当前位置:网站首页>[try to hack] active detection and concealment technology
[try to hack] active detection and concealment technology
2022-07-03 16:56:00 【Happy star】
https://www.bilibili.com/video/BV1bt4y1874s?p=79
Blog home page : Happy star The blog home page of
Series column :Try to Hack
Welcome to focus on the likes collection ️ Leaving a message.
Starting time :2022 year 7 month 3 Japan
The author's level is very limited , If an error is found , Please let me know , thank !
Active reconnaissance is based on OSNT Open source passive reconnaissance , Get more information about the goal , In order to find more places where there may be safety problems . But active reconnaissance will have a lot of interaction with the target , It is more likely to be detected by the target .
technology
1、 Camouflage tool signature
2、 Hide traffic from legitimate traffic
3、 Modify source and type
Adjust source IP Stack and tool identification settings
Common is to change User-Agent
Here we use msf To demonstrate msfconsoleuse auxiliary/fuzzers/http/http_form_field 
There is one advancedshow advanced
Yes useragentset useragent BaiduSpider // Search engine crawlers are generally not filtered set rhost 192.168.0.1 Set to route , Send... To route http Data packets run
wireshark Grab the bag and have a look
Filtering rules http&&ip.dst==192.168.0.1&&ip.src==192.168.0.106
Modify packet parameters
Nmap Modify the original parameters nmap --spoof-mac 11:11:11:11:11:11 26 -sS -Pn -p80 192.168.0.1
It's really disguised mac Address , But why Destination yes 0.0.0.26, I don't know
Many other tools have similar functions to modify packet parameters
Such as masscan Of –adapter-mac、–adapter-ip
Use proxy anonymous Networks tor
When using Tor When the client , Your Internet Communication will be through Tor The network routing . Leaving Tor Before the network reaches its destination , The traffic will pass through several randomly selected relay stations ( Run by volunteers ). This will prevent Internet Service providers and people who monitor your local network view the websites you visit . It also prevents the website itself from knowing your actual location or IP Address - They will see the exit node IP Address and location . Even the relay station doesn't know who requested the traffic they passed . Tor All traffic in the network is encrypted .
apt install torservice tor start start-up torservice tor status see tor Whether to start 
Configure through installation proxychains4, Is to integrate any program and agent tools proxy Establishing a connection , The principle is similar to that of browser proxy .apt install proxychains4gedit /etc/proxychains4.conf

firefox www.whatismyip.com
I saw it , This is the truth that no proxy is used ip, It's really my public network ip
proxychains firefox www.whatismyip.com Modify agent
边栏推荐
- NSQ source code installation and operation process
- How to delete a specific line from a text file using the SED command?
- CC2530 common registers for port initialization
- Build your own website (23)
- [combinatorics] recursive equation (example 1 of recursive equation | list recursive equation)
- NLP four paradigms: paradigm 1: fully supervised learning in the era of non neural networks (Feature Engineering); Paradigm 2: fully supervised learning based on neural network (Architecture Engineeri
- Data driving of appium framework for mobile terminal automated testing
- utfwry. Dat PHP, about ThinkPHP's method of IP location using utfwry address Library
- QT serial port UI design and solution to display Chinese garbled code
- Mysql database -dql
猜你喜欢

(Supplement) double pointer topic
The way of wisdom (unity of knowledge and action)

Learn from me about the enterprise flutter project: simplified framework demo reference

Aike AI frontier promotion (7.3)

手把手带你入门 API 开发

(补)双指针专题

斑馬識別成狗,AI犯錯的原因被斯坦福找到了

Build your own website (23)

What material is 13crmo4-5 equivalent to in China? 13crmo4-5 chemical composition 13crmo4-5 mechanical properties

CC2530 common registers for crystal oscillator settings
随机推荐
PHP CI (CodeIgniter) log level setting
The word backspace key cannot delete the selected text, so you can only press Delete
mysql用户管理
NSQ source code installation and operation process
Top k questions of interview
How to judge the region of an IP through C?
CC2530 common registers for crystal oscillator settings
Thread pool executes scheduled tasks
深入理解 SQL 中的 Grouping Sets 语句
浅谈拉格朗日插值及其应用
消息队列消息丢失和消息重复发送的处理策略
On Lagrange interpolation and its application
[2. Basics of Delphi grammar] 2 Object Pascal data type
Hong Kong Polytechnic University | data efficient reinforcement learning and adaptive optimal perimeter control of network traffic dynamics
CC2530 common registers for port initialization
Network security web penetration technology
What is the difference between 14Cr1MoR container plate and 14Cr1MoR (H)? Chemical composition and performance analysis of 14Cr1MoR
Visual SLAM algorithms: a survey from 2010 to 2016
线程池执行定时任务
RF analyze demo build step by step