Pages

Jumat, 11 November 2011

隐藏IP Address Hide IP Address

隐藏IP Address不论在入侵或防卫方面都非常有用处! Hide IP Address regardless of invasion or defense are very useful!
首先我们要明白到Internet上的计算机是如何沟通的。 First, we need to understand how a computer on the Internet to communicate. Internet上有两种计算机,一是Server,是提供服务的计算机,二是Client,亦即是我们,而我们会使用Server提供的服务。 There are two computers on the Internet, one Server, is to provide computer services, and second, Client, which is us, and we will use the Server services. 当我们要使用服务时,我们会把我们所要的服务及IP Address告诉Server。 When we want to use the service, we will service and we want to tell IP Address Server. Server 接收后便会把服务传送到我们的IP Address,所以我们使用Server的服务时,Server是一定要知道我们的IP Address。 Server will after receiving our service delivery to the IP Address, so we use the Server's service, Server is that we must know our IP Address.

要把自己的IP Address完全隐藏起来是不可能的,因没有人知道我们的IP Address,外面便没有人能连接到我们的计算机,唯一可行的方法便是在我们和Server的连接中加一部计算机,即是我们连接A计算机,A计算机再连接Server去提取服务,当中我们只会把自己的IP Address告诉A计算机,而Server也只知道A计算机的IP Address,我们是没有和Server有任何连接,这样我便把IP Address隐藏了。 Put their own IP Address is impossible to completely hide, because no one knows our IP Address, no one outside can connect to our computer, the only feasible way is to connect us and the Server, plus one of computers, that is, we connect A computer, A computer then connect Server to extract the service, which we will tell their own IP Address A computer, and Server A computer only knows the IP Address, and Server we do not have any connection, so I put the IP Address hidden.

而我会用来隐藏IP Address的方法有三,第一,使用Proxy Server,第二,使用WinGate Server,第三,使用木马程序。 I used to hide the IP Address will be three ways, first, to use Proxy Server, the second, the use of WinGate Server, third, the use of Trojans.

[使用Proxy Server] [Use Proxy Server]

Proxy Server的意思是代理服务器。 Proxy Server means that the proxy server. 一般来说,你要看网页时,你会直接连上那儿的伺服器,然后服务器把网页的档案传送给你,在浏灠器显示出来。 In general, you want to see web page, where you will be directly connected to the server and the server to send the file to your web page, displayed in the Viewing device. 但由于网络连接的关系,服务器未必能马上把网页传送给你,而你也未必能及时接收,因而影响了速度。 However, due to network connection between the web server may not be immediately sent to you, and you may not be able to receive a timely manner, thus affecting the speed.

但用了Proxy Server后,Proxy Server会先为你把网页下载,再把网页传送给你,若Proxy Server不是有太多人用的话,是会有助浏灠速度的(这应是Proxy Server的主要用途)。 But after using the Proxy Server, Proxy Server will be for you to download web pages, and then sent to your web page, if the Proxy Server is not too many people use it, will help Viewing speed (which should be the Proxy Server the main purpose). 由于你使用浏灠器所做的一切都会经Proxy Server再发出的,所以提供网页的伺服器不会与你的计算机有连接,那即是你在浏灠器上所做的一切都隐藏了IP Address。 Viewing device because you use everything will be re-issued by the Proxy Server, so the web server will not provide your computer with a connection, that means you're doing on the Viewing all hidden IP Address. 最常用的是用在聊天室,留言版。 The most commonly used in chat rooms and message boards. 当然也可用在其它地方......(还未想到:P)。 Of course, not available elsewhere ......( think: P).

在防卫方面,有一些聊天室,是会把一些使用者的IP Address显示出来,有一些人便会Nuke一些看不顺眼的人,让那人当机,但若用了Proxy Server,在聊天室显示出来的只是Proxy Server的IP Address,所以根本就Nuke不到,在这情况Proxy Server便起了防卫作用,隐藏了IP Address了。 In the defense side, there are some chat rooms are some of the user's IP Address will be displayed, some people will dislike Nuke number of people, so that people crash, but if using a Proxy Server, in a chat room display only the Proxy Server's IP Address, it is simply not Nuke, Proxy Server in this case played a defensive role will be to hide the IP Address of the.

在攻击方面,例如在留言版上也可作隐藏IP Address的用途,就例如炸人家的留言版, 就算人家的留言版能显示IP Address,也只是显示了Proxy Server的IP Address,除非版主入侵Proxy Server从记录文件找回你的IP Address,否则根本不可能知道是谁攻击留言版的(知道后也不要炸人家的留言版)。 In the attacks, such as message boards may also hide the IP Address for the purpose, such as bombing people on message boards, message boards even if people can show IP Address, only shows the Proxy Server's IP Address, unless the moderator invasion Proxy Server log files back from your IP Address, otherwise it is impossible to know who is attacking the message board (do not know that fried after other people's message boards).

有关如何设定使用Proxy Server,我不多说了,自己去看一些有关使用浏灠器的书藉吧! 真的没有辨法便Email问我吧。 About how to set up to use Proxy Server, I will not say that he used to see some of the books Viewing device it! Email it really is not the method of asking me. 而那里可找到Proxy Server呢?先看看自己的ISP有没有提供(多是没有)。 The Proxy Server can be found there, it? Take a look at your ISP has not provided (mostly not). 其次可到一些大学找一下,大学多数都会提供Proxy Server的,但有很多都不是公开的,要得到便要靠自己了。 Secondly, to find what some universities, the University will provide the majority of the Proxy Server, but many are not open to the public to get it on your own. 若果还是找不到,最后可到一些骇客网站找一下,较专业的骇客网站便会有了,有一些有心人都会把自己找来的Proxy Server以列表方式公开和大家分享,但说到Proxy Server列表的话......还是外国的骇客网站较多,懂英文的便去找吧,一定多至连你存盘也来不及。 If this fails, which may eventually find that some hacker website look more professional hackers will have a website, there are some caring people will be recruited to the Proxy Server in their own way to open and share the list, but when it comes Proxy Server List words ...... or more foreign hackers site, understand English, they find it, you will save even more to have enough time.

找到后记得把全部的Proxy Server都Ping一下,选个最快的来用。 Find and be sure to have all of the Proxy Server Ping look, choose a fastest to use.

这里,我把我找到的Proxy Server列表和大家分享,但不知还有多少可以使用...... Here, I find my Proxy Server list and share, but I do not know how many you can use ......

207.69.48.245:8080 inktomi.efortress.com:8080 147.72.64.11:8080 12.18.55.130:1080 interglion.glion.ch:8080 24.88.1.116:8080 155.158.248.254:8080 log01.sttl01.exodus.net:8081 proxy.imp.mx:8080 24.113.31.226:8080 proxy.unipi.it:8080 proxy.hispeed.ch:8080 209.150.128.76:8081 proxy.rz.uni-jena.de:8080 pax02f.mipool.uni-jena.de:3128 proxy.spaceproxy.com:8080 gip-santiago-cache-1.gip.net:8080 proxy.12move.nl:8080 192.116.2.98:3128 12.26.8.18:1080 134.50.253.13:3128 207.114.8.11:1080 proxy.soneraplaza.nl:8080 mail.zenith-entertainment.co.uk:1080 212.187.37.2:8080 proxy.p-ol.com:3128 proxy.one.net.au:8080 152.158.104.61:8001 squid.svic.net:8080 212.35.34.198:8080 hs1a09h01-e0.dplanet.ch:8080 cache0.cable.net.co:8080 196.27.25.242:8080 gisserver1.date.hu:1080 ns.netlogics.nl:3128 proxy.cec.unap.cl:8080 proxy1.spaceproxy.com:8080 proxy2.worldcom.ch:3128 proxy.nextra.sk:8080 proxy.aha.ru:3128 proy.imp.mx:8080 147.72.64.11:8080 12.18.55.130:1080 proxy.neobee.net:8080 proxy.turk.net:8080 cache.jet.msk.su:8080 proxy.jwu.edu:1080 cache.tele2.ee:8080 cache.neti.ee:8080 155.158.248.254:8080 193.219.28.2:8080 proxy.spaceproxy.com:8080 proxy2.spaceproxy.com:8080 c18743224.telekabel.chello.nl:1080 hokuto.ed.jp:1080 194.225.24.33:1080 ns.namioka-namioka-j.ed.jp:8080 first.nstu.ru:8080 alt.proxy.dux.ru:8080 proxy.qatar.net.qa:8080 cfpoasis.qc.ca:1080 proxy1.spaceproxy.com:8080 proxy5.gvcl1.bc.home.com:8080 proxy.ptt.yu:8080 210.160.74.114:8080 cache1.indosat.net.id:8001 202.155.27.18:8001 209.187.13.18:1080 12.29.40.3:1080 216.84.78.3:8080 cacheflow.sunline.net:8080 proxy1.byu.edu:8000 proxy.rdsor.ro:8080 proxy.gerrys.net:8080 196.27.25.242:8080 cacheflow3.sasknet.sk.ca:8081 proxy.imp.mx:8080 198.68.22.33:8080 proxy.jwu.edu:1080 ch1smc.bellglobal.com:8081 proxy.nextra.sk:8080 203.26.36.20:8080 chemedu.utb.kau.se:8080 proxy.one.net.au:8080 210.229.194.18:1080 gisserver1.date.hu:1080 ns.mobtel.com:1080 chat.wavetech.co.uk:1080 hokuto.ed.jp:1080 c18743224.telekabel.chello.nl:1080 134.50.253.13:3128 ch2smc.bellglobal.com:8081 proxy.p-ol.com:3128 210.160.138.130:8080 64.71.130.80:8083 147.72.64.11:8080 24.113.31.226:8080 194.140.1.2:8080 24.131.128.11:8080 152.158.104.61:8001 proxy.skynet.be:8080 pax02f.mipool.uni-jena.de:3128 207.69.48.245:8080 inktomi.efortress.com: 8080 147.72.64.11:8080 12.18.55.130:1080 interglion.glion.ch: 8080 24.88.1.116:8080 155.158.248.254:8080 log01.sttl01.exodus.net: 8081 proxy. imp.mx: 8080 24.113.31.226:8080 proxy.unipi.it: 8080 proxy.hispeed.ch: 8080 209.150.128.76:8081 proxy.rz.uni-jena.de: 8080 pax02f.mipool.uni-jena.de: 3128 proxy.spaceproxy.com: 8080 gip-santiago-cache-1.gip.net: 8080 proxy.12move.nl: 8080 192.116.2.98:3128 12.26.8.18:1080 134.50.253.13:3128 207.114.8.11:1080 proxy. soneraplaza.nl: 8080 mail.zenith-entertainment.co.uk: 1080 212.187.37.2:8080 proxy.p-ol.com: 3128 proxy.one.net.au: 8080 152.158.104.61:8001 squid.svic.net: 8080 212.35.34.198:8080 hs1a09h01-e0.dplanet.ch: 8080 cache0.cable.net.co: 8080 196.27.25.242:8080 gisserver1.date.hu: 1080 ns.netlogics.nl: 3128 proxy.cec.unap.cl : 8080 proxy1.spaceproxy.com: 8080 proxy2.worldcom.ch: 3128 proxy.nextra.sk: 8080 proxy.aha.ru: 3128 proy.imp.mx: 8080 147.72.64.11:8080 12.18.55.130:1080 proxy.neobee . net: 8080 proxy.turk.net: 8080 cache.jet.msk.su: 8080 proxy.jwu.edu: 1080 cache.tele2.ee: 8080 cache.neti.ee: 8080 155.158.248.254:8080 193.219.28.2: 8080 proxy.spaceproxy.com: 8080 proxy2.spaceproxy.com: 8080 c18743224.telekabel.chello.nl: 1080 hokuto.ed.jp: 1080 194.225.24.33:1080 ns.namioka-namioka-j.ed.jp: 8080 first . nstu.ru: 8080 alt.proxy.dux.ru: 8080 proxy.qatar.net.qa: 8080 cfpoasis.qc.ca: 1080 proxy1.spaceproxy.com: 8080 proxy5.gvcl1.bc.home.com: 8080 proxy . ptt.yu: 8080 210.160.74.114:8080 cache1.indosat.net.id: 8001 202.155.27.18:8001 209.187.13.18:1080 12.29.40.3:1080 216.84.78.3:8080 cacheflow.sunline.net: 8080 proxy1.byu . edu: 8000 proxy.rdsor.ro: 8080 proxy.gerrys.net: 8080 196.27.25.242:8080 cacheflow3.sasknet.sk.ca: 8081 proxy.imp.mx: 8080 198.68.22.33:8080 proxy.jwu.edu: 1080 ch1smc.bellglobal.com: 8081 proxy.nextra.sk: 8080 203.26.36.20:8080 chemedu.utb.kau.se: 8080 proxy.one.net.au: 8080 210.229.194.18:1080 gisserver1.date.hu: 1080 ns.mobtel.com: 1080 chat.wavetech.co.uk: 1080 hokuto.ed.jp: 1080 c18743224.telekabel.chello.nl: 1080 134.50.253.13:3128 ch2smc.bellglobal.com: 8081 proxy.p-ol. com: 3128 210.160.138.130:8080 64.71.130.80:8083 147.72.64.11:8080 24.113.31.226:8080 194.140.1.2:8080 24.131.128.11:8080 152.158.104.61:8001 proxy.skynet.be: 8080 pax02f.mipool.uni -jena.de: 3128

[使用WinGate Server] [Use the WinGate Server]

大家知道Telnet是什么吗?它可用来远程登入服务器作遥远控制。 We all know that Telnet is? It can be used to remote login server for remote control. 是很多骇客入侵是会用的工具,而使用Telnet时,服务器是会把登入者的IP Address记录下来,即是说万一入侵时被发现,警察是可从这IP Address找回入侵者的。 Many hackers will use the tool, use Telnet, the server is who will log the IP Address recorded, that in case of invasion was found, the police is back invaders from IP Address .

使用Proxy Server是可隐藏IP Address,但只限于网页上,那么使用Telnet时要怎样隐藏IP Address呢?其实和使用Proxy Server也是一样原理,只不过不是使用Proxy Server ,而是使用在Internet上普通的服务器。 Proxy Server is used to hide IP Address, but only on the page, then use Telnet How to hide IP Address when it? Fact and use Proxy Server is the same principle, but not using Proxy Server, but the use of the ordinary on the Internet the server. 骇客们首先会用Telnet登入Internet上的一部服务器,再在那服务器上使用Telnet去连接到目标计算机进行入侵,即是说他们入侵A计算机,再透过A计算机去入侵B计算机,这样B计算机只能记录A计算机的IP Address,而不能记录入侵者的IP Address,这样便达到隐藏IP Address的效果,这便是著名的[跳板隐藏法]。 Hackers will first log on the Internet with a Telnet server, and then on to that server using Telnet to connect to the target computer intrusion, that they invaded A computer, then go through the invasion of A Computer B Computer, so Computer A Computer B can only record the IP Address, the intruder can not record IP Address, this will hide the IP Address to the effect, which is known [springboard hidden method]. 而使用的跳板越多,Server要追寻入侵者便越困难,而入侵者便越安全。 More use of the springboard, Server will be more difficult to trace the intruder, and the intruder will be more secure.

但我们可以从那里找到这么多Server当跳板,总不可能先去入侵十多部计算机先吧。 But from where we can find so many Server as a springboard, the total can not go more than a dozen of computers before the invasion it. 所以我会使用WinGate Server来当跳板。 I will use the WinGate Server to as a springboard.

WinGate是一个让LAN网络内共享Modem上网的软件。 WinGate is a Modem to LAN network to share Internet access software. 它的工作原理是,让一部计算机当WinGate Server,而LAN网络内所有计算机都会先联机到WinGate Server,再对外联机出去。 It works, so that a computer when the WinGate Server, and all the computers within the LAN network will be the first line to the WinGate Server, and then out of foreign online. 但联机到WinGate Server是不须认证的,即是我们也可先联机到WinGate Server再对外联机,达到隐藏IP Address的效果。 However, on-line to the WinGate Server authentication is not required, that is, we can first line to the WinGate Server before the agency on-line, to hide the IP Address of the results.

首先我们要先找出WinGate Server,而我们可用[wGateScan3.0]这程序(自己去找!),开启程式后...... First, we must first identify the WinGate Server, and we can use [wGateScan3.0] This program (look for yourself!), Open the program after the ......

1.在[Hostname or IP]打上网址或一个IP Address,即[www.hongkong.com或202.84.12.12]。 1 In the [Hostname or IP] or a marked address IP Address, that is, [www.hongkong.com or 202.84.12.12]. 2.按[Del],然后下方会出现一段IP Address的Range,我们可自行修改Class C及Class D。 2 Press [Del], then there will be a lower IP Address of the Range, we are free to modify the Class C and Class D. 3.把[Scan the port]改成23。 3 the [Scan the port] into 23. 4.按[Scan],便会开始扫描,若找到WinGate Server在相同数据夹下会出现wgsfound.txt,内有找到WinGate Server的IP Address。 4 Press the [Scan], will begin to scan, if the data to find the WinGate Server in the same folder will appear wgsfound.txt, has found WinGate Server's IP Address.

这样我们便可开始使用WinGate Server了...... So that we can start to use WinGate Server has ......

1.在程序集-执行,打上telnet。 1 in the assembly - Executive, marked with telnet. 2.在Telnet程序上按联机-远程系统,[主机名称]上打上刚才找到的IP Address, [连接埠]打上[23],按[联机]。 2 according to the Telnet program on-line - remote system, [Host Name] have found marked on the IP Address, [Port] marked [23], press [online]. 3.然后会出现WinGate的提示符号[WinGate],然后可打上你要连接Server的IP Address ,例如[202.84.12.12]。 3 and then a prompt will appear WinGate [WinGate], then you may want to connect to Server, marked with IP Address, for example, [202.84.12.12].

而你这样连接到[202.84.12.12]是不会留下IP Address的,另外,联机中所使用的WinGate Server越多,[202.84.12.12]找回你真正的IP Address便越困难。 And you are so connected to the [202.84.12.12] will not leave IP Address, and the other, on-line in the WinGate Server using the more, [202.84.12.12] back your real IP Address will be more difficult.

WinGate Server的用处还不止这么小,其实WinGate Server会开启三个Port,23,80, 1080,Port 23是用作Telnet(上面说了),Port 80是用作看网页(可当Proxy Server喔!) ,而Port 1080是用作其它一切的联机......这个Port 1080的用途便留待大家发掘吧! WinGate Server also more than useful so small, in fact, WinGate Server will open three Port, 23,80, 1080, Port 23 is used for Telnet (above said), Port 80 is used as a look at page (when Proxy Server can be Oh! ), and Port 1080 is used as an online ...... all other uses of this Port 1080 will leave you to explore it!

我也把我找到的WinGate Server列表和大家分享,但好象很多己不能使用...... I found my list and share WinGate Server, but can not seem to have used a lot ......

207.69.48.245:23 209.86.76.238:23 shell.one.net:23 technobob.com:23 86.130.167.207.fastpoint.net:1080 a3g255ejy39ee.bc.hsia.telus.net:23 ppp72-52.pppcal.vsnl.net.in:1080 213.154.144.105:23 204.26.90.181:1080 165.21.25.39:23 209.85.241.101:23 193.231.251.249:23 alexis2-47-119.globetrotter.net:1080 193-231-251-249.cs.ro:23 ppp-09-43.cyberia.net.lb:1080 proxy.mta.ro:1080 ll-1.online.ro:23 lyo213245085038.chello.fr:23 24.226.165.246:1080 148.235.68.141:1080 proxy.cosinet.de:23 209-9-195-114.sdsl.cais.net:1080 bankpro.blue.aol.de:1080 195.0.13.123:1080 siia.uan.mx:23 som.com:23 proxy.indo.net.id:23 24.2.67.142:1080 24.2.67.13:1080 d212-151-254-202.swipnet.se:23 213.46.55.203:1080 t3o30p22.telia.com:1080 209.163.228.1:1080 172.177.219.181:1080 mercury.knowlbo.co.jp:23 210.160.144.146:23 202.158.28.196:23 202.158.28.191:23 165.21.25.39:23 202.158.28.38:23 202.158.28.96:23 202.158.28.114:23 gated1.ed1.pearsoned.co.jp:1080 nyc-29-f-18.nyc.dsl.cerfnet.com:1080 kasimo.com:23 212.151.238.122:23 kunde0362.alfanett.no:23 cvx-got-1-222.ppp.netlink.se:1080 ti26a61-0188.dialup.online.no:1080 darquaker.yi.org:23 196.27.25.242:23 millennium-ppp23.ccf.auth.gr:23 isp675.canb.dynamite.com.au:1080 202.61.76.2:1080 62.81.12.12:23 t2o956p105.telia.com:1080 203.167.6.6:23 la-2-105.cytanet.com.cy:1080 j17.mur32.jaring.my:1080 62.4.190.31:1080 207.195.38.194:1080 ppp72-73.pppcal.vsnl.net.in:1080 207-229-151-55.d.enteract.com:1080 cadillac.transcontinental.ca:23 daphas02-p29.mts.net:1080 ppp72-28.pppcal.vsnl.net.in:1080 y2k.pip.digsys.bg:1080 netcafe.apulum.ro:23 213.46.55.203:1080 obelisk.mpt.com.mk:1080 bankpro.blue.aol.de:1080 ns.sap.mbr.co.jp:1080 62.4.191.26:1080 ppp72-95.pppcal.vsnl.net.in:1080 ros-15-5.i-next.net:1080 gated1.ed1.pearsoned.co.jp:1080 webx.fl.us.solarchat.net:8000 spring.lgt.org.uk:1080 shell.one.net:23 mercury.knowlbo.co.jp:23 24.3.192.26:1080 62.108.5.179:23 209.187.13.18:1080 62.81.12.12:23 148.235.68.141:1080 24.2.162.132:1080 148.233.6.122:23 mail.secureaustin.com:8000 210.160.144.146:23 elektron.its.tudelft.nl:23 dont.trust.the.US-GOVT.org:8000 182-34.hy.cgocable.ca:1080 154.5.61.58:1080 porta-14.mp.com.mk:1080 181-196-cormier-56k.9bit.qc.ca:1080 ppp5492.qc.bellglobal.com:1080 090.0502.mel.iprimus.net.au:1080 207.253.110.39:1080 yul3034.dialin.netaxis.ca:1080 64.228.177.81:1080 208.247.131.11:23 207.69.48.245:23 209.86.76.238:23 shell.one.net: 23 technobob.com: 23 86.130.167.207.fastpoint.net: 1080 a3g255ejy39ee.bc.hsia.telus.net: 23 ppp72-52.pppcal.vsnl. net.in: 1080 213.154.144.105:23 204.26.90.181:1080 165.21.25.39:23 209.85.241.101:23 193.231.251.249:23 alexis2-47-119.globetrotter.net: 1080 193-231-251-249.cs . ro: 23 ppp-09-43.cyberia.net.lb: 1080 proxy.mta.ro: 1080 ll-1.online.ro: 23 lyo213245085038.chello.fr: 23 24.226.165.246:1080 148.235.68.141:1080 proxy.cosinet.de: 23 209-9-195-114.sdsl.cais.net: 1080 bankpro.blue.aol.de: 1080 195.0.13.123:1080 siia.uan.mx: 23 som.com: 23 proxy. indo.net.id: 23 24.2.67.142:1080 24.2.67.13:1080 d212-151-254-202.swipnet.se: 23 213.46.55.203:1080 t3o30p22.telia.com: 1080 209.163.228.1:1080 172.177.219.181 : 1080 mercury.knowlbo.co.jp: 23 210.160.144.146:23 202.158.28.196:23 202.158.28.191:23 165.21.25.39:23 202.158.28.38:23 202.158.28.96:23 202.158.28.114:23 gated1.ed1. pearsoned.co.jp: 1080 nyc-29-f-18.nyc.dsl.cerfnet.com: 1080 kasimo.com: 23 212.151.238.122:23 kunde0362.alfanett.no: 23 cvx-got-1-222.ppp . netlink.se: 1080 ti26a61-0188.dialup.online.no: 1080 darquaker.yi.org: 23 196.27.25.242:23 millennium-ppp23.ccf.auth.gr: 23 isp675.canb.dynamite.com.au: 1080 202.61.76.2:1080 62.81.12.12:23 t2o956p105.telia.com: 1080 203.167.6.6:23 la-2-105.cytanet.com.cy: 1080 j17.mur32.jaring.my: 1080 62.4.190.31:1080 207.195.38.194:1080 ppp72-73.pppcal.vsnl.net.in: 1080 207-229-151-55.d.enteract.com: 1080 cadillac.transcontinental.ca: 23 daphas02-p29.mts.net: 1080 ppp72 -28.pppcal.vsnl.net.in: 1080 y2k.pip.digsys.bg: 1080 netcafe.apulum.ro: 23 213.46.55.203:1080 obelisk.mpt.com.mk: 1080 bankpro.blue.aol.de: 1080 ns.sap.mbr.co.jp: 1080 62.4.191.26:1080 ppp72-95.pppcal.vsnl.net.in: 1080 ros-15-5.i-next.net: 1080 gated1.ed1.pearsoned.co . jp: 1080 webx.fl.us.solarchat.net: 8000 spring.lgt.org.uk: 1080 shell.one.net: 23 mercury.knowlbo.co.jp: 23 24.3.192.26:1080 62.108.5.179:23 209.187.13.18:1080 62.81.12.12:23 148.235.68.141:1080 24.2.162.132:1080 148.233.6.122:23 mail.secureaustin.com: 8000 210.160.144.146:23 elektron.its.tudelft.nl: 23 dont.trust. the.US-GOVT.org: 8000 182-34.hy.cgocable.ca: 1080 154.5.61.58:1080 porta-14.mp.com.mk: 1080 181-196-cormier-56k.9bit.qc.ca: 1080 ppp5492.qc.bellglobal.com: 1080 090.0502.mel.iprimus.net.au: 1080 207.253.110.39:1080 yul3034.dialin.netaxis.ca: 1080 64.228.177.81:1080 208.247.131.11:23

[使用木马程序] [Using Trojans]

上面也说过了,服务器是会把登入者的IP Address一一记录下来,只要从登入者的IP Address追寻下去,是一定可以追寻到入侵者,这就是为何可以找回[ILoveYou]病毒的发放者了。 Have said above, the server is who will log the IP Address record each, as long as those from the log down the IP Address search, you can certainly trace the intruder, which is why you can get back [ILoveYou] virus The distributors of. 虽然事实如此,但实际要这样做却极之困难,如你的ISP,每天过万人登入的记录文件,有谁有心情去看? Although this is true, but the actual extremely difficult to do, such as your ISP, over 10,000 daily log of the log file, who have the mood to see?

这就是为何要使用这么多的跳板才安全,但安全是安全了,但是还有两个问题...... This is why so many want to use a springboard for the safe, but safety is safety, but there are two issues ......

1.跳板越多,速度便越慢。 1. Springboard for more speed will be slower. 2.速度慢,便会浪费更多的时间,被人发现的机会便会增加了。 (2) slow, it will waste more time, the opportunity will be found to increase.

所以,速度和安全这两方面便要作出取舍了。 Therefore, both speed and security will have to make a choice.

但这是在使用Server当跳板才会有的问题,所以我们该使用不是Server的计算机来当跳板,而使用一般的Client计算机。 But this is only some of the Server when the springboard to the problem, so we are not Server computer to use as a springboard, the use of the general Client computer.

Client计算机是不会提供服务的,所以他是不能登入的。 Client computers will not provide services, so he can not login. 但只要我们能更改设定,令Client计算机变成Server计算机,便可拿来烦作跳板使用了。 But if we can change the settings so that the computer into a Client Server computer can be used to trouble as a springboard to use.

而变成Server计算机后又不会有记录文件记录IP Address,所以这种跳版只需一个便够了。 Server computer and then become no documented record of IP Address, so only one version of this jump will be enough. 另外如果对方是使用宽频的话,速度是会比使用WinGate Server更快喔!因WinGate Server是使用Modem上网嘛。 Also, if the other party is using broadband, then speed is faster than using the WinGate Server Oh! For WinGate Server is to use the Internet Modem thing.

首先我们要将Client计算机变成Server计算机,我们会使用一个叫LameRemote的木马程序(到http://i.am/devil下载),Client计算机执行后便变成Server计算机,由于这木马程序是使用Telnet作为Client程序,而他又提供再次的对外连接,所以我们可以用来作跳版。 First, we want to become a Client computer Server computer, we will use a Trojan horse program called LameRemote (to http://i.am/devil download), Client Server computer into a computer to perform after, because this is the use of Trojans Telnet as a Client program, and he also provided for external connection again, so we can be used as a jumping version.

1.让Client执行LameRemote。 1 to Client Executive LameRemote. 2.在程序集-执行,打上telnet。 2 in the assembly - Executive, marked with telnet. 3.在Telnet程序上按联机-远程系统,[主机名称]上打上Client计算机的IP Address, [连接埠]打上[6666],按[联机]。 3 according to the Telnet program on-line - remote system, [hostname] Client computers marked on the IP Address, [Port] marked [6666], press [online]. 4.出现[HELO],便代表己经联机,然后可打上[telnet [IP Address] [23]] ,例如[telnet 202.84.12.12 23]。 4 appear [HELO], it means that has been online, then be marked with [telnet [IP Address] [23]], for example, [telnet 202.84.12.12 23].

这种跳板,只需一个便够,而又绝对安全,那你可能会问,还要WinGate Server干吗?这是因为LameRemote有两个缺点,一是,Clent计算机关机后必须重新执行LameRemote才会变成Server,二是,我们不知道Client计算机何时上网。 This springboard, only one will be enough, but absolutely safe, you might ask, why should WinGate Server? This is because LameRemote two drawbacks, first, Clent computer shuts down only after the change must be re-run LameRemote into the Server, the second is, we do not know when the Client computer access. 这两个问题将于下一集讨论。 These two issues will be discussed next episode.

Tidak ada komentar:

Posting Komentar