac bindingComplete squid & firewall configuration. plus easy mac binding
Complete squid & firewall configuration. plus easy mac binding
 
Huawei AR 150 Series.pptx
Huawei AR 150 Series.pptxHuawei AR 150 Series.pptx
Huawei AR 150 Series.pptx
 
Send me your echolocation
Send me your echolocationSend me your echolocation
Send me your echolocation
 
List of default router admin passwords and ip addresses
List of default router admin passwords and ip addressesList of default router admin passwords and ip addresses
List of default router admin passwords and ip addresses
 
Instant ACLs with Zend Framework 2
Instant ACLs with Zend Framework 2Instant ACLs with Zend Framework 2
Instant ACLs with Zend Framework 2
 
Chap 19 web
Chap 19 webChap 19 web
Chap 19 web
 
AtlasCamp 2015 Docker continuous integration training
AtlasCamp 2015 Docker continuous integration trainingAtlasCamp 2015 Docker continuous integration training
AtlasCamp 2015 Docker continuous integration training
 
Watching And Manipulating Your Network Traffic
Watching And Manipulating Your Network TrafficWatching And Manipulating Your Network Traffic
Watching And Manipulating Your Network Traffic
 
DeveloperWeek 2015: A Practical Introduction to Docker
DeveloperWeek 2015: A Practical Introduction to DockerDeveloperWeek 2015: A Practical Introduction to Docker
DeveloperWeek 2015: A Practical Introduction to Docker
 
Examen main remote
Examen main remoteExamen main remote
Examen main remote
 
Simple Misconfiguration Equals Network Vulnerability!
Simple Misconfiguration Equals Network Vulnerability!Simple Misconfiguration Equals Network Vulnerability!
Simple Misconfiguration Equals Network Vulnerability!
 
Huawei S5700 Basic Configuration Command
Huawei S5700 Basic Configuration CommandHuawei S5700 Basic Configuration Command
Huawei S5700 Basic Configuration Command
 
Nagios Conference 2013 - Leland Lammert - Nagios in a Multi-Platform Enviornment
Nagios Conference 2013 - Leland Lammert - Nagios in a Multi-Platform EnviornmentNagios Conference 2013 - Leland Lammert - Nagios in a Multi-Platform Enviornment
Nagios Conference 2013 - Leland Lammert - Nagios in a Multi-Platform Enviornment
 

Recently uploaded

Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 

Recently uploaded (16)

Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Topology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdfTopology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdf
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 

Ip

  • 1. ROUTER/GATEWAY tplinkwifi.net 192.168.0.1 username : admin password : admin CLIENT 192.168.0.4 SERVER 192.168.0.3 ACCESS POINT tplinkwifi.net 192.168.0.2 username : admin password : admin ROUTER/GATEWAY tplinkwifi.net 192.168.0.1 username : admin password : admin CLIENT 192.168.0.4 SERVER 192.168.0.3 ACCESS POINT tplinkwifi.net 192.168.0.2 username : admin password : admin ROUTER/GATEWAY tplinkwifi.net 192.168.0.1 username : admin password : admin CLIENT 192.168.0.4 SERVER 192.168.0.3 ACCESS POINT tplinkwifi.net 192.168.0.2 username : admin password : admin ROUTER/GATEWAY tplinkwifi.net 192.168.0.1 username : admin password : admin CLIENT 192.168.0.4 SERVER 192.168.0.3 ACCESS POINT tplinkwifi.net 192.168.0.2 username : admin password : admin ROUTER/GATEWAY tplinkwifi.net 192.168.0.1 username : admin password : admin CLIENT 192.168.0.4 SERVER 192.168.0.3 ACCESS POINT tplinkwifi.net 192.168.0.2 username : admin password : admin