Guide:
Mobile, Unicom, telecom three operators have to provide their own customers with free-flow software, such as mobile and video apps, handheld business and so on. Operator's billing system in order to distinguish between the user's use of free traffic or general business, these free-flow service address will be added to the billing Statistics White list, do not deduct fees, but it is also possible to be exploited by hackers, through proxy server way to achieve global free-flow Internet.
Detailed information on the vulnerability was released as early as the December 2015 cloud platform.
650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M00/87/0F/wKioL1fShsLSQqIuAAEjJbSlVZE210.png-wh_500x0-wm_3 -wmp_4-s_1936612053.png "title=" Wuyun.png "alt=" Wkiol1fshslsqqiuaaejjbslvze210.png-wh_50 "/>
And the recent period of "free Flow", "cloud-free" time fire up, a variety of free-flow software, tutorials appear on the internet, at a very low price for the external sale of traffic .
650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M01/87/11/wKiom1fShtLjOFGgAAD2FUSKnOs503.png-wh_500x0-wm_3 -wmp_4-s_3760813630.png "title=" 9.png "alt=" Wkiom1fshtljofggaad2fusknos503.png-wh_50 "/>
There is even a software disclosure, for people to test the use, the author of this is a simple test .
1. Software registration, the registration process without any verification, directly enter the account password.
650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M01/87/0F/wKioL1fShufz5kFmAAQVV3e81W8508.png-wh_500x0-wm_3 -wmp_4-s_2978253730.png "title=" 1.png "alt=" Wkiol1fshufz5kfmaaqvv3e81w8508.png-wh_50 "/>
2. Login Success
650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M01/87/0F/wKioL1fShxrCjzTXAAPu_VyBh8c717.png-wh_500x0-wm_3 -wmp_4-s_2679736389.png "title=" 2.png "alt=" Wkiol1fshxrcjztxaapu_vybh8c717.png-wh_50 "/>
3. The following are the "white list servers for billing systems" described previously
650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M02/87/12/wKiom1fShyiCSEf4AACK9yQWyV8532.png-wh_500x0-wm_3 -wmp_4-s_394558344.png "title=" 3.png "alt=" Wkiom1fshyicsef4aack9yqwyv8532.png-wh_50 "/>
4. Successful connection, click on one of the post-installation connections, the connection is successful
650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M00/87/12/wKiom1fShzXTxxIPAAQTgIrCoGI364.png-wh_500x0-wm_3 -wmp_4-s_1477703045.png "title=" 4.png "alt=" Wkiom1fshzxtxxipaaqtgircogi364.png-wh_50 "/>
5. Baidu search IP to see its own external network IP has become another IP
650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M02/87/0F/wKioL1fSh0jwc9FDAAC6fSUnryo970.png-wh_500x0-wm_3 -wmp_4-s_2954625205.png "title=" 5.png "alt=" Wkiol1fsh0jwc9fdaac6fsunryo970.png-wh_50 "/>
6. Perform speed test
650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M00/87/12/wKiom1fSh1PQalsbAACxhF2San4047.png-wh_500x0-wm_3 -wmp_4-s_953335805.png "title=" 6.png "alt=" Wkiom1fsh1pqalsbaacxhf2san4047.png-wh_50 "/>
Conclusion: If these vulnerabilities are exploited and may be used far more than the amount of traffic in the package, how will the three operators handle this event? Let's wait and see.
This article is from the "11788603" blog, please be sure to keep this source http://11798603.blog.51cto.com/11788603/1851203
Hacker Circle now inverse dark technology, crack three operators free internet access