当前位置:网站首页>[try to hack] active detection and concealment technology
[try to hack] active detection and concealment technology
2022-07-03 16:56:00 【Happy star】
https://www.bilibili.com/video/BV1bt4y1874s?p=79
Blog home page : Happy star The blog home page of
Series column :Try to Hack
Welcome to focus on the likes collection ️ Leaving a message.
Starting time :2022 year 7 month 3 Japan
The author's level is very limited , If an error is found , Please let me know , thank !
Active reconnaissance is based on OSNT Open source passive reconnaissance , Get more information about the goal , In order to find more places where there may be safety problems . But active reconnaissance will have a lot of interaction with the target , It is more likely to be detected by the target .
technology
1、 Camouflage tool signature
2、 Hide traffic from legitimate traffic
3、 Modify source and type
Adjust source IP Stack and tool identification settings
Common is to change User-Agent
Here we use msf To demonstrate msfconsoleuse auxiliary/fuzzers/http/http_form_field 
There is one advancedshow advanced
Yes useragentset useragent BaiduSpider // Search engine crawlers are generally not filtered set rhost 192.168.0.1 Set to route , Send... To route http Data packets run
wireshark Grab the bag and have a look
Filtering rules http&&ip.dst==192.168.0.1&&ip.src==192.168.0.106
Modify packet parameters
Nmap Modify the original parameters nmap --spoof-mac 11:11:11:11:11:11 26 -sS -Pn -p80 192.168.0.1
It's really disguised mac Address , But why Destination yes 0.0.0.26, I don't know
Many other tools have similar functions to modify packet parameters
Such as masscan Of –adapter-mac、–adapter-ip
Use proxy anonymous Networks tor
When using Tor When the client , Your Internet Communication will be through Tor The network routing . Leaving Tor Before the network reaches its destination , The traffic will pass through several randomly selected relay stations ( Run by volunteers ). This will prevent Internet Service providers and people who monitor your local network view the websites you visit . It also prevents the website itself from knowing your actual location or IP Address - They will see the exit node IP Address and location . Even the relay station doesn't know who requested the traffic they passed . Tor All traffic in the network is encrypted .
apt install torservice tor start start-up torservice tor status see tor Whether to start 
Configure through installation proxychains4, Is to integrate any program and agent tools proxy Establishing a connection , The principle is similar to that of browser proxy .apt install proxychains4gedit /etc/proxychains4.conf

firefox www.whatismyip.com
I saw it , This is the truth that no proxy is used ip, It's really my public network ip
proxychains firefox www.whatismyip.com Modify agent
边栏推荐
- LeetCode 1657. Determine whether the two strings are close
- Golang anonymous function use
- New features of C 10
- What kind of material is 14Cr1MoR? Analysis of chemical composition and mechanical properties of 14Cr1MoR
- 网络安全web渗透技术
- Processing strategy of message queue message loss and repeated message sending
- Hong Kong Polytechnic University | data efficient reinforcement learning and adaptive optimal perimeter control of network traffic dynamics
- What is the material of 13mnnimor? 13mnnimor steel plate for medium and low temperature pressure vessels
- Mysql database -dql
- Two sides of the evening: tell me about the bloom filter and cuckoo filter? Application scenario? I'm confused..
猜你喜欢

Idea configuration plug-in

静态程序分析(一)—— 大纲思维导图与内容介绍

QT serial port UI design and solution to display Chinese garbled code

What material is 12cr1movr? Chemical property analysis of pressure vessel steel plate 12cr1movr

Network security web penetration technology

MySQL single table field duplicate data takes the latest SQL statement

Yu Wenwen, Hu Xia and other stars take you to play with the party. Pipi app ignites your summer

Unreal_ Datatable implements ID self increment and sets rowname
智慧之道(知行合一)

建立自己的网站(23)
随机推荐
远程办公之如何推进跨部门项目协作 | 社区征文
What is the difference between 14Cr1MoR container plate and 14Cr1MoR (H)? Chemical composition and performance analysis of 14Cr1MoR
QT serial port UI design and solution to display Chinese garbled code
C语言按行修改文件
LeetCode 1657. Determine whether the two strings are close
[mathematical logic] equivalent calculus and reasoning calculus of propositional logic (propositional logic | equivalent calculus | principal conjunctive (disjunctive) paradigm | reasoning calculus)**
數據分析必備的能力
Alibaba P8 painstakingly sorted it out. Summary of APP UI automated testing ideas. Check it out
The way of wisdom (unity of knowledge and action)
[JDBC] API parsing
What material is sa537cl2 equivalent to in China? Sa537cl2 corresponding material
[combinatorial mathematics] recursive equation (example of recursive equation 2 Hanoi Tower | example of recursive equation 3 insertion sequencing)
utfwry. Dat PHP, about ThinkPHP's method of IP location using utfwry address Library
Bcvp developer community 2022 exclusive peripheral first bullet
Hands on in-depth learning notes (XIV) 3.7 Simple implementation of softmax regression
13mnnimo5-4 German standard steel plate 13MnNiMo54 boiler steel 13MnNiMo54 chemical properties
word 退格键删除不了选中文本,只能按delete
How to judge the region of an IP through C?
How to set up SVN server on this machine
"The NTP socket is in use, exiting" appears when ntpdate synchronizes the time