Network Security—Simulating IP Proxy to Hide Identity

Use the ancient ccproxy to implement the proxy server,For experimental purposes only, it is prohibited to do illegal and criminal things, and you will be responsible for the consequences.

Network topology

All use Windows Server 2003 systems


  • Router
    external network IP: Use NAT mode
    IP = automatically allocated by DHCP or manually allocated by yourself to connect to the external network.
    DNS = 223.5.5.5
    Internal IP: Use host-only mode
    IP = 172.16.29.1
    DNS = 223.5.5.5

  • Proxy server, using host-only mode
    IP = 172.16.29.2;
    Gateway = 172.16.29.1;
    DNS = 223.5.5.5

  • Client, using host-only mode
    IP = 172.16.29.3;
    Gateway = 172.16.29.1;
    DNS = 223.5.5.5

  • Hacker, using host-only mode
    IP = 172.16.29.4;
    Gateway = 172.16.29.1;
    DNS = 223.5.5.5

Note: Remember to manually fill in the DNS domain name for each host. Otherwise, you won’t be able to access the Internet

Install

Click to download Baidu Share! For experimental purposes only!
Extraction code: 2391

  • Install the software on the proxy server and continue to the next step.
    If a port conflict occurs, you can try to turn off the conflicting software: open cmd, enter netstat -an. If port 25 is occupied, remember the name of the software, open the process section of the task manager, and find the corresponding software. Just turn it off. For example, in the picture below, port 25 is occupied by an exe program of my IIS, so I have to turn off IIS first and enable the proxy server to let it use port 25 first.
    Insert image description here
    If it is successfully opened and no outgoing port is reported to be occupied, remember to restart the IIS service.

  • Start the IIS service
    Insert image description here
    Insert image description here

  • If there is no IIS, it means you have not installed it. The picture below is to start installing the IIS service. If it is already installed, you can skip this step.
    Insert image description here
    Click Add/Remove Components
    Insert image description here
    . Find and click the application server, and then click Details

Insert image description here
Just check the IIS service, then go back and follow the instructions to install it.

Insert image description here
Now make sure the IIS service is turned on

use

Proxy server settings

After the installation is completed, it is best to click stop and then start again, because your port may have been occupied before, and it is opened by default, so it may not be successfully opened.

  • Click Account to set up a new user and select within the allowed range.allow part
    Insert image description here
  • Select the login method. Here I choose the username and password to log in.
    Insert image description here
  • Click to create a new user (in this screenshot, I have already created a user. You must not have it when you just installed it, so you need to create a new one)
    Insert image description here
  • Set the username and password. There is no format requirement here (remember, after the Hacker machine proxy is set up later, when you are ready to enter the URL to access the Internet, a login box will pop up. Enter your username and password).
    Insert image description here
    Confirm after the settings are completed.

Hidden settings

  • First ping the proxy server (that is, make sure your network topology connection is OK)
    Insert image description here

  • Open IE browser->Select Tools->Internet Options
    Insert image description here

  • Connection->LAN Settings

Insert image description here

  • Check the two pictures below, then set the proxy server IP address, and then set the port number to 8080

Explanation: Because our proxy server does not set a proxy for any port, all Internet traffic from the Hacker machine will be logged in through the proxy server later. You can log in only once. Port 8080 is used for WWW proxy service.

Insert image description here

  • Now the Hacker machine can access the Internet through the proxy server, so now we try to access the Baidu web page. A pop-up will pop
    up for you to log in. You enter the user name and password you just set
    Insert image description here
    and wait. The process is a bit slow. IE has an old problem. At this point, the basic configuration is completed. , you can try changing to another browser.
    Insert image description here

  • After entering the account password, you can open it. If it doesn't work, change a browser. (If I change the browser here, the interface for you to log in will still pop up)

Insert image description here
Insert image description here

  • at lastOn the Hidden Hacker MachineFrom the above packet capture, we can find that we all interact with the proxy server for data packets, and no other devices are involved. This completes a simple identity hiding.
    Insert image description here

Guess you like

Origin blog.csdn.net/weixin_60521036/article/details/135335628