ubnt解决方案
查看: 64240|回复: 137

[原创]无线PPTP VPN攻击!!VPN攻击第一弹!!

  [复制链接]

1115

回帖

1万

积分

163 小时

在线时间

超级版主

ZerOne无线安全研究组织 Leader

终身荣誉版主杰出会员技术达人终身荣誉会员

注册时间
2006-5-18
金币
7935 个
威望
175 个
荣誉
52 个
累计签到:3 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2008-5-10 11:30 |显示全部楼层
<p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><span style="font-size: 16pt; font-family: 宋体; "><strong><font face="Arial Black">无线<font face="Verdana">PTP VPN</font> 攻击,</font><font face="Verdana">VPN Attack<font color="#ff0000">第一弹!</font></font></strong></span></p><p></p><p><b><span style="font-size: 12pt; color: red; font-family: 宋体; ">作者:</span></b><b><span style="font-size: 14pt; font-family: 宋体; ">杨</span></b><b><span style="font-size: 14pt; font-family: 宋体; ">哲</span></b><b><span lang="EN-US" style="font-size: 14pt; font-family: Verdana; "> / Christopher Yang </span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">[</span></b><b><span lang="EN-US" style="font-size: 14pt; color: rgb(51, 102, 255); font-family: Verdana; ">ZerOne</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">]</span></b></p><p><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "></span></b><span><strong>(</strong>欢迎转载,转载时请注明作者及出处)</span></p><span><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; text-indent: 24pt; "><span style="font-size: 12pt; font-family: 宋体; ">大多数管理员及用户对于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">的看法都是:</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">环境已经属于高级别安全防护,足以保证企业内部信息通信的安全与稳定。那么,事实真的是这样么?</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">真的是如此无敌么?下面笔者就带大家来揭开</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">薄弱的面纱,看看黑客们是如何进行</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">攻击的。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "></span></p><p></p></span><p></p><p></p><p></p><p><span style="font-size: 12pt; font-family: 宋体; ">    首先要强调的是,</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">类型有很多分类,但对于大多数中小型企业,为了便于工作及部署,基本都是采用</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PTP</span><span style="font-size: 12pt; font-family: 宋体; ">及强化的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">IPSec VPN</span><span style="font-size: 12pt; font-family: 宋体; ">,至于大型企业及分支众多的分店型企业,则较多使用</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">SSL VPN</span><span style="font-size: 12pt; font-family: 宋体; ">。而针对</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">的恶意攻击,常见的有中间人攻击、</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">D.O.S</span><span style="font-size: 12pt; font-family: 宋体; ">攻击等。作为无线领域的延伸,无线</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">在带来便捷的同时,也面临着和有线网络</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">一样的威胁。下面我就以攻击Windows 2003环境的PPTP VPN为例,下次给大家带来IPSec VPN 的攻击。</span><span style="font-size: 12pt; font-family: 宋体; "><br/></span></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 14pt; font-family: Verdana; ">1</span></b><b><span style="font-size: 14pt; font-family: 宋体; ">.攻击相关工具介绍</span></b><b><span lang="EN-US" style="font-size: 14pt; font-family: Verdana; "></span></b></p><b><p></p></b><p></p><p></p><p></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Zenmap<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "></span></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Zenmap</span><font face="Verdana"><span style="font-size: 12pt; font-family: 宋体; ">其实只是</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">nmap</span><span style="font-size: 12pt; font-family: 宋体; ">的图形版本,作为同样免费的工具,</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">zenmap</span><span style="font-size: 12pt; font-family: 宋体; ">提供了很好的界面帮助用户进行</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">nmap</span><span style="font-size: 12pt; font-family: 宋体; ">常见的扫描选项,并能够将结果用不同颜色标识,以便用户查看所需的内容。BackTrack2/3内置为其命令行版。<span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "></span></span></font></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><font face="Verdana"><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; ">Asleap<span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; "></span></span></span></span></font></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><font face="Verdana"><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "><span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; ">这是一款用于恢复</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">LEAP</span><span style="font-size: 12pt; font-family: 宋体; ">和</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PTP</span><span style="font-size: 12pt; font-family: 宋体; ">加密密码的免费工具,其原理主要是基于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">LEAP</span><span style="font-size: 12pt; font-family: 宋体; ">验证漏洞,但由于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PTP</span><span style="font-size: 12pt; font-family: 宋体; ">同样使用了和</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">LEAP</span><span style="font-size: 12pt; font-family: 宋体; ">一样的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">MSCHAPv2</span><span style="font-size: 12pt; font-family: 宋体; ">加密,所以这款工具也可用于破解</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PTP</span><span style="font-size: 12pt; font-family: 宋体; ">帐户及密码。有</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">和</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows</span><span style="font-size: 12pt; font-family: 宋体; ">两个版本,大家可根据需要选择。BackTrack2/3内置<span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "></span></span></span></span></span></font></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><font face="Verdana"><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "><span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; ">Ettercap<span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; "></span></span></span></span></span></span></span></font></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><font face="Verdana"><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "><span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "><span class="Apple-style-span" style="font-size: 14px; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; ">这是一款以太网环境下的网络监视、拦载和记录工具,支持多种主动或被动的协议分析,比如加密相关</span><span style="font-size: 12pt; font-family: 宋体; ">的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">SSH</span><span style="font-size: 12pt; font-family: 宋体; ">、</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">HTTPS</span><span style="font-size: 12pt; font-family: 宋体; ">等,有数据插入、过滤、保持连接同步等多种功能,也有一个能支持多种嗅探模式的、强大而完整的嗅探套件,支持插件,能够检查网络环境</span><span style="font-size: 12pt; font-family: 宋体; ">是否是交换局域网,并且能使用主动或被动的操作系统指纹识别技术让你了解当前局域网的情况。这款工具也</span><span style="font-size: 12pt; font-family: 宋体; ">有</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">和</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows</span><span style="font-size: 12pt; font-family: 宋体; ">两个版本。BackTrack2/3内置。</span></span></span></span></span></span></span></font></span></span></b></p><p class="MsoNormal" style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0pt; margin-left: 0cm; "><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "></span></p><p class="MsoNormal"><b><span lang="EN-US" style="font-size: 14pt; font-family: Verdana; ">2</span></b><b><span style="font-size: 14pt; font-family: 宋体; ">.</span></b><b><span lang="EN-US" style="font-size: 14pt; font-family: Verdana; ">VPN</span></b><b><span style="font-size: 14pt; font-family: 宋体; ">攻击实战步骤<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><br/>
1 l3 _; V+ b1 u( C                                </span></span></b></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">1</span></b><span style="font-size: 12pt; font-family: 宋体; ">:<b>扫描并确定</b></span><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">服务器目标<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><br/>
# s" r# r7 o/ J3 m* y) Y                                </span></span></b></p><p class="MsoNormal" style="text-indent: 24pt; "><span style="font-size: 12pt; font-family: 宋体; ">在对</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">设备进行攻击前,需要先对预攻击目标进行确认,这就需要扫描来发现及识别目标。对于最常见的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PPTP VPN</span><span style="font-size: 12pt; font-family: 宋体; ">,攻击者常会使用</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">nmap</span><span style="font-size: 12pt; font-family: 宋体; ">这款在命令提示符下工作的扫描器来进行探测。不过,在本书修订时<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "><span style="font-size: 12pt; font-family: 宋体; ">(嘿嘿,我的书),</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">nmap</span><span style="font-size: 12pt; font-family: 宋体; ">已经有了自己的图形化版本</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">zenmap</span><span style="font-size: 12pt; font-family: 宋体; ">,对于一些习惯使用鼠标的用户,也许是个福音。<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">
# g" ]0 u5 d, E  Z                                        </span></span></span></span></p><p class="MsoNormal"><span style="font-size: 12pt; font-family: 宋体; ">如下图所示,通过采用</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Full version Detection Scan</span><span style="font-size: 12pt; font-family: 宋体; ">完整版本探测模式,作为新版本的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">zenmap</span><span style="font-size: 12pt; font-family: 宋体; ">,成功扫描出目标开放了</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">1723</span><span style="font-size: 12pt; font-family: 宋体; ">端口,此为</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PPTP VPN</span><span style="font-size: 12pt; font-family: 宋体; ">服务器标准开放端口。在这里可以看到,</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">zenmap</span><span style="font-size: 12pt; font-family: 宋体; ">同时识别出目标操作系统为</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows 2003 </span><span style="font-size: 12pt; font-family: 宋体; ">,以及该系统对应的内部版本号,非常准确。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op></op></span></p><p class="MsoNormal"><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "><span class="Apple-style-span" style="font-family: Verdana; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "></span>
0 u0 ^7 P. H  `+ v                        </span><br/></span></p><p class="MsoNormal"></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">2</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">:准备</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Asleap<span class="Apple-style-span" style="font-family: 宋体; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; "></span></span></span></b></p><p class="MsoNormal"><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><span class="Apple-style-span" style="font-family: 宋体; font-weight: normal; "><span style="font-size: 12pt; font-family: 宋体; ">对于BackTrack </span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">环境的用户,已经内置了Asleap<b><span style="font-size: 12pt; font-family: 宋体; "></span></b></span></span></span></b></p><p class="MsoNormal"><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "></span><br/></span></p><p class="MsoNormal"><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; font-weight: bold; "></span></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">3</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">:准备</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; "><br/><span style="font-size: 12pt; font-family: 宋体; ">和上面</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">asleap</span><span style="font-size: 12pt; font-family: 宋体; ">的准备工作一样,对于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows</span><span style="font-size: 12pt; font-family: 宋体; ">或</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">环境,安装对应的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">版本即可,需要说明的是,对于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows</span><span style="font-size: 12pt; font-family: 宋体; ">环境,在安装</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">前,应当先安装</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">WinPcap</span><span style="font-size: 12pt; font-family: 宋体; ">驱动,该驱动可支持网卡模式切换为混杂模式,以便进行中间人攻击所必需的嗅探及监听。<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">7 T: P, E' p- w7 y
                                                </span></span></span></span></b></p><p class="MsoNormal" style="text-indent: 24pt; "><span style="font-size: 12pt; font-family: 宋体; ">安装完毕后,就可以打开</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">,打开后先指定该工具工作的网卡,对于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">环境,这里选择为</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">eth0</span><span style="font-size: 12pt; font-family: 宋体; ">。对于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Windows</span><span style="font-size: 12pt; font-family: 宋体; ">环境,则选择当前连接外网的网卡。<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">
7 X( D$ H7 O) y/ X/ D- r* t7 L                        </span></span></p><p class="MsoNormal" style="text-indent: 24pt; "><span style="font-size: 12pt; font-family: 宋体; ">下图为</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Linux</span><span style="font-size: 12pt; font-family: 宋体; ">下在</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">里指定工作网卡</span></p><p class="MsoNormal" style="text-indent: 24pt; "><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "></span><br/></span></p><p class="MsoNormal" style="text-indent: 24pt; "></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">4</span></b><span style="font-size: 12pt; font-family: 宋体; ">:设定完毕工作网卡,会出现载入界面,此时</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">会将监听及攻击模块依次载入。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op></op></span></p><p class="MsoNormal"></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">5</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">:</span></b><span style="font-size: 12pt; font-family: 宋体; ">载入完毕后,需要打开</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Hosts</span><span style="font-size: 12pt; font-family: 宋体; ">栏</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">—Scan hosts</span><span style="font-size: 12pt; font-family: 宋体; ">选项,进行扫描网段内开启主机的步骤。经过很短时间的等待,在扫描结果中,</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">会列出所有该网段内开启主机</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">IP</span><span style="font-size: 12pt; font-family: 宋体; ">及对应</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">MAC</span><span style="font-size: 12pt; font-family: 宋体; ">的列表,如下图,可以在</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Host List</span><span style="font-size: 12pt; font-family: 宋体; ">里查看该主机列表。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op></op></span></p><p class="MsoNormal"><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "></span><br/></span></p><p class="MsoNormal"></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">6</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">:</span></b><span style="font-size: 12pt; font-family: 宋体; ">在上面的扫描结果中,点选对应的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">服务器主机,将其添加到</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Target1</span><span style="font-size: 12pt; font-family: 宋体; ">里,将预嗅探的其它客户端主机添加</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Target2</span><span style="font-size: 12pt; font-family: 宋体; ">里。当然,也可以直接添加网关地址。此步骤为选择</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Arp</span><span style="font-size: 12pt; font-family: 宋体; ">欺骗目标。关于</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Arp</span><span style="font-size: 12pt; font-family: 宋体; ">欺骗原理及其它攻击内容,大家可以察看网上</span><span style="font-size: 12pt; font-family: 宋体; ">的文章,这里就不再反复讲述。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op></op></span></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">7</span><span style="font-size: 12pt; font-family: 宋体; ">:</span></b><span style="font-size: 12pt; font-family: 宋体; ">目标选定后,就可以开始进行</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Arp</span><span style="font-size: 12pt; font-family: 宋体; ">欺骗式中间人攻击,点选</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">MITM</span><span style="font-size: 12pt; font-family: 宋体; ">栏里的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ARP Poisoning</span><span style="font-size: 12pt; font-family: 宋体; ">选项,在如下图的窗口中选择</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Sniff remote connections</span><span style="font-size: 12pt; font-family: 宋体; ">,即嗅探远程连接内容。此时,</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">就开始进行</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Arp</span><span style="font-size: 12pt; font-family: 宋体; ">双向欺骗,以截获双方通信内容了。</span><br/></p><p class="MsoNormal"><br/></p>[em05]
/ Y' ]  }, G. A2 M
[此贴子已经被作者于2008-5-11 11:33:50编辑过]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册 微信登录

x
Hacking is a state of mind......
已陆续编写出版《无线网络安全攻防实战》《无线网络安全攻防实战进阶》等7本无线安全系列书籍,2017新书正在筹备中,感谢支持与肯定

37

回帖

154

积分

10 小时

在线时间

上等兵

注册时间
2008-12-27
金币
104 个
威望
0 个
荣誉
0 个

尚未签到

发表于 2009-3-9 08:52 |显示全部楼层
设置一个超长的,多组合的,甚至是用乱码来做的,定期更换,一般水平的,非军事和层次的轩季候是破解不了的,所以大家还是先放下心来吧。
7 K7 E  K: n+ q" i: r6 \; z7 Z+ Z
0 ^  W" R/ S" a* h* A而且真正高手的HK多有正义之心的修炼,加上保护自己的心态,一般不会吃羊肉跑潲,所以一般VPN是安全的。
回复

使用道具 举报

1115

回帖

1万

积分

163 小时

在线时间

超级版主

ZerOne无线安全研究组织 Leader

终身荣誉版主杰出会员技术达人终身荣誉会员

注册时间
2006-5-18
金币
7935 个
威望
175 个
荣誉
52 个
累计签到:3 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2008-5-10 11:30 |显示全部楼层

续无线PPTP VPN破解

<p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">8</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">:</span></b><span style="font-size: 12pt; font-family: 宋体; ">接下来,经过耐心的等待,即可截获</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">交互数据包。对于没有耐心的攻击者,也会使用诸如</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">D.O.S</span><span style="font-size: 12pt; font-family: 宋体; ">等方式强制断开目标</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">连接,来达到迫使远程</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">客户端重新登录的目的。如下图,在</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Ettercap</span><span style="font-size: 12pt; font-family: 宋体; ">里就可以直接过滤出采用</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">MSCHAPv2</span><span style="font-size: 12pt; font-family: 宋体; ">加密的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">用户登陆</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Hash</span><span style="font-size: 12pt; font-family: 宋体; ">值,里面包含了</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">用户登录帐户名及对应密码。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op></op></span></p><p class="MsoNormal"><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "></span><br/></span></p><p class="MsoNormal"><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "></span></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">9</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">:</span></b><span style="font-size: 12pt; font-family: 宋体; ">先使用</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">asleap</span><span style="font-size: 12pt; font-family: 宋体; ">附带的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">genkeys</span><span style="font-size: 12pt; font-family: 宋体; ">工具来将字典文件转换成攻击程序可以识别的格式,字典可以事先根据需要制作,比如生日、常用单词等,这个在</span><span style="font-size: 12pt; "><span class="Apple-style-span" style="font-family: Verdana; ">网上有很多</span></span><span style="font-size: 12pt; font-family: 宋体; ">文章介绍,此处也不再多言,请大家自行建立字典。如下图,将字典中</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">30</span><span style="font-size: 12pt; font-family: 宋体; ">多万</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">key</span><span style="font-size: 12pt; font-family: 宋体; ">转换成可以识别的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Hash</span><span style="font-size: 12pt; font-family: 宋体; ">只花费了</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">2</span><span style="font-size: 12pt; font-family: 宋体; ">秒,转换速率为</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">14.6</span><span style="font-size: 12pt; font-family: 宋体; ">万密码</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">/</span><span style="font-size: 12pt; font-family: 宋体; ">秒。</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op></op></span></p><p class="MsoNormal"><span class="Apple-style-span" style="font-family: 宋体; font-size: 16px; "><span class="Apple-style-span" style="font-family: Arial; font-size: 14px; "></span><br/></span></p><p class="MsoNormal"></p><p class="MsoNormal"><span style="font-size: 12pt; font-family: 宋体; ">具体命令如下<span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; "></span></span></p><p class="MsoNormal"><span style="font-size: 12pt; font-family: 宋体; "><span class="Apple-style-span" style="font-family: Verdana; font-weight: bold; ">genkeys<span>
" ]& Q. p( r, [5 Z( h                                </span>–r<span>: K5 P$ h* l" R
                                </span>wordlist.txt<span>$ X0 t- y8 B9 ~8 n( a
                                </span>–f<span>
1 m) J" a' F* y7 {3 ]) i' L. e                                </span>wordlist.dat<span>5 Z. M! l. H. A
                                </span>-n<span>
- c8 s4 [! Q7 W                                </span>wordlist.idx<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; ">3 H  N# h& H, e1 G# v, h
                                </span></span></span></p><p class="MsoNormal"><span style="font-size: 12pt; font-family: 宋体; ">参数解释:<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">. O( A8 c+ |1 ^" n5 G5 a! Y7 G
                        </span></span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">-r<span>
1 I: p/ R) I+ |* D                        </span>wordlist<span>, Y  i% a# _* _
                        </span>wordlist</span><span style="font-size: 12pt; font-family: 宋体; ">为事先制作的字典文件;<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">
( {! }" g0 v3 l, A                        </span></span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">-f<span>$ _, E2 b! I! P4 P7 H1 J) q
                        </span>word.dat<span># v% ?$ |& z  `: q9 b5 ?2 p  B0 r
                        </span></span><span style="font-size: 12pt; font-family: 宋体; ">将事先制作的字典文件转换成</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">dat</span><span style="font-size: 12pt; font-family: 宋体; ">文件,文件名可相同;</span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">-n<span>
8 i" r2 \7 ]% P: H8 x                        </span>word.idx<span>
& p+ \. w3 a% H  ?9 N                        </span></span><span style="font-size: 12pt; font-family: 宋体; ">将事先制作的字典文件转换成</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">idx</span><span style="font-size: 12pt; font-family: 宋体; ">文件</span><span style="font-size: 12pt; font-family: 宋体; ">,</span><span style="font-size: 12pt; font-family: 宋体; ">文件名可相同;</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op></op></span></p><p class="MsoNormal"></p><p class="MsoNormal"><b><span style="font-size: 12pt; font-family: 宋体; ">步骤</span></b><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">10</span></b><b><span style="font-size: 12pt; font-family: 宋体; ">:</span></b><span style="font-size: 12pt; font-family: 宋体; ">下来,就可以使用</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">asleap</span><span style="font-size: 12pt; font-family: 宋体; ">对截获到的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PTP VPN</span><span style="font-size: 12pt; font-family: 宋体; ">交互</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Hash</span><span style="font-size: 12pt; font-family: 宋体; ">进行破解了。</span><span style="font-size: 12pt; font-family: Verdana; "><br/>
" Z0 t9 Z, Y6 D" \0 C3 Q, W  A                </span><span style="font-size: 12pt; font-family: 宋体; ">命令如下:<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">/ q1 {- m+ c, K; X3 s( P$ q5 r
                        </span></span></p><p class="MsoNormal"><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">asleap<span>; J) M) `5 H! K$ t
                                </span>-C Challenge<span>+ e+ ?, N, `: ?( M5 g" s, D
                                </span>-R Response<span>
. u' i' f* F& J2 v# v7 y/ A2 Z                                </span>-f wordlist.dat  –n  wordlist.idx<span>4 n5 L/ D! i! I; \  ~2 F. Z
                                </span>–v<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; font-weight: normal; ">
! m+ @& ^% c8 r' @; g; h9 d* Y: f                                </span></span></b></p><p class="MsoNormal"><span style="font-size: 12pt; font-family: 宋体; ">参数解释:<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">1 r# F, [% `$ A, }
                        </span></span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">-C<span>
4 E+ \' W' z' d  _                        </span>Challenge Hash<span>0 `; [# W6 m4 W# s
                        </span></span><span style="font-size: 12pt; font-family: 宋体; ">此处输入截获到的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN Challenge Hash</span><span style="font-size: 12pt; font-family: 宋体; ">内容<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">: j& T& @! h$ h9 J+ s
                        </span></span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">-R<span>
$ C2 U3 w. F) A  t1 ^                        </span>Response Hash<span>2 c; O' F- W8 \3 I# ?
                        </span></span><span style="font-size: 12pt; font-family: 宋体; ">此处输入截获到的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN Response Hash </span><span style="font-size: 12pt; font-family: 宋体; ">内容<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">
3 Q; f- c$ t, q5 q* y) v1 I# B                        </span></span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">-f<span>
% L- Y1 d0 W& O* {- j                        </span>wordlist.dat<span>
1 t& t3 ^4 R0 v( y8 q( z! {7 A                        </span></span><span style="font-size: 12pt; font-family: 宋体; ">跟上前面生成的字典转换</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">dat</span><span style="font-size: 12pt; font-family: 宋体; ">文件<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">% t5 e) v+ M* o# ^
                        </span></span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">-n<span>, r0 G0 L. N1 j4 y( o: V
                        </span>wordlist.idx<span>3 [1 P1 V6 {, q6 O2 i' L' L) S
                        </span></span><span style="font-size: 12pt; font-family: 宋体; ">跟上前面生成的字典转化</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">idx</span><span style="font-size: 12pt; font-family: 宋体; ">文件<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">" z% c: |; a/ X* |1 E6 w
                        </span></span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">-v<span>
2 T: Y2 p; A) L2 W                        </span><span>
' K8 l4 v+ q' |2 E                        </span></span><span style="font-size: 12pt; font-family: 宋体; ">该参数为显示详细破解过程,可选<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">+ r0 {7 W6 U+ K4 t# h( N
                        </span></span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op><span class="Apple-style-span" style="font-family: 宋体; "><span style="font-size: 12pt; font-family: 宋体; ">这里就会用到在步骤</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">8</span><span style="font-size: 12pt; font-family: 宋体; ">中捕获到的</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Hash</span><span style="font-size: 12pt; font-family: 宋体; ">,提取后如下:<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">
+ g% K. D" {8 N3 Z* ?# s                                                </span></span></span></op></span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; "><op>Tunnel<br/>PTP: 192.168.113.78 -&gt; 192.168.113.3<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">- w9 g( g6 i- l/ b+ \# m
                                </span></op></span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">PP<br/>: MS-CHAP Password:<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">
8 t! u, M# p/ N; f! S                        </span></span></p><p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">admin:"":"":000000000000000000000000000000000000000000000000:51F79B60C8D68BD9DE5D31E4EB92F3F59D058011FE21A06A:CF06BFA79F8ADC3E<op></op></span></p><br/>* i+ R) a  r% @  [1 j7 g
        <span class="Apple-style-span" style="font-family: Verdana; font-size: 16px; "><span class="Apple-style-span" style="font-family: 宋体; "><span style="font-size: 12pt; font-family: 宋体; ">其中</span><span style="font-size: 12pt; font-family: 宋体; ">:</span></span></span>
1 f% O5 ~7 Z7 Y! g- G6 _$ E9 P$ s        <p class="MsoNormal"><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Chanllenge</span><span style="font-size: 12pt; font-family: 宋体; ">挑战</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">Hash</span><span style="font-size: 12pt; font-family: 宋体; ">为<span class="Apple-style-span" style="font-family: Arial; font-size: 14px; ">
% a  ~* d$ y# M: c6 Z. Q                                <span class="Apple-style-span" style="font-family: Verdana; font-size: 16px; ">51F79B60C8D68BD9DE5D31E4EB92F3F59D058011FE21A06A</span></span></span></p><span lang="T-BR" style="font-size: 12pt; font-family: Verdana; ">Response </span><span style="font-size: 12pt; font-family: 宋体; ">响应</span><span lang="T-BR" style="font-size: 12pt; font-family: Verdana; ">Hash</span><span style="font-size: 12pt; font-family: 宋体; ">为</span><span lang="PT-BR" style="font-size: 12pt; font-family: Verdana; ">CF06BFA79F8ADC3E</span><br/><br/>
, z' c2 G% W1 z2 q& d5 V        <span style="font-size: 12pt; font-family: 宋体; ">如下图,可以看到,直接破解出当前</span><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">VPN</span><span style="font-size: 12pt; font-family: 宋体; ">用户登陆密码为</span><b><span lang="EN-US" style="font-size: 12pt; font-family: Verdana; ">haha23#</span></b><span style="font-size: 12pt; font-family: 宋体; ">,</span><p class="MsoNormal"><br/></p><p class="MsoNormal"></p><p><font size="3">我是<strong>ZerOne安全小组组长</strong>  Q( h' [- w, e* U
                        <font color="#0968f7" size="4"><strong>Christopher  Yang</strong></font>,</font><font size="3">以上为<font color="#000000" size="4"><strong>ZerOne Security Team</strong></font>无线研究技术成果的VPN方面基础内容,此为吸引更多具备真正研究、探讨精神及交流之心的朋友进入无线安全领域所发,也希望此文可加深大家体会无线安全领域发展形势。呵呵,这也是对一些有所期待的朋友们的一个回馈,希望大家喜欢。拒绝口水,欢迎据理力争。</font></p><p></p>[em05]
5 ?# o  {) i* g8 o
[此贴子已经被作者于2008-5-11 11:43:02编辑过]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册 微信登录

x
Hacking is a state of mind......
已陆续编写出版《无线网络安全攻防实战》《无线网络安全攻防实战进阶》等7本无线安全系列书籍,2017新书正在筹备中,感谢支持与肯定
回复

使用道具 举报

1115

回帖

1万

积分

163 小时

在线时间

超级版主

ZerOne无线安全研究组织 Leader

终身荣誉版主杰出会员技术达人终身荣誉会员

注册时间
2006-5-18
金币
7935 个
威望
175 个
荣誉
52 个
累计签到:3 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2008-5-10 11:30 |显示全部楼层
<p>虽然麻烦,但终于上图完毕。嘿嘿。</p><p></p>[em05]
9 [! r- d2 ~  Q4 s) E
[此贴子已经被作者于2008-5-11 11:43:58编辑过]
Hacking is a state of mind......
已陆续编写出版《无线网络安全攻防实战》《无线网络安全攻防实战进阶》等7本无线安全系列书籍,2017新书正在筹备中,感谢支持与肯定
回复

使用道具 举报

1115

回帖

1万

积分

163 小时

在线时间

超级版主

ZerOne无线安全研究组织 Leader

终身荣誉版主杰出会员技术达人终身荣誉会员

注册时间
2006-5-18
金币
7935 个
威望
175 个
荣誉
52 个
累计签到:3 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2008-5-10 11:31 |显示全部楼层
占位编辑[em05]
回复

使用道具 举报

219

回帖

1237

积分

46 小时

在线时间

上尉

注册时间
2008-3-4
金币
989 个
威望
2 个
荣誉
0 个

尚未签到

发表于 2008-5-10 11:58 |显示全部楼层
<p>虽然用不太到,但想说额是辛苦了</p>
回复

使用道具 举报

7420

回帖

4万

积分

1万

在线时间

管理员

无线论坛管理员

注册时间
2004-10-2
金币
35084 个
威望
404 个
荣誉
114 个
累计签到:119 天
连续签到:3 天
[LV.200]无线新星
发表于 2008-5-10 14:35 |显示全部楼层
<p>连VPN都不安全了。。。。。以后无线网络靠什么来维护安全呢?期待朋友们有较好的安全解决方法</p>
回复

使用道具 举报

1115

回帖

1万

积分

163 小时

在线时间

超级版主

ZerOne无线安全研究组织 Leader

终身荣誉版主杰出会员技术达人终身荣誉会员

注册时间
2006-5-18
金币
7935 个
威望
175 个
荣誉
52 个
累计签到:3 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2008-5-10 17:09 |显示全部楼层
别担心,VPN也有很多种的,虽然大部分不太安全,但总有安全的。
Hacking is a state of mind......
已陆续编写出版《无线网络安全攻防实战》《无线网络安全攻防实战进阶》等7本无线安全系列书籍,2017新书正在筹备中,感谢支持与肯定
回复

使用道具 举报

451

回帖

5819

积分

406 小时

在线时间

中校

注册时间
2007-2-13
金币
5199 个
威望
17 个
荣誉
0 个
累计签到:11 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2008-5-10 20:43 |显示全部楼层
<p>安全永远是相对的啊.经典</p>
回复

使用道具 举报

700

回帖

1万

积分

107 小时

在线时间

VIP

终身荣誉会员终身荣誉版主

注册时间
2007-12-8
金币
11440 个
威望
28 个
荣誉
0 个

尚未签到

发表于 2008-5-11 00:52 |显示全部楼层
版主要么潜水,一发贴就是经典帖!
回复

使用道具 举报

383

回帖

1273

积分

78 小时

在线时间

上尉

注册时间
2008-5-4
金币
786 个
威望
17 个
荣誉
0 个
累计签到:1 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2008-5-11 02:13 |显示全部楼层
有能破中国电信的WLAN方法吗?
回复

使用道具 举报

1115

回帖

1万

积分

163 小时

在线时间

超级版主

ZerOne无线安全研究组织 Leader

终身荣誉版主杰出会员技术达人终身荣誉会员

注册时间
2006-5-18
金币
7935 个
威望
175 个
荣誉
52 个
累计签到:3 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2008-5-11 11:46 |显示全部楼层
问人不如先问己,关于电信的WLAN的背景你知道多少?有没有花上几天去查相关资料?
Hacking is a state of mind......
已陆续编写出版《无线网络安全攻防实战》《无线网络安全攻防实战进阶》等7本无线安全系列书籍,2017新书正在筹备中,感谢支持与肯定
回复

使用道具 举报

46

回帖

218

积分

18 小时

在线时间

少尉

注册时间
2008-4-26
金币
160 个
威望
1 个
荣誉
0 个
累计签到:1 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2008-5-11 13:49 |显示全部楼层
学习了。[em01]
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册 微信登录

本版积分规则

站点统计 | Archiver | 手机版 | 无线门户 ( 粤ICP备11076993号|粤公网安备44010602008359号 ) |网站地图

GMT+8, 2024-12-22 14:49

返回顶部 返回列表