Deep Firewall logging
The DNS hacker or crackers may be attempting to perform zone transfer (TCP), spoof DNS (UDP), or hide other traffic. Therefore, firewalls often filter or record port 53.
Note that you will often see 53 ports as UDP source ports. Unstable firewalls typically allow this communication and assume that this is a reply to a DNS query. Hacker often use this method to penetrate a firewall.
67 and Bootp/dhcp on the BOOTP and DHCP UDP: Firewalls in DSL and Cable-modem often see larg
ports. Note that you will often see port 53 as the UDP source port. An unstable firewall typically allows this communication and assumes that this is a reply to a DNS query. Hacker often use this method to penetrate firewalls.
67 and Bootp/dhcp on BOOTP and DHCPUDP: The firewalls in DSL and Cable-modem often see a large amount of data sent to the broadcast address 255.255.255.255. These machines are requesting an address assignment to the DHCP server. Hacker often enter them to assign an addres
Service IntroductionDHCP Service Overview:Name: dhcp-dynamichost Configuration Protocol Dynamic Host Configuration ProtocolFeatures: DHCP (Dynamic Host configuration Protocol. dll ) is a local area network protocol that uses UDP the work of the agreement, mainly has two uses:1 , automatically assigned to an internal network or network service provider IP address, host name, DNS server, domain name2 , matching and other services to achieve integrated management functions. Such as: Unattended Inst
often filter or log 53 ports. Note that you will often see port 53 as the UDP source port. An unstable firewall typically allows this communication and assumes that this is a reply to a DNS query. Hacker often use this method to penetrate firewalls.Bootp/dhcp on 6768 BOOTP and DHCP UDP: The firewall in DSL and Cable-modem often sees a large amount of data sent to the broadcast address 255.255.255.255. These machines are requesting an address assignment to the DHCP server. Hacker often enter the
a high-bandwidth e-mail server to deliver simple information to different addresses. SMTP servers (especially SendMail) are one of the most common ways to get into the system, because they must be fully exposed to the Internet and the routing of Messages is complex (exposed + complex = weakness).The DNS hacker or crackers may be attempting to perform zone transfer (TCP), spoof DNS (UDP), or hide other traffic. Therefore, firewalls often filter or record port 53.Note that you will often see 53 p
, firewalls often filter or record port 53. Note that you will often see 53 ports as UDP source ports. Unstable firewalls typically allow this communication and assume that this is a reply to a DNS query. Hacker often use this method to penetrate a firewall.
67 and Bootp/dhcp on BOOTP and DHCPUDP: Firewalls at DSL and Cable-modem often see large numbers of data sent to broadcast address 255.255.255.255. These machines are requesting an address assignment from the DHCP server. Hacker often enter
++, the extended WHOIS Service
67 bootps Boot Protocol (BOOTP) service; also used by Dynamic Host Configuration Protocol (DHCP) Service
68 bootpc Bootstrap (BOOTP) customers; also used by Dynamic Host Configuration Protocol (DHCP) Customers
69 tftp small File Transfer Protocol (TFTP)
70 gopher Gopher Internet document search and retrieval
71 netrjs-1 remote job service
72 netrjs-2 remote job service
. These machines are requesting an address allocation from the DHCP server. Hackers often access them and assign an address to use themselves as local routers to initiate a large number of man-in-middle (man-in-middle) attacks. The client broadcasts the request configuration to port 68 (bootps), and the server broadcasts a response to the request to port 67 (bootpc. This response uses broadcast because the
denied.
Obviously, we have achieved our goal. However, we can disable iusrusers' calls to cmd.exe.
2: Can we delete TFTP in the future? Otherwise, because key programs such as tftp.exe are protected by the Windows File Protection System, they cannot be changed directly. Here we will introduce another method,
Use the text editing tool to open the service file under % SystemRoot %/system32/Drivers/etc and find the corresponding line of TFTP:
Bootps 67/
authentication and access.
50 re-mail-ck remote email check protocol
53 domain name service (such as BIND)
63 whois ++ WHOIS ++, the extended WHOIS service
67 bootps boot protocol (BOOTP) service; also used by Dynamic Host Configuration Protocol (DHCP) service
68 bootpc Bootstrap (BOOTP) customers; also used by Dynamic Host Configuration Protocol (DHCP) customers
69 tftp small File Transfer Protocol (TFTP)
. These machines are requesting an address allocation from the DHCP server. Hackers often access them and assign an address to use themselves as local routers to initiate a large number of man-in-middle (man-in-middle) attacks. The client broadcasts the request configuration to port 68 (bootps), and the server broadcasts a response to the request to port 67 (bootpc. This response uses broadcast because the
ID6. Reach Br-int, then reach router,router NAT table convert fixed IP address to floatiing IP address, then route to Br-ex7. Go out to the extranet from the Br-ex connected physical network cardThe external IP access virtual machine is a reverse process.2.4 Process 4: Virtual machines Send DHCP requestsProcess:1. Packet, Br-int, Br-tun, tunnel, eth2------>eth2->br-tun->br-int->qdhcp, virtual machine2. QDHCP returns its fixed IP address, the original path returnsFor example: During the startup
. These machines are requesting an address assignment from the DHCP server. Hacker often enter them to assign an address that initiates a large number of "man-in-the-Middle" (man-in-middle) attacks as local routers. The client configures the 68 port (BOOTPS) broadcast request, and the server broadcasts a response request to port 67 (BOOTPC). This response uses the broadcast because the client is unaware of
, firewalls often filter or record port 53.
Note that you will often see 53 ports as UDP source ports. Unstable firewalls typically allow this communication and assume that this is a reply to a DNS query. Hacker often use this method to penetrate a firewall.
67 and Bootp/dhcp on the BOOTP and DHCP UDP: Firewalls in DSL and Cable-modem often see large numbers of data sent to broadcast address 255.255.255.255. These machines are requesting an address assignment from the DHCP server. Hacker often e
routing information, routing table-e displays extended information, such as UID, etc.-s per protocol to statistics-C every other fixed time, executes the netstat command. Hint: The status of listen and listening can only be seen with-a or-lPractical Command Instances1. List all ports (including listening and not listening)List all ports netstat-a[[emailprotected] scripts]# netstat-aactive Internet connections (servers and established) Proto Recv-q send-q Loca L Address F
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.