当前位置:网站首页>Find out the invisible assets -- use hosts collision to break through the boundary
Find out the invisible assets -- use hosts collision to break through the boundary
2022-06-24 16:08:00 【Bypass】
Sort out the assets from the perspective of the attacker , Use full port scanning + How subdomain names are collected , Identify all corporate asset exposures . But even so , It is often caused by incorrect configuration or untimely recycling , There are still some hidden assets .
01、 Business scenario
In general , Using a domain name to access a web site requires two steps , One is DNS Domain name resolution to server ip Address , The second is to bind the domain name to the server IP Address , Most of the time, we will forbid the passage IP Go directly to the website , Thus, malicious parsing and ip Scanning detection , Ensure that users can only access the business system through the correct domain name .
Take an enterprise deployment architecture as an example , Use Lvs+Nginx Build high availability web framework . In this mode , Just bind a public network ip, All service ports of the Intranet can pass through nginx The unique port of the agent is mapped to the external network environment .
Based on this enterprise deployment architecture , There are two typical vulnerability scenarios :
(1) Test environment or pre production environment , Clear the domain name resolution of the public network , however Nginx The configuration was not cleared in time , Bind correct host To access .
(2) For security reasons , Extranet Nginx And the Internet Nginx It is necessary to make a strict distinction , But there is no distinction between internal and external networks . Use the same Nginx Complete the configuration of Intranet and Internet services , Resolve to the public network through the public network domain name , Intranet DNS Resolve to intranet . This is the time , Bind correct host You can access the intranet system .
02、Hosts Collision Technology
Based on the above scenario , The domain name record cannot be found in the domain name resolution record , adopt IP Port can not access the website , Only to check nginx Configuration situation , Will discover the security problems that may be caused by improper configuration .
that , From the attacker's point of view , How to find these invisible assets ?
Here is a technology to share , It's called Hosts Collision Technology , By combining the domain name with IP Conduct binding collision , Once it matches the domain name binding configuration on the back-end proxy server , You can access the corresponding business system , To discover hidden assets .
Of course , In addition to being able to find hidden assets , We can also use this method to find the real business system IP, To bypass the cloud WAF Safety protection of .
03、 Automated scanning tools
hostscan: automation Host Collision tool
https://github.com/cckuailong/hostscan
Hosts_scan: be used for IP And domain name collision match access python Script
https://github.com/fofapro/Hosts_scan
边栏推荐
- Linux record -4.22 MySQL 5.37 installation (supplementary)
- Step by step import RHEL image to Tencent cloud
- Why is it easy for enterprises to fail in implementing WMS warehouse management system
- 山金期货安全么?期货开户都是哪些流程?期货手续费怎么降低?
- How does the effective date of SAP PP ECM affect the work order?
- 【附下载】汉化版Awvs安装与简单使用
- April 23, 2021: there are n cities in the TSP problem, and there is a distance between any two cities
- Mongodb Getting started Practical Tutoriel: Learning Summary Table des matières
- How to open a futures account safely? Which futures companies are more reliable?
- Install the imagemagick7.1 library and the imageick extension for PHP
猜你喜欢
[cloud native | kubernetes chapter] Introduction to kubernetes Foundation (III)
Remote connection raspberry pie in VNC Viewer Mode
Still worried about missing measurements? Let's use Jacobo to calculate the code coverage
【面试高频题】难度 3/5,可直接构造的序列 DP 题
MongoDB入門實戰教程:學習總結目錄
如何轻松实现在线K歌房,与王心凌合唱《山海》
Cap: multiple attention mechanism, interesting fine-grained classification scheme | AAAI 2021
Cap: multiple attention mechanism, interesting fine-grained classification scheme | AAAI 2021
构建Go命令行程序工具链
Database tools in intelij can connect but cannot display schema, tables
随机推荐
2021-04-27: if the adjacent position of a character does not have the same character
[C language questions -- leetcode 12 questions] take you off and fly into the garbage
[application recommendation] the hands-on experience and model selection suggestions of apifox & apipost in the recent fire
PyTorch中的转置卷积详解
ZOJ——4104 Sequence in the Pocket(思维问题)
中国产品经理的没落:从怀恋乔布斯开始谈起
Nature publishes significant progress in quantum computing: the first quantum integrated circuit implementation in history
What is a framework?
Mongodb introductory practical tutorial: learning summary directory
Global and Chinese market of inverted syrup 2022-2028: Research Report on technology, participants, trends, market size and share
【附下载】汉化版Awvs安装与简单使用
Efficient tools commonly used by individuals
企业安全攻击面分析工具
Paper: Google TPU
Logging is not as simple as you think
[download attached] installation and simple use of Chinese version of awvs
2021-04-18: given a two-dimensional array matrix, the value in it is either 1 or 0,
Install the imagemagick7.1 library and the imageick extension for PHP
Using oasis to develop a hop by hop (I) -- Scene Building
【面试高频题】难度 3/5,可直接构造的序列 DP 题