In the formal conduct of various "hacker behavior", the hacker will take various means to detect (also can say "reconnaissance") the other party's host information, in order to determine the most effective way to achieve their goals. Take a look at how hackers learn the most basic network information-the IP address of each other, and how users can guard against their own IP leaks. Getting IP "IP" as an important indicator of net users is the first thing hackers need to know. Get more methods, hackers will also because of different network situation to adopt different methods, such as: In the LAN use ping instructions, ping the other in the network name and get IP; Use the IP version of QQ directly on the Internet to display. And the most effective way is to intercept and analyze each other's network packets. This is a network packet captured using Windows 2003 Network Monitor. Perhaps the average user is more ugly to understand these 16 code, and for understanding the network knowledge hackers, they can find and directly through the software to resolve the intercepted packets of IP header information, and then based on this information to understand the specific IP. Hidden IP Although the method of reconnaissance IP is diverse, but the user can hide the IP method is equally diverse. Take the most effective packet analysis method, you can install some software that can automatically remove the IP information from the packet header. However, there are some drawbacks to using these software, such as: it consumes a lot of resources, reduce the performance of the computer, access to some forums or websites will be affected, not suitable for Internet users and so on. Now the most popular way to hide IP users should use the proxy, since the use of proxy server, the "Referral Service" will be sent out of the packet changes, resulting in "packet analysis" method failure. Some easy to leak user IP network software (QQ, MSN, ie, etc.) support the use of proxy way to connect the Internet, especially QQ use "ezproxy" and other agent software connection, IP version of QQ can not display the IP address. Here the author introduces a more suitable for individual users of the simple agent software-network novice IP hidden, as long as the "proxy server" and "Proxy Server" to fill in the correct proxy server address and port, you can use proxy for HTTP, more suitable for IE and QQ leakage IP situation. However, the use of Proxy server, there are also some drawbacks, such as: the speed of network communication will be required, a network on the ability to provide agents on the computer, if the user can not find such a proxy server can not use the proxy (to find a proxy server, use the "Agent Hunter" Tools such as software scan the proxy server on the network. Although the agent can effectively hide the user IP, but sophisticated hackers can bypass the agent, find the other side of the real IP address, users under what circumstances to use the method of hiding IP, but also because of the situation. In addition, firewalls can also be used to some extent the use of IP hidden, such as the ZoneAlarm firewall has a hidden IP function on the Internet. Responsible Editor: Fireworks (TEL: (010) 68476636-8008) to force (0 votes) of the (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title of the party (0 Votes) passed (0 Votes) Text: teach you how to prevent your own IP leakage back to the network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.