当前位置:网站首页>[try to hack] active detection and concealment technology
[try to hack] active detection and concealment technology
2022-07-03 16:56:00 【Happy star】
https://www.bilibili.com/video/BV1bt4y1874s?p=79
Blog home page : Happy star The blog home page of
Series column :Try to Hack
Welcome to focus on the likes collection ️ Leaving a message.
Starting time :2022 year 7 month 3 Japan
The author's level is very limited , If an error is found , Please let me know , thank !
Active reconnaissance is based on OSNT Open source passive reconnaissance , Get more information about the goal , In order to find more places where there may be safety problems . But active reconnaissance will have a lot of interaction with the target , It is more likely to be detected by the target .
technology
1、 Camouflage tool signature
2、 Hide traffic from legitimate traffic
3、 Modify source and type
Adjust source IP Stack and tool identification settings
Common is to change User-Agent
Here we use msf To demonstrate msfconsoleuse auxiliary/fuzzers/http/http_form_field 
There is one advancedshow advanced
Yes useragentset useragent BaiduSpider // Search engine crawlers are generally not filtered set rhost 192.168.0.1 Set to route , Send... To route http Data packets run
wireshark Grab the bag and have a look
Filtering rules http&&ip.dst==192.168.0.1&&ip.src==192.168.0.106
Modify packet parameters
Nmap Modify the original parameters nmap --spoof-mac 11:11:11:11:11:11 26 -sS -Pn -p80 192.168.0.1
It's really disguised mac Address , But why Destination yes 0.0.0.26, I don't know
Many other tools have similar functions to modify packet parameters
Such as masscan Of –adapter-mac、–adapter-ip
Use proxy anonymous Networks tor
When using Tor When the client , Your Internet Communication will be through Tor The network routing . Leaving Tor Before the network reaches its destination , The traffic will pass through several randomly selected relay stations ( Run by volunteers ). This will prevent Internet Service providers and people who monitor your local network view the websites you visit . It also prevents the website itself from knowing your actual location or IP Address - They will see the exit node IP Address and location . Even the relay station doesn't know who requested the traffic they passed . Tor All traffic in the network is encrypted .
apt install torservice tor start start-up torservice tor status see tor Whether to start 
Configure through installation proxychains4, Is to integrate any program and agent tools proxy Establishing a connection , The principle is similar to that of browser proxy .apt install proxychains4gedit /etc/proxychains4.conf

firefox www.whatismyip.com
I saw it , This is the truth that no proxy is used ip, It's really my public network ip
proxychains firefox www.whatismyip.com Modify agent
边栏推荐
- 【剑指 Offer】58 - I. 翻转单词顺序
- 远程办公之如何推进跨部门项目协作 | 社区征文
- Zebras are recognized as dogs, and Stanford found the reason why AI made mistakes
- 什么是质押池,如何进行质押呢?
- Register in PHP_ Globals parameter settings
- Aike AI frontier promotion (7.3)
- RF Analyze Demo搭建 Step by Step
- Execute script unrecognized \r
- How to delete a specific line from a text file using the SED command?
- Kotlin learning quick start (7) -- wonderful use of expansion
猜你喜欢

Static program analysis (I) -- Outline mind map and content introduction

CC2530 common registers for crystal oscillator settings

NLP四范式:范式一:非神经网络时代的完全监督学习(特征工程);范式二:基于神经网络的完全监督学习(架构工程);范式三:预训练,精调范式(目标工程);范式四:预训练,提示,预测范式(Prompt工程)

word 退格键删除不了选中文本,只能按delete

聊聊接口优化的几个方法

Simulink oscilloscope data is imported into Matlab and drawn

utfwry. Dat PHP, about ThinkPHP's method of IP location using utfwry address Library

斑马识别成狗,AI犯错的原因被斯坦福找到了

Data driving of appium framework for mobile terminal automated testing

线程池:业务代码最常用也最容易犯错的组件
随机推荐
一台服务器最大并发 tcp 连接数多少?65535?
What is the material of 13mnnimor? 13mnnimor steel plate for medium and low temperature pressure vessels
MySQL single table field duplicate data takes the latest SQL statement
2022 love analysis · panoramic report of digital manufacturers of state-owned enterprises
Web crawler knowledge day03
LeetCode 1656. Design ordered flow
Idea configuration plug-in
CC2530 common registers for timer 1
CC2530 common registers for crystal oscillator settings
CC2530 common registers for port initialization
QT serial port UI design and solution to display Chinese garbled code
[combinatorics] polynomial theorem (polynomial coefficients | full arrangement of multiple sets | number of schemes corresponding to the ball sub model | polynomial coefficient correlation identity)
Shentong express expects an annual loss of nearly 1billion
CC2530 common registers for watchdog
RF analyze demo build step by step
深入理解 SQL 中的 Grouping Sets 语句
[mathematical logic] equivalent calculus and reasoning calculus of propositional logic (propositional logic | equivalent calculus | principal conjunctive (disjunctive) paradigm | reasoning calculus)**
IDEA-配置插件
Fast Ethernet and Gigabit Ethernet: what's the difference?
[combinatorial mathematics] recursive equation (example of recursive equation 2 Hanoi Tower | example of recursive equation 3 insertion sequencing)