Intranet tunnel proxy technology (9) introduction to application layer proxy technology

Application Layer Proxy Technology Introduction

Earlier we introduced some related concepts and tunneling technologies, mainly staying in the tunnel of a single port

  • 1. Rebound shell
  • 2. Port forwarding
  • 3. Port mapping

These all use ports to establish tunnels, but they cannot meet the requirements of our daily life

insert image description here

Adding that we need to scan the machines in the network, we cannot use port forwarding or port mapping, or the way of rebounding shells, so we need to build an application layer tunnel. The principle of the application layer tunnel is shown in the following figure:

insert image description here

The application layer proxy is our most commonly used proxy. It is often needed when performing intranet penetration or scanning. According to different protocols, there are roughly the following classifications:

  1. http proxy
  2. socks proxy
  3. ssh-agent
  4. DNS proxy
  5. Some custom protocols and encryption rules

The application scenarios of each agent are different, and different agents need to be selected in different scenarios. Next, let's look at the scenarios that require agents

Proxy Scenario Introduction

1. Public network asset scanning

We usually need to scan and detect the assets of the public network when doing penetration testing, but we are afraid that the other party will block your IP address, so we need to use a proxy

insert image description here

Guess you like

Origin blog.csdn.net/qq_64973687/article/details/131597599