当前位置:网站首页>Find out the invisible assets -- use hosts collision to break through the boundary
Find out the invisible assets -- use hosts collision to break through the boundary
2022-06-24 16:08:00 【Bypass】
Sort out the assets from the perspective of the attacker , Use full port scanning + How subdomain names are collected , Identify all corporate asset exposures . But even so , It is often caused by incorrect configuration or untimely recycling , There are still some hidden assets .
01、 Business scenario
In general , Using a domain name to access a web site requires two steps , One is DNS Domain name resolution to server ip Address , The second is to bind the domain name to the server IP Address , Most of the time, we will forbid the passage IP Go directly to the website , Thus, malicious parsing and ip Scanning detection , Ensure that users can only access the business system through the correct domain name .
Take an enterprise deployment architecture as an example , Use Lvs+Nginx Build high availability web framework . In this mode , Just bind a public network ip, All service ports of the Intranet can pass through nginx The unique port of the agent is mapped to the external network environment .
Based on this enterprise deployment architecture , There are two typical vulnerability scenarios :
(1) Test environment or pre production environment , Clear the domain name resolution of the public network , however Nginx The configuration was not cleared in time , Bind correct host To access .
(2) For security reasons , Extranet Nginx And the Internet Nginx It is necessary to make a strict distinction , But there is no distinction between internal and external networks . Use the same Nginx Complete the configuration of Intranet and Internet services , Resolve to the public network through the public network domain name , Intranet DNS Resolve to intranet . This is the time , Bind correct host You can access the intranet system .
02、Hosts Collision Technology
Based on the above scenario , The domain name record cannot be found in the domain name resolution record , adopt IP Port can not access the website , Only to check nginx Configuration situation , Will discover the security problems that may be caused by improper configuration .
that , From the attacker's point of view , How to find these invisible assets ?
Here is a technology to share , It's called Hosts Collision Technology , By combining the domain name with IP Conduct binding collision , Once it matches the domain name binding configuration on the back-end proxy server , You can access the corresponding business system , To discover hidden assets .
Of course , In addition to being able to find hidden assets , We can also use this method to find the real business system IP, To bypass the cloud WAF Safety protection of .
03、 Automated scanning tools
hostscan: automation Host Collision tool
https://github.com/cckuailong/hostscanHosts_scan: be used for IP And domain name collision match access python Script
https://github.com/fofapro/Hosts_scan边栏推荐
- Why is it easy for enterprises to fail in implementing WMS warehouse management system
- MySQL Innodb和Myisam
- 中国产品经理的没落:从怀恋乔布斯开始谈起
- Three solutions for Jenkins image failing to update plug-in Center
- How does the effective date of SAP PP ECM affect the work order?
- Global and Chinese markets of stainless steel barbecue ovens 2022-2028: Research Report on technology, participants, trends, market size and share
- Mongodb introductory practical tutorial: learning summary directory
- Global and Chinese market of insect proof clothing 2022-2028: Research Report on technology, participants, trends, market size and share
- ZOJ——4104 Sequence in the Pocket(思维问题)
- The penetration of 5g users of operators is far slower than that of 4G. The popularity of 5g still depends on China Radio and television
猜你喜欢

B. Ternary Sequence(思维+贪心)Codeforces Round #665 (Div. 2)

Understanding openstack network

我与“Apifox”的网络情缘

ZOJ——4104 Sequence in the Pocket(思维问题)

Why is it easy for enterprises to fail in implementing WMS warehouse management system

Recommend several super practical data analysis tools

【附下载】汉化版Awvs安装与简单使用
![[cloud native | kubernetes chapter] Introduction to kubernetes Foundation (III)](/img/21/503ed54a2fa14fbfd67f75a55ec286.png)
[cloud native | kubernetes chapter] Introduction to kubernetes Foundation (III)

CAP:多重注意力机制,有趣的细粒度分类方案 | AAAI 2021

几种常见的DoS攻击
随机推荐
2021-04-18: given a two-dimensional array matrix, the value in it is either 1 or 0,
2021-04-22: given many line segments, each line segment has two numbers [start, end],
MySQL日期时间戳转换
April 23, 2021: there are n cities in the TSP problem, and there is a distance between any two cities
Cap: multiple attention mechanism, interesting fine-grained classification scheme | AAAI 2021
C. Three displays codeforces round 485 (Div. 2)
2021-04-24: handwriting Code: topology sorting.
Several common DoS attacks
Pytorch 转置卷积
MySQL Advanced Series: Locks - Locks in InnoDB
Here comes Wi Fi 7. How strong is it?
nifi从入门到实战(保姆级教程)——环境篇
clang: warning: argument unused during compilation: ‘-no-pie‘ [-Wunused-command-line-argument]
B. Ternary Sequence(思维+贪心)Codeforces Round #665 (Div. 2)
Istio FAQ: failed to resolve after enabling smart DNS
What is a framework?
【应用推荐】最近大火的Apifox & Apipost 上手体验与选型建议
2021-04-25: given an array arr and a positive number m, the
构建Go命令行程序工具链
The catch-up of domestic chips has scared Qualcomm, the leader of mobile phone chips in the United States, and made moves to cope with the competition