当前位置:网站首页>(7) Web security | penetration testing | how does network security determine whether CND exists, and how to bypass CND to find the real IP
(7) Web security | penetration testing | how does network security determine whether CND exists, and how to bypass CND to find the real IP
2022-07-02 13:04:00 【Black zone (rise)】
CDN The full name is Content Delivery Network, The content distribution network .CDN It is an intelligent virtual network based on the existing network , Rely on edge servers deployed everywhere , Load balancing through the central platform 、 content distribution 、 Scheduling and other functional modules , Let users get the content they need nearby , Reduce network congestion , Improve user access response speed and hit rate .
The above comes from :CDN_ Baidu Encyclopedia (baidu.com)
Personally feel cdn In short : Through the nearby temporary storage of information CDN Node sends information to users
cdn Will hide the server's real ip Address , Unable to penetrate the operating system of the target website ,cdn The site is virtual , Have the same website architecture , And cdn The server can interact with the site server , therefore sql The mining of injection and other vulnerabilities is not greatly affected .
Through the tool ping, Look at the display ip Is the address unique , If it's not the only one , Then these ip The address is CDN The address of
Using tools :
IP/IPv6 Inquire about , Server address query - Webmaster Tools (chinaz.com)
( Take Baidu for example )

You can see it in many places ip Address , It can be determined that this is its CDN node
There is also a tool to check authenticity ip:

But you can't determine this with tools ip Is it true
If you are not at ease, you can also use manual search , Combined with practice , Analyze the location of the company and ip Continue to analyze the location
When some websites register , Will pass email authentication , Or send an email message , At this time, analyze the... In the email data ip Address , The first ip It was sent by Tencent as a transit
Subdomain query :
Because some main stations do CDN Service and the sub station didn't do CDN service
Subdomain excavator :
link :https://pan.baidu.com/s/1otbSIrRVIYotbB3VVeCSlw
Extraction code :hj12
Mail service query :
Most mailboxes are accessed by insiders , And the number of visits is generally not very large , So I don't usually do CDN.
Foreign address request :
CDN Generally, it is arranged nearby according to the user group
example : The users of a website are all in China , For economic reasons , Then the website administrator will not be deployed abroad CDN node , Visiting abroad may directly access the truth IP. Choose more unpopular countries to visit , If IP All the same , It's probably true ip.
( This will use related tools )
Legacy documents :
example :php Of phpinfo.php, You may see the truth IP
Scan the whole network :
May get all IP, And then analyze it
Dark engine search : May get google Specific search for
fofa、shodan、 To listen attentively 、zoomeye、censys
( We should conduct an artificial analysis by ourselves )
Specific documents dns Historical record :
The website may not have CDN, So through the search of the new website CDN Historical record , You may find what was resolved at that time IP, This IP It may be the reality of the current website IP.
Look at :
One CDN Node traffic, such as 1G, So many people visit , Run out of wandering , After that, it may be true IP 了 .( Also known as traffic exhaustion attack ).
real IP After obtaining the address, the binding points to the address change local HOSTS Parse point to file
边栏推荐
- Oracle从入门到精通(第4版)
- Heap acwing 839 Simulated reactor
- Explain in detail the process of realizing Chinese text classification by CNN
- 8 examples of using date commands
- VIM super practical guide collection of this one is enough
- Rust search server, rust quick service finding tutorial
- 阿里初面被两道编程题给干掉,再次内推终上岸(已拿电子offer)
- std::vector批量导入快速去重方法
- JS6day(DOM结点的查找、增加、删除。实例化时间,时间戳,时间戳的案例,重绘和回流)
- JS10day(api 阶段性完结,正则表达式简介,自定义属性,过滤敏感词案例,注册模块验证案例)
猜你喜欢
![[opencv learning] [moving object detection]](/img/2e/9b437b7fe22f1d57334529eda68e37.jpg)
[opencv learning] [moving object detection]
![[opencv learning] [template matching]](/img/4c/7214329a34974c59b4931c08046ee8.jpg)
[opencv learning] [template matching]

js1day(输入输出语法,数据类型,数据类型转换,var和let区别)

Hash table acwing 841 String hash

Domestic free data warehouse ETL dispatching automation operation and maintenance expert taskctl

阿里发布的Redis开发文档,涵盖了所有的redis操作

Linear DP acwing 899 Edit distance
![[opencv learning] [contour detection]](/img/96/aaec61f137e4526c2c329e6fcfa1a2.jpg)
[opencv learning] [contour detection]

JSON serialization and parsing

Linear DP acwing 897 Longest common subsequence
随机推荐
Get started REPORT | today, talk about the microservice architecture currently used by Tencent
线性DP AcWing 895. 最长上升子序列
自主可控三维云CAD:CrownCAD赋能企业创新设计
Five best software architecture patterns that architects must understand
js1day(輸入輸出語法,數據類型,數據類型轉換,var和let區別)
JDBC 预防sql注入问题与解决方法[PreparedStatement]
moon
Js7day (event object, event flow, event capture and bubble, prevent event flow, event delegation, student information table cases)
Tencent three sides: in the process of writing files, the process crashes, and will the file data be lost?
Js10day (API phased completion, regular expression introduction, custom attributes, filtering sensitive word cases, registration module verification cases)
Win10 system OmniPeek wireless packet capturing network card driver failed to install due to digital signature problem solution
Browser storage scheme
js3day(数组操作,js冒泡排序,函数,调试窗口,作用域及作用域链,匿名函数,对象,Math对象)
[opencv learning] [image histogram and equalization]
NTMFS4C05NT1G N-CH 30V 11.9A MOS管,PDF
[opencv learning] [moving object detection]
Analog to digital converter (ADC) ade7913ariz is specially designed for three-phase energy metering applications
Js8day (rolling event (scroll family), offset family, client family, carousel map case (to be done))
堆 AcWing 838. 堆排序
[opencv learning] [Canny edge detection]