D*N
4 楼
Proxys 4 All
http://proxys4all.cgi.net/
Free Public Proxy Severs List
http://tools.rosinstrument.com/proxy/proxies.htm
【在 h*****l 的大作中提到】
: Could you recommend some place to get Proxy?
http://proxys4all.cgi.net/
Free Public Proxy Severs List
http://tools.rosinstrument.com/proxy/proxies.htm
【在 h*****l 的大作中提到】
: Could you recommend some place to get Proxy?
l*x
6 楼
Http uses TCP which is connection-oriented
There is a 3-way handshake before connection is set up.
And because of this 3-way handshake, it is very hard to disguise IP,
even it is easy to send any pockets with any source ip.
Am I right?
c*v
7 楼
this only works if the network is shared media, not work for
switched networks.
the better way is to spoof the router, for instance if you are
one host H, and you are faking address F, just tell your router
that to reach F must use H as gateway. so all packets for F
will be going through H. of course you need to turn the nic
on H to permiscue mode. but you can only fake an ip in your as.
rip v1 is easy to spoof, so is some version of bgp.
m*e
8 楼
This won't work. Intranet IP will be translated into the gateway's external
IP when it comes out. It only works when the server is in the same intranet,
which of course is not what he is asking about.
m*e
9 楼
And you will probably have to snoof all the routers along the way.
It's not a good thing to do. Netadmin will come after you if you disturb
the network, and then you will lose your network connection.
【在 c*v 的大作中提到】
:
: this only works if the network is shared media, not work for
: switched networks.
: the better way is to spoof the router, for instance if you are
: one host H, and you are faking address F, just tell your router
: that to reach F must use H as gateway. so all packets for F
: will be going through H. of course you need to turn the nic
: on H to permiscue mode. but you can only fake an ip in your as.
: rip v1 is easy to spoof, so is some version of bgp.
It's not a good thing to do. Netadmin will come after you if you disturb
the network, and then you will lose your network connection.
【在 c*v 的大作中提到】
:
: this only works if the network is shared media, not work for
: switched networks.
: the better way is to spoof the router, for instance if you are
: one host H, and you are faking address F, just tell your router
: that to reach F must use H as gateway. so all packets for F
: will be going through H. of course you need to turn the nic
: on H to permiscue mode. but you can only fake an ip in your as.
: rip v1 is easy to spoof, so is some version of bgp.
c*v
10 楼
it depends. basically if you hijack one of the routers, you hijack
all in that as since some version of routing protocol such as
early versions of bgp will spread the false route to other routers.
that would probably be true. but which hacker will really use his
own network to do hacking? you get into a foreign network first, open
a backdoor, then use that network to do nasty things, and always
erase footprints.
today with broadband connection, many users with no idea of net
admin and secu
【在 m*****e 的大作中提到】
: And you will probably have to snoof all the routers along the way.
: It's not a good thing to do. Netadmin will come after you if you disturb
: the network, and then you will lose your network connection.
m*e
11 楼
If you can hack into others network, what's the point to spoof IP addresses?
这不是xxxxxx,多此一举么?hehe.
【在 c*v 的大作中提到】
:
: it depends. basically if you hijack one of the routers, you hijack
: all in that as since some version of routing protocol such as
: early versions of bgp will spread the false route to other routers.
: that would probably be true. but which hacker will really use his
: own network to do hacking? you get into a foreign network first, open
: a backdoor, then use that network to do nasty things, and always
: erase footprints.
: today with broadband connection, many users with no idea of net
: admin and secu
a*a
13 楼
For the DDos attack, even if the packets are from the
agents, their source IP
address are usually faked, or even randomly generated.
agents, their source IP
address are usually faked, or even randomly generated.
相关阅读
问一个IBM电脑的问题手动查杀netstart病毒(原创)求救:公司的电脑中了流氓软件。KB918899安装不上,你们装上了吗?我也中招了计算机联网后自动重新启动!!!!!Computer Forensics resourceswhere to download source code for ForensiX?以后还是用mac或者ubuntu这是病毒吗? 要疯了是不是有病毒?求助:新机器出问题了……注册表被DISABLE怎么办?请问怎样才能让scan32.exe停止?求救, 怎么对付WINFIX?hijackThis竟然没查出来主页被改,怎么办? 求救.invalid User name lists for the systemlog file访问网页时出现“显示flush”怎么贴子内容都空白?51上网助手是什么玩意?? (转载)