标题 | 简介 | 类型 | 公开时间 | ||||||||||
|
|||||||||||||
|
|||||||||||||
详情 | |||||||||||||
[SAFE-ID: JIWO-2024-1519] 作者: ecawen 发表于: [2018-05-12]
本文共 [420] 位读者顶过
Active detectionPort scanningSome software NAT solutions (such as Kerio WinRoute Firewall), as well as many hardware solutions, provide a control port, which allows users to monitor and control their server (e.g. using a web browser). These control ports can be easily detected by means of port scanning (see Nmap). [出自:jiwo.org] Routing testSome improperly configured NATs allow IP packets to be translated from an external network. Routing test can detect these translators by trying to contact external server (e.g. forensicswiki.org:80) with modified routing tables. Passive detectionIP TTLNetwork Address Translators decrement IP TTL values of all translated packets. Leaked real IP addressSome network protocols leak real IP address of a client. These protocols include:
These commands are used to identify the SMTP client to the SMTP server. The argument field contains the fully-qualified domain name of the SMTP client if one is available. In situations in which the SMTP client system does not have a meaningful domain name (e.g., when its address is dynamically allocated and no reverse mapping record is available), the client SHOULD send an address literal (see section 4.1.3), optionally followed by information that will help to identify the client system. (see RFC 2821)
Reverse DNS lookups made to an external DNS server can leak information about hosts in an internal network.
Strict source port translationSome network protocols use strict source ports for communication. These protocols include: NTP, Valve. Non-heuristic port translators (such as ICS in Windows) always translate source port numbers. OS fingerprintingNetwork Address Translators can be detected by passively fingerprinting all transferred IP packets. Generally, single host will not produce different OS fingerprints in a short period of time. However, this method can be extended to fingerprinting different hosts running the same OS by using IP IDs and TCP timestamps. Tools
|