Before launching various "hacker behaviors", hackers will take various measures to detect (or "detect") The host information of the other party, in order to determine the most effective method to achieve your goal. Let's see how hackers know the most basic network information-the IP address of the other party, and how users can prevent their own IP address leakage.
Get IP
As an important identifier for Net users, "IP" is the first thing hackers need to know. There are many methods to obtain the IP address. hackers may also use different methods based on different network conditions, for example, using the Ping command in the LAN to Ping the name of the other party in the network; use the IP version of QQ for direct display on the Internet. The most effective way is to intercept and analyze the network packets of the other party. This is a network packet captured by a Windows 2003 network monitor. It may be difficult for general users to understand the hexadecimal code, but for hackers who know network knowledge, they can find and directly parse the IP packet header information of the intercepted packets through software, and then learn the specific IP address based on the information.
Hide IP
Although there are multiple methods for IP reconnaissance, there are also a variety of ways for users to Hide IP addresses. For the most effective "packet analysis method", you can install some software that can automatically remove the packet header IP information. However, using these software has some disadvantages, such as: it consumes a lot of resources and reduces computer performance; it will be affected when accessing some forums or websites; it is not suitable for Internet cafe users. Currently, the most common method for individual users to Hide IP addresses is to use a proxy. Because after a proxy server is used, the "IP address translation service" will modify the sent data packets, this invalidates the "packet analysis" method. Some network software (such as QQ, MSN, and IE) that are easy to leak users' IP addresses support proxy connection to the Internet, especially after QQ uses proxy software such as ezProxy to connect, QQ of IP version cannot display this IP address. Here I will introduce a simple Proxy Software suitable for individual users-IP address hiding tool for new users in the network (2 ), you only need to fill in the correct proxy server address and port in the "Proxy Server" and "Proxy Server" to use the proxy for http. This is suitable for IE and qq ip address leakage.
However, the use of proxy servers also has some disadvantages, such as: it will affect the speed of network communication; a computer on the network that can provide proxy capabilities, if you cannot find such a proxy server, you cannot use a proxy (when searching for the proxy server, you can use tools such as "proxy Hunter" to scan the proxy server on the network ).
Although the proxy can effectively hide the user's IP address, hackers can bypass the proxy to find the real IP address of the other party, and under what circumstances the user uses to hide the IP address, it should also be based on the situation.
In addition, the firewall can also use IP address hiding to some extent. For example, the ZoneAlarm firewall has an IP address hiding on the Internet.