Article directory
Use the ancient ccproxy to implement the proxy server,For experimental purposes only, it is prohibited to do illegal and criminal things, and you will be responsible for the consequences.
Network topology
All use Windows Server 2003 systems
- Router
external network IP: Use NAT mode
IP = automatically allocated by DHCP or manually allocated by yourself to connect to the external network.
DNS = 223.5.5.5
Internal IP: Use host-only mode
IP = 172.16.29.1
DNS = 223.5.5.5
- Proxy server, using host-only mode
IP = 172.16.29.2;
Gateway = 172.16.29.1;
DNS = 223.5.5.5
- Client, using host-only mode
IP = 172.16.29.3;
Gateway = 172.16.29.1;
DNS = 223.5.5.5
- Hacker, using host-only mode
IP = 172.16.29.4;
Gateway = 172.16.29.1;
DNS = 223.5.5.5
Note: Remember to manually fill in the DNS domain name for each host. Otherwise, you won’t be able to access the Internet
Install
Click to download Baidu Share! For experimental purposes only!
Extraction code: 2391
-
Install the software on the proxy server and continue to the next step.
If a port conflict occurs, you can try to turn off the conflicting software: open cmd, enter netstat -an. If port 25 is occupied, remember the name of the software, open the process section of the task manager, and find the corresponding software. Just turn it off. For example, in the picture below, port 25 is occupied by an exe program of my IIS, so I have to turn off IIS first and enable the proxy server to let it use port 25 first.
If it is successfully opened and no outgoing port is reported to be occupied, remember to restart the IIS service. -
Start the IIS service
-
If there is no IIS, it means you have not installed it. The picture below is to start installing the IIS service. If it is already installed, you can skip this step.
Click Add/Remove Components
. Find and click the application server, and then click Details
Just check the IIS service, then go back and follow the instructions to install it.
Now make sure the IIS service is turned on
use
Proxy server settings
After the installation is completed, it is best to click stop and then start again, because your port may have been occupied before, and it is opened by default, so it may not be successfully opened.
- Click Account to set up a new user and select within the allowed range.allow part
- Select the login method. Here I choose the username and password to log in.
- Click to create a new user (in this screenshot, I have already created a user. You must not have it when you just installed it, so you need to create a new one)
- Set the username and password. There is no format requirement here (remember, after the Hacker machine proxy is set up later, when you are ready to enter the URL to access the Internet, a login box will pop up. Enter your username and password).
Confirm after the settings are completed.
Hidden settings
-
First ping the proxy server (that is, make sure your network topology connection is OK)
-
Open IE browser->Select Tools->Internet Options
-
Connection->LAN Settings
- Check the two pictures below, then set the proxy server IP address, and then set the port number to 8080
Explanation: Because our proxy server does not set a proxy for any port, all Internet traffic from the Hacker machine will be logged in through the proxy server later. You can log in only once. Port 8080 is used for WWW proxy service.
-
Now the Hacker machine can access the Internet through the proxy server, so now we try to access the Baidu web page. A pop-up will pop
up for you to log in. You enter the user name and password you just set
and wait. The process is a bit slow. IE has an old problem. At this point, the basic configuration is completed. , you can try changing to another browser.
-
After entering the account password, you can open it. If it doesn't work, change a browser. (If I change the browser here, the interface for you to log in will still pop up)
- at lastOn the Hidden Hacker MachineFrom the above packet capture, we can find that we all interact with the proxy server for data packets, and no other devices are involved. This completes a simple identity hiding.