当前位置:网站首页>Find out the invisible assets -- use hosts collision to break through the boundary
Find out the invisible assets -- use hosts collision to break through the boundary
2022-06-24 16:08:00 【Bypass】
Sort out the assets from the perspective of the attacker , Use full port scanning + How subdomain names are collected , Identify all corporate asset exposures . But even so , It is often caused by incorrect configuration or untimely recycling , There are still some hidden assets .
01、 Business scenario
In general , Using a domain name to access a web site requires two steps , One is DNS Domain name resolution to server ip Address , The second is to bind the domain name to the server IP Address , Most of the time, we will forbid the passage IP Go directly to the website , Thus, malicious parsing and ip Scanning detection , Ensure that users can only access the business system through the correct domain name .
Take an enterprise deployment architecture as an example , Use Lvs+Nginx Build high availability web framework . In this mode , Just bind a public network ip, All service ports of the Intranet can pass through nginx The unique port of the agent is mapped to the external network environment .
Based on this enterprise deployment architecture , There are two typical vulnerability scenarios :
(1) Test environment or pre production environment , Clear the domain name resolution of the public network , however Nginx The configuration was not cleared in time , Bind correct host To access .
(2) For security reasons , Extranet Nginx And the Internet Nginx It is necessary to make a strict distinction , But there is no distinction between internal and external networks . Use the same Nginx Complete the configuration of Intranet and Internet services , Resolve to the public network through the public network domain name , Intranet DNS Resolve to intranet . This is the time , Bind correct host You can access the intranet system .
02、Hosts Collision Technology
Based on the above scenario , The domain name record cannot be found in the domain name resolution record , adopt IP Port can not access the website , Only to check nginx Configuration situation , Will discover the security problems that may be caused by improper configuration .
that , From the attacker's point of view , How to find these invisible assets ?
Here is a technology to share , It's called Hosts Collision Technology , By combining the domain name with IP Conduct binding collision , Once it matches the domain name binding configuration on the back-end proxy server , You can access the corresponding business system , To discover hidden assets .
Of course , In addition to being able to find hidden assets , We can also use this method to find the real business system IP, To bypass the cloud WAF Safety protection of .
03、 Automated scanning tools
hostscan: automation Host Collision tool
https://github.com/cckuailong/hostscanHosts_scan: be used for IP And domain name collision match access python Script
https://github.com/fofapro/Hosts_scan边栏推荐
- CAP:多重注意力机制,有趣的细粒度分类方案 | AAAI 2021
- D. Solve The Maze(思维+bfs)Codeforces Round #648 (Div. 2)
- 转置卷积学习笔记
- Efficient tools commonly used by individuals
- [C language questions -- leetcode 12 questions] take you off and fly into the garbage
- Global and Chinese market of training dance clothes 2022-2028: Research Report on technology, participants, trends, market size and share
- Summary of common tools and usage
- [download attached] installation and simple use of Chinese version of awvs
- Using oasis to develop a hop by hop (I) -- Scene Building
- Flink Kubernetes Application部署
猜你喜欢

【应用推荐】最近大火的Apifox & Apipost 上手体验与选型建议

存在安全隐患 部分冒险家混动版将召回

60 个神级 VS Code 插件!!

Solution of intelligent all in one machine in expressway service area

Mongodb Getting started Practical Tutoriel: Learning Summary Table des matières

Build go command line program tool chain

The penetration of 5g users of operators is far slower than that of 4G. The popularity of 5g still depends on China Radio and television

SIGGRAPH 2022 | 真实还原手部肌肉,数字人双手这次有了骨骼、肌肉、皮肤

Cap: multiple attention mechanism, interesting fine-grained classification scheme | AAAI 2021

C. Three displays codeforces round 485 (Div. 2)
随机推荐
PyTorch中的转置卷积详解
Flink Kubernetes Application部署
How to easily realize online karaoke room and sing "mountain sea" with Wang Xinling
How does the effective date of SAP PP ECM affect the work order?
存在安全隐患 部分冒险家混动版将召回
Install the imagemagick7.1 library and the imageick extension for PHP
The catch-up of domestic chips has scared Qualcomm, the leader of mobile phone chips in the United States, and made moves to cope with the competition
Parameterized tests guide in junit5
Summary of common tools and usage
ZOJ - 4104 sequence in the pocket
I just came back from the Ali software test. I worked for Alibaba P7 in 3+1, with an annual salary of 28*15
Flink kubernetes application deployment
Fastjson 漏洞利用技巧
April 26, 2021: the length of the integer array arr is n (3 < = n < = 10^4), and each number is
Using oasis to develop a hop by hop (I) -- Scene Building
我与“Apifox”的网络情缘
60 个神级 VS Code 插件!!
Learning these 10 kinds of timed tasks, I'm a little floating
Paper: Google TPU
Several common DoS attacks