当前位置:网站首页>[try to hack] active detection and concealment technology
[try to hack] active detection and concealment technology
2022-07-03 16:56:00 【Happy star】
https://www.bilibili.com/video/BV1bt4y1874s?p=79
Blog home page : Happy star The blog home page of
Series column :Try to Hack
Welcome to focus on the likes collection ️ Leaving a message.
Starting time :2022 year 7 month 3 Japan
The author's level is very limited , If an error is found , Please let me know , thank !
Active reconnaissance is based on OSNT Open source passive reconnaissance , Get more information about the goal , In order to find more places where there may be safety problems . But active reconnaissance will have a lot of interaction with the target , It is more likely to be detected by the target .
technology
1、 Camouflage tool signature
2、 Hide traffic from legitimate traffic
3、 Modify source and type
Adjust source IP Stack and tool identification settings
Common is to change User-Agent
Here we use msf To demonstrate msfconsole
use auxiliary/fuzzers/http/http_form_field
There is one advancedshow advanced
Yes useragentset useragent BaiduSpider
// Search engine crawlers are generally not filtered set rhost 192.168.0.1
Set to route , Send... To route http Data packets run
wireshark Grab the bag and have a look
Filtering rules http&&ip.dst==192.168.0.1&&ip.src==192.168.0.106
Modify packet parameters
Nmap Modify the original parameters nmap --spoof-mac 11:11:11:11:11:11 26 -sS -Pn -p80 192.168.0.1
It's really disguised mac Address , But why Destination yes 0.0.0.26, I don't know
Many other tools have similar functions to modify packet parameters
Such as masscan Of –adapter-mac、–adapter-ip
Use proxy anonymous Networks tor
When using Tor When the client , Your Internet Communication will be through Tor The network routing . Leaving Tor Before the network reaches its destination , The traffic will pass through several randomly selected relay stations ( Run by volunteers ). This will prevent Internet Service providers and people who monitor your local network view the websites you visit . It also prevents the website itself from knowing your actual location or IP Address - They will see the exit node IP Address and location . Even the relay station doesn't know who requested the traffic they passed . Tor All traffic in the network is encrypted .
apt install tor
service tor start
start-up torservice tor status
see tor Whether to start
Configure through installation proxychains4, Is to integrate any program and agent tools proxy Establishing a connection , The principle is similar to that of browser proxy .apt install proxychains4
gedit /etc/proxychains4.conf
firefox www.whatismyip.com
I saw it , This is the truth that no proxy is used ip, It's really my public network ip
proxychains firefox www.whatismyip.com
Modify agent
边栏推荐
- 【剑指 Offer 】64. 求1+2+…+n
- Top k questions of interview
- What is the maximum number of concurrent TCP connections for a server? 65535?
- How to judge the region of an IP through C?
- Pytorch 1.12 was released, officially supporting Apple M1 chip GPU acceleration and repairing many bugs
- 远程办公之如何推进跨部门项目协作 | 社区征文
- How to delete a specific line from a text file using the SED command?
- 【Try to Hack】主动侦查隐藏技术
- Visual SLAM algorithms: a survey from 2010 to 2016
- 【剑指 Offer 】57 - II. 和为s的连续正数序列
猜你喜欢
Add color to the interface automation test framework and realize the enterprise wechat test report
CC2530 common registers for port initialization
消息队列消息丢失和消息重复发送的处理策略
斑馬識別成狗,AI犯錯的原因被斯坦福找到了
Netease UI automation test exploration: airtest+poco
arduino-esp32:LVGL项目(一)整体框架
一台服务器最大并发 tcp 连接数多少?65535?
QT serial port UI design and solution to display Chinese garbled code
utfwry. Dat PHP, about ThinkPHP's method of IP location using utfwry address Library
Aike AI frontier promotion (7.3)
随机推荐
PHP production website active push (website)
Aike AI frontier promotion (7.3)
[combinatorics] recursive equation (constant coefficient linear homogeneous recursive equation | constant coefficient, linear, homogeneous concept description | constant coefficient linear homogeneous
Analysis of variance summary
C语言字符串反转
建立自己的网站(23)
How to allow remote connection to MySQL server on Linux system?
CC2530 common registers for serial communication
PHP CI (CodeIgniter) log level setting
utfwry. Dat PHP, about ThinkPHP's method of IP location using utfwry address Library
ucore概述
Deep understanding of grouping sets statements in SQL
Recommendation of good books on learning QT programming
UCORE overview
29:第三章:开发通行证服务:12:开发【获得用户账户信息,接口】;(使用VO类包装查到的数据,以符合接口对返回数据的要求)(在多处都会用到的逻辑,在Controller中可以把其抽成一个共用方法)
Execute script unrecognized \r
Mysql database DDL and DML
[combinatorics] polynomial theorem (polynomial coefficients | full arrangement of multiple sets | number of schemes corresponding to the ball sub model | polynomial coefficient correlation identity)
How to delete a specific line from a text file using the SED command?
QT serial port UI design and solution to display Chinese garbled code