简体   繁体   English

Nmap 使用诱饵扫描扫描 WAN 目标的端口

[英]Nmap scans WAN target's ports with decoy scan

Few days ago,I would like to test my isp whether they would filter spoofing packets.So,I configured small labs to test.前几天,我想测试一下我的isp是否会过滤欺骗包。所以,我配置了小实验室来测试。

My steps are......我的步骤是......

1.Baught two different public ip from my isp 1.从我的isp买了两个不同的公共ip

2.attacker ip 1.1.1.1(assumed) ran with totolink router with NAT enabled 2.attacker ip 1.1.1.1(assumed) 使用启用了 NAT 的 totolink 路由器运行

3.target ip 2.2.2.2(assumed) ran with dlink router with NAT enabled and a full firewall log 3.target ip 2.2.2.2(assumed) 运行 dlink 路由器,启用 NAT 和完整的防火墙日志

4.run "nmap -D ip1,ip2,ip3 2.2.2.2" on 1.1.1.1 machine 4.在1.1.1.1机器上运行“nmap -D ip1,ip2,ip3 2.2.2.2”

If things went properly,I would see there are different ip in my 2.2.2.2's firewall log如果一切顺利,我会看到我的 2.2.2.2 的防火墙日志中有不同的 ip

However,the log only showed 1.1.1.1但是,日志只显示 1.1.1.1

So,I came up with some reasons.所以,我想出了一些理由。 And I will show it in a Q&A form for you guys.我会以问答形式向你们展示。

Q1:My isp detected the nmap usage Q1:我的 isp 检测到 nmap 的使用

A1:It is impossibe(I am confident).Because I have done some research on nmap source code and open source ids' rules.My custom nmap should pass the ips.The test for well-known ids+firewall had done in my LAN.(Also,my country is lack of security awareness,so the isp......) A1:不可能(我有信心)。因为我对nmap源代码和开源ids的规则做了一些研究。我的自定义nmap应该通过ips。众所周知的ids+防火墙的测试在我的局域网中做过.(另外,我的国家缺乏安全意识,所以ISP......)

Q2:the 2.2.2.2(dlink)drop the spoofed packet Q2:2.2.2.2(dlink)丢弃欺骗包

A2:Maybe.But I had disabled all security options(include ip spoofing protection) before testing A2:也许吧。但我在测试之前禁用了所有安全选项(包括 ip 欺骗保护)

Q3:1.1.1.1(totolink)'s NAT firewall disrupted it. Q3:1.1.1.1(totolink) 的 NAT 防火墙破坏了它。 And the process may be like.....而这个过程可能就像......

####################### #######################

part of normal raw ip packet正常原始 ip 数据包的一部分

Destination:192.168.1.1目的地:192.168.1.1

Source:192.168.1.15来源:192.168.1.15

while went through NAT通过 NAT 时

Destination:2.2.2.2目的地:2.2.2.2

Source:1.1.1.1来源:1.1.1.1

####################### #######################

####################### #######################

part of spoofing raw ip packet欺骗原始ip数据包的一部分

Destination:192.168.1.1目的地:192.168.1.1

Source:203.51.21.78(decoy ip)来源:203.51.21.78(诱饵ip)

while went through NAT通过 NAT 时

Destination:2.2.2.2目的地:2.2.2.2

Source:1.1.1.1(Thus 2.2.2.2 only showed 1.1.1.1 in log)来源:1.1.1.1(因此 2.2.2.2 在日志中只显示 1.1.1.1)

####################### #######################

A3:I am not sure...... A3:我不确定......

/* Will NAT change all kinds of source ip(from 0.0.0.0 to 255.255.255.255) to public ip? /* NAT会改变各种源ip(从0.0.0.0到255.255.255.255)到公网ip吗? or just change the internal ip(like 192.168.1.10, 192.168.1.15,.......) to public ip!!!或者只是将内部IP(如192.168.1.10、192.168.1.15、......)更改为公共IP!!! Is is hard for me to lauch a shell in a router to see the NAT rules.我很难在路由器中启动一个 shell 来查看 NAT 规则。 I am considering to use command injection to exploit my router.我正在考虑使用命令注入来利用我的路由器。 However, I am afraid of breaking it.但是,我害怕打破它。 So, I prefer listening to you guys answer */所以,我更喜欢听你们的回答 */

So,you guys think what is the most possible problem?那么,你们认为最可能出现的问题是什么?

Note:Sorry for my ugly expression,this is my first quesion :D注意:对不起,我的丑陋表达,这是我的第一个问题:D

我最近也遇到了同样的问题。诱饵扫描在局域网上运行良好,但在广域网上运行良好。我不知道如何解决。

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

相关问题 有没有办法将自定义被动扫描添加到 zap 的主动扫描? - Is there a way to add custom passive scans to zap's active scan? 扫描 WAN 端口 - Scann WAN ports 最好(和正确)使用nmap扫描自己的计算机? - Best (and correct) use of nmap to scan own computer? Nmap:提取不需要的端口以使用Batch和Blat发送邮件 - Nmap: extract undesirable ports for sending mail with Batch and Blat 列出的几个端口是使用nmap打开的,但是只有几个端口在服务器中监听。 - Several ports listed as opened with nmap, but only few ports listening in the server. GCP Kubernetes:入口和外部负载均衡器,带有 IAP 大量开放端口扫描 nmap - GCP Kubernetes: Ingress and external load balancer with IAP lots of open ports scanning nmap 在WAN中跟踪设备IP的好方法是什么? - What is a good way to keep track of a device's IP in the WAN? 我是一名网络学生,我现在正在研究 nmap,我不明白为什么我在这种扫描类型上得到了不同的 anwser: - Im a cyber student im working on nmap now and i didnt understand why i got a different anwser on this scan type: 安卓手机创建应用程序,可扫描用户的指纹并将其保存在数据库中 - Android rooted phone create app which scans and saves user's finger print in database Flutter/Dart 安全扫描 - Flutter/Dart security scans
 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM