当前位置:网站首页>[try to hack] active detection and concealment technology
[try to hack] active detection and concealment technology
2022-07-03 16:56:00 【Happy star】
https://www.bilibili.com/video/BV1bt4y1874s?p=79
Blog home page : Happy star The blog home page of
Series column :Try to Hack
Welcome to focus on the likes collection ️ Leaving a message.
Starting time :2022 year 7 month 3 Japan
The author's level is very limited , If an error is found , Please let me know , thank !
Active reconnaissance is based on OSNT Open source passive reconnaissance , Get more information about the goal , In order to find more places where there may be safety problems . But active reconnaissance will have a lot of interaction with the target , It is more likely to be detected by the target .
technology
1、 Camouflage tool signature
2、 Hide traffic from legitimate traffic
3、 Modify source and type
Adjust source IP Stack and tool identification settings
Common is to change User-Agent
Here we use msf To demonstrate msfconsole
use auxiliary/fuzzers/http/http_form_field
There is one advancedshow advanced
Yes useragentset useragent BaiduSpider
// Search engine crawlers are generally not filtered set rhost 192.168.0.1
Set to route , Send... To route http Data packets run
wireshark Grab the bag and have a look
Filtering rules http&&ip.dst==192.168.0.1&&ip.src==192.168.0.106
Modify packet parameters
Nmap Modify the original parameters nmap --spoof-mac 11:11:11:11:11:11 26 -sS -Pn -p80 192.168.0.1
It's really disguised mac Address , But why Destination yes 0.0.0.26, I don't know
Many other tools have similar functions to modify packet parameters
Such as masscan Of –adapter-mac、–adapter-ip
Use proxy anonymous Networks tor
When using Tor When the client , Your Internet Communication will be through Tor The network routing . Leaving Tor Before the network reaches its destination , The traffic will pass through several randomly selected relay stations ( Run by volunteers ). This will prevent Internet Service providers and people who monitor your local network view the websites you visit . It also prevents the website itself from knowing your actual location or IP Address - They will see the exit node IP Address and location . Even the relay station doesn't know who requested the traffic they passed . Tor All traffic in the network is encrypted .
apt install tor
service tor start
start-up torservice tor status
see tor Whether to start
Configure through installation proxychains4, Is to integrate any program and agent tools proxy Establishing a connection , The principle is similar to that of browser proxy .apt install proxychains4
gedit /etc/proxychains4.conf
firefox www.whatismyip.com
I saw it , This is the truth that no proxy is used ip, It's really my public network ip
proxychains firefox www.whatismyip.com
Modify agent
边栏推荐
- Bcvp developer community 2022 exclusive peripheral first bullet
- [combinatorics] polynomial theorem (polynomial theorem | polynomial theorem proof | polynomial theorem inference 1 item number is the number of non negative integer solutions | polynomial theorem infe
- How to set up SVN server on this machine
- What material is sa537cl1? Sa537cl1 corresponds to the national standard material
- [2. Basics of Delphi grammar] 2 Object Pascal data type
- Hands on in-depth learning notes (XIV) 3.7 Simple implementation of softmax regression
- CC2530 common registers for timer 1
- 静态程序分析(一)—— 大纲思维导图与内容介绍
- To resist 7-Zip, list "three sins"? Netizen: "is the third key?"
- NLP四范式:范式一:非神经网络时代的完全监督学习(特征工程);范式二:基于神经网络的完全监督学习(架构工程);范式三:预训练,精调范式(目标工程);范式四:预训练,提示,预测范式(Prompt工程)
猜你喜欢
NLP四范式:范式一:非神经网络时代的完全监督学习(特征工程);范式二:基于神经网络的完全监督学习(架构工程);范式三:预训练,精调范式(目标工程);范式四:预训练,提示,预测范式(Prompt工程)
(Supplement) double pointer topic
What material is 12cr1movr? Chemical property analysis of pressure vessel steel plate 12cr1movr
Add color to the interface automation test framework and realize the enterprise wechat test report
What kind of material is 14Cr1MoR? Analysis of chemical composition and mechanical properties of 14Cr1MoR
New features of C 10
IDEA-配置插件
Fast Ethernet and Gigabit Ethernet: what's the difference?
Data driving of appium framework for mobile terminal automated testing
What is the maximum number of concurrent TCP connections for a server? 65535?
随机推荐
Assembly instance analysis -- screen display in real mode
Add color to the interface automation test framework and realize the enterprise wechat test report
Processing strategy of message queue message loss and repeated message sending
mysql用户管理
QT serial port UI design and solution to display Chinese garbled code
ucore概述
Fast Ethernet and Gigabit Ethernet: what's the difference?
线程池:业务代码最常用也最容易犯错的组件
NSQ source code installation and operation process
C语言字符串反转
C语言按行修改文件
[Jianzhi offer] 58 - ii Rotate string left
arduino-esp32:LVGL项目(一)整体框架
LeetCode 1656. Design ordered flow
【剑指 Offer 】64. 求1+2+…+n
To resist 7-Zip, list "three sins"? Netizen: "is the third key?"
Build your own website (23)
"The NTP socket is in use, exiting" appears when ntpdate synchronizes the time
Mysql 单表字段重复数据取最新一条sql语句
Arduino esp32: overall framework of lvgl project (I)