当前位置:网站首页>(7) Web security | penetration testing | how does network security determine whether CND exists, and how to bypass CND to find the real IP
(7) Web security | penetration testing | how does network security determine whether CND exists, and how to bypass CND to find the real IP
2022-07-02 13:04:00 【Black zone (rise)】
CDN The full name is Content Delivery Network, The content distribution network .CDN It is an intelligent virtual network based on the existing network , Rely on edge servers deployed everywhere , Load balancing through the central platform 、 content distribution 、 Scheduling and other functional modules , Let users get the content they need nearby , Reduce network congestion , Improve user access response speed and hit rate .
The above comes from :CDN_ Baidu Encyclopedia (baidu.com)
Personally feel cdn In short : Through the nearby temporary storage of information CDN Node sends information to users
cdn Will hide the server's real ip Address , Unable to penetrate the operating system of the target website ,cdn The site is virtual , Have the same website architecture , And cdn The server can interact with the site server , therefore sql The mining of injection and other vulnerabilities is not greatly affected .
Through the tool ping, Look at the display ip Is the address unique , If it's not the only one , Then these ip The address is CDN The address of
Using tools :
IP/IPv6 Inquire about , Server address query - Webmaster Tools (chinaz.com)
( Take Baidu for example )
You can see it in many places ip Address , It can be determined that this is its CDN node
There is also a tool to check authenticity ip:
But you can't determine this with tools ip Is it true
If you are not at ease, you can also use manual search , Combined with practice , Analyze the location of the company and ip Continue to analyze the location
When some websites register , Will pass email authentication , Or send an email message , At this time, analyze the... In the email data ip Address , The first ip It was sent by Tencent as a transit
Subdomain query :
Because some main stations do CDN Service and the sub station didn't do CDN service
Subdomain excavator :
link :https://pan.baidu.com/s/1otbSIrRVIYotbB3VVeCSlw
Extraction code :hj12
Mail service query :
Most mailboxes are accessed by insiders , And the number of visits is generally not very large , So I don't usually do CDN.
Foreign address request :
CDN Generally, it is arranged nearby according to the user group
example : The users of a website are all in China , For economic reasons , Then the website administrator will not be deployed abroad CDN node , Visiting abroad may directly access the truth IP. Choose more unpopular countries to visit , If IP All the same , It's probably true ip.
( This will use related tools )
Legacy documents :
example :php Of phpinfo.php, You may see the truth IP
Scan the whole network :
May get all IP, And then analyze it
Dark engine search : May get google Specific search for
fofa、shodan、 To listen attentively 、zoomeye、censys
( We should conduct an artificial analysis by ourselves )
Specific documents dns Historical record :
The website may not have CDN, So through the search of the new website CDN Historical record , You may find what was resolved at that time IP, This IP It may be the reality of the current website IP.
Look at :
One CDN Node traffic, such as 1G, So many people visit , Run out of wandering , After that, it may be true IP 了 .( Also known as traffic exhaustion attack ).
real IP After obtaining the address, the binding points to the address change local HOSTS Parse point to file
边栏推荐
- 百款拿来就能用的网页特效,不来看看吗?
- Mui WebView down refresh pull-up load implementation
- Efficiency comparison between ArrayList and LinkedList
- Analog to digital converter (ADC) ade7913ariz is specially designed for three-phase energy metering applications
- js2day(又是i++和++i,if语句,三元运算符,switch、while语句,for循环语句)
- Ali was killed by two programming problems at the beginning, pushed inward again, and finally landed (he has taken an electronic offer)
- Js1day (input / output syntax, data type, data type conversion, VaR and let differences)
- Fully autonomous and controllable 3D cloud CAD: crowncad's convenient command search can quickly locate the specific location of the required command.
- Interval DP acwing 282 Stone merging
- How can attribute mapping of entity classes be without it?
猜你喜欢
ArrayList与LinkedList效率的对比
[opencv learning] [moving object detection]
3 a VTT terminal regulator ncp51200mntxg data
Counting class DP acwing 900 Integer partition
js2day(又是i++和++i,if语句,三元运算符,switch、while语句,for循环语句)
通过反射执行任意类的任意方法
Jerry's watch time synchronization [chapter]
阿里发布的Redis开发文档,涵盖了所有的redis操作
Counter attack of flour dregs: MySQL 66 questions, 20000 words + 50 pictures in detail! A little six
Js10day (API phased completion, regular expression introduction, custom attributes, filtering sensitive word cases, registration module verification cases)
随机推荐
[opencv learning] [image pyramid]
JS7day(事件对象,事件流,事件捕获和冒泡,阻止事件流动,事件委托,学生信息表案例)
C#运算符
spfa AcWing 851. spfa求最短路
Use MySQL events to regularly perform post seven world line tasks
Ruby: how to copy variables without pointing to the same object- Ruby: how can I copy a variable without pointing to the same object?
腾讯三面:进程写文件过程中,进程崩溃了,文件数据会丢吗?
About wechat enterprise payment to change x509certificate2 read certificate information, publish to the server can not access the solution
3 a VTT terminal regulator ncp51200mntxg data
基于STM32的OLED 屏幕驱动
一些突然迸发出的程序思想(模块化处理)
Redis transaction mechanism implementation process and principle, and use transaction mechanism to prevent inventory oversold
Docsify deploy IIS
Std:: vector batch import fast de duplication method
The redis development document released by Alibaba covers all redis operations
JS iterator generator asynchronous code processing promise+ generator - > await/async
Ali on three sides, it's really difficult to successfully get the offer rated P7
正确遍历EntryList方法
PXE installation UOS prompt NFS over TCP not available from 10 x.x.x
spfa AcWing 851. SPFA finding the shortest path