Application Layer Proxy Technology Introduction
Earlier we introduced some related concepts and tunneling technologies, mainly staying in the tunnel of a single port
- 1. Rebound shell
- 2. Port forwarding
- 3. Port mapping
These all use ports to establish tunnels, but they cannot meet the requirements of our daily life
Adding that we need to scan the machines in the network, we cannot use port forwarding or port mapping, or the way of rebounding shells, so we need to build an application layer tunnel. The principle of the application layer tunnel is shown in the following figure:
The application layer proxy is our most commonly used proxy. It is often needed when performing intranet penetration or scanning. According to different protocols, there are roughly the following classifications:
- http proxy
- socks proxy
- ssh-agent
- DNS proxy
- Some custom protocols and encryption rules
The application scenarios of each agent are different, and different agents need to be selected in different scenarios. Next, let's look at the scenarios that require agents
Proxy Scenario Introduction
1. Public network asset scanning
We usually need to scan and detect the assets of the public network when doing penetration testing, but we are afraid that the other party will block your IP address, so we need to use a proxy