⚠ UNAUTHORIZED ACCESS GET /api/users HTTP/1.1 192.168.1.105:8080 ! FIREWALL BREACH POST /login 200 OK Authorization: Bearer eyJhbG... TCP SYN-ACK 443 ⚠ INTRUSION DETECTED SELECT * FROM users WHERE... SSH [email protected] Content-Type: application/json ! SECURITY ALERT AES-256 DECRYPTION... Cookie: session_id=7f3a9b2c UDP FLOOD DETECTED ⚠ ADMIN PRIVILEGES X-Forwarded-For: 203.0.113.0 RSA KEY EXCHANGE PORT 22 OPEN ! BYPASS COMPLETE User-Agent: Mozilla/5.0... HTTPS HANDSHAKE JWT TOKEN EXPIRED ⚠ ROOT ACCESS GRANTED DELETE FROM logs WHERE... DNS QUERY A RECORD CORS ORIGIN ALLOWED ! PACKET INJECTION WebSocket CONNECTED ICMP ECHO REQUEST Set-Cookie: auth=true ⚠ ENCRYPTION BROKEN SQL INJECTION ATTEMPT TLS 1.3 NEGOTIATION X-API-Key: sk_live_51... ! BACKDOOR ACTIVE CSRF TOKEN BYPASSED MAC ADDRESS SPOOFED PROXY CHAIN ESTABLISHED ⚠ SYSTEM COMPROMISED KERNEL MODULE LOADED REVERSE SHELL SPAWNED ARP POISONING ACTIVE ! PRIVILEGE ESCALATION BUFFER OVERFLOW EXPLOIT ZERO-DAY VULNERABILITY PAYLOAD DELIVERED ⚠ DEFENSE DISABLED STEALTH MODE ENABLED NETWORK SCAN COMPLETE BRUTE FORCE SUCCESS ! CRITICAL ERROR MEMORY DUMP ACQUIRED KEYLOGGER INSTALLED VPN TUNNEL CREATED ⚠ DATA EXFILTRATION RANSOMWARE DEPLOYED BOTNET CONNECTED DDoS ATTACK INITIATED ! MALWARE DETECTED TROJAN HORSE ACTIVE PHISHING LINK SENT MAN-IN-THE-MIDDLE ⚠ SESSION HIJACKED XSS PAYLOAD INJECTED COMMAND EXECUTION FILE UPLOAD BYPASS ! SANDBOX ESCAPED ANTIVIRUS DISABLED REGISTRY MODIFIED PROCESS INJECTION ⚠ PERSISTENCE ACHIEVED LATERAL MOVEMENT CREDENTIAL HARVESTED HASH CRACKED ! FULL CONTROL REMOTE CODE EXECUTION API ENDPOINT EXPOSED DATABASE DUMPED ⚠ MISSION COMPLETE
HACKING NOW...

本章记录一个关于 ospf 虚链路的小作业实验。

# 实验概述

实验拓扑

  1. 搭建 ospf网络
  2. 使用 虚链路 使 区域A2A0 逻辑相连
  3. 修改 ospf开销值 优先使用 R1路径R2路径备用
  4. 使用 虚链路 作为 区域0冗余备份
  5. 配置 虚链路的认证
  6. 利用 GRE Tunnel 实现 区域A2A0逻辑相连

# 实验步骤参考

IP 配置省略

R1 参考配置:

sysname R1
un in en
ospf 10 router-id 10.0.1.1 
 area 0.0.0.0 
  network 10.0.1.0 0.0.0.255 
  network 10.0.12.0 0.0.0.255 
 area 0.0.0.1 
  network 10.0.13.0 0.0.0.255 
  vlink-peer 10.0.2.2 hmac-md5 1 plain nilaogou
  vlink-peer 10.0.3.3 hmac-md5 1 plain nilaogou

R2 参考配置:

un in en
int G0/0/2
ospf cost 10
interface Tunnel0/0/0
 ip address 1.1.1.1 255.255.255.0 
 tunnel-protocol gre
 source 10.0.23.2
 destination 10.0.23.3
ospf 10 router-id 10.0.2.2 
 area 0.0.0.0 
  network 10.0.2.0 0.0.0.255 
  network 10.0.12.0 0.0.0.255 
 area 0.0.0.1 
  network 10.0.23.0 0.0.0.255 
  vlink-peer 10.0.1.1 hmac-md5 1 plain nilaogou
  vlink-peer 10.0.3.3 hmac-md5 1 plain nilaogou

R3 参考配置:

un in en
int G0/0/2
ospf cost 10
interface Tunnel0/0/1
 description 10.0.23.2
 ip address 1.1.1.2 255.255.255.0 
 tunnel-protocol gre
 source 10.0.23.3
 destination 10.0.23.2
 
ospf 10 router-id 10.0.3.3 
 area 0.0.0.1 
  network 10.0.3.3 0.0.0.0 
  network 10.0.13.0 0.0.0.255 
  network 10.0.23.0 0.0.0.255 
  vlink-peer 10.0.1.1 hmac-md5 1 plain nilaogou
  vlink-peer 10.0.2.2
 area 0.0.0.2 
  network 10.0.34.0 0.0.0.255

R4 参考配置:

un in en
ospf 10 router-id 10.0.4.4 
 area 0.0.0.2 
  network 10.0.4.4 0.0.0.0 
  network 10.0.34.0 0.0.0.255

# 知识点

GRE 隧道

interface Tunnel0/0/1   指定Tunnel接口
 description 10.0.23.2   指定Tunnel接口描述信息
 ip address 1.1.1.2 255.255.255.0 
 tunnel-protocol gre   Tunnel接口的隧道协议为GRE
 source 10.0.23.3   指定Tunnel的源地址
 destination 10.0.23.2   指定Tunnel的目的地址

OSPF 虚链路及认证

vlink-peer 10.0.1.1 hmac-md5 1 plain nilaogou
vlink-peer    ID    MD5加密  标识符1 plain明文 nilaogou密码

详细可查看:点击查看华为命令手册

更新于

请我喝[茶]~( ̄▽ ̄)~*

Vullfin 微信支付

微信支付

Vullfin 支付宝

支付宝

Vullfin 贝宝

贝宝