⚠ UNAUTHORIZED ACCESS GET /api/users HTTP/1.1 192.168.1.105:8080 ! FIREWALL BREACH POST /login 200 OK Authorization: Bearer eyJhbG... TCP SYN-ACK 443 ⚠ INTRUSION DETECTED SELECT * FROM users WHERE... SSH [email protected] Content-Type: application/json ! SECURITY ALERT AES-256 DECRYPTION... Cookie: session_id=7f3a9b2c UDP FLOOD DETECTED ⚠ ADMIN PRIVILEGES X-Forwarded-For: 203.0.113.0 RSA KEY EXCHANGE PORT 22 OPEN ! BYPASS COMPLETE User-Agent: Mozilla/5.0... HTTPS HANDSHAKE JWT TOKEN EXPIRED ⚠ ROOT ACCESS GRANTED DELETE FROM logs WHERE... DNS QUERY A RECORD CORS ORIGIN ALLOWED ! PACKET INJECTION WebSocket CONNECTED ICMP ECHO REQUEST Set-Cookie: auth=true ⚠ ENCRYPTION BROKEN SQL INJECTION ATTEMPT TLS 1.3 NEGOTIATION X-API-Key: sk_live_51... ! BACKDOOR ACTIVE CSRF TOKEN BYPASSED MAC ADDRESS SPOOFED PROXY CHAIN ESTABLISHED ⚠ SYSTEM COMPROMISED KERNEL MODULE LOADED REVERSE SHELL SPAWNED ARP POISONING ACTIVE ! PRIVILEGE ESCALATION BUFFER OVERFLOW EXPLOIT ZERO-DAY VULNERABILITY PAYLOAD DELIVERED ⚠ DEFENSE DISABLED STEALTH MODE ENABLED NETWORK SCAN COMPLETE BRUTE FORCE SUCCESS ! CRITICAL ERROR MEMORY DUMP ACQUIRED KEYLOGGER INSTALLED VPN TUNNEL CREATED ⚠ DATA EXFILTRATION RANSOMWARE DEPLOYED BOTNET CONNECTED DDoS ATTACK INITIATED ! MALWARE DETECTED TROJAN HORSE ACTIVE PHISHING LINK SENT MAN-IN-THE-MIDDLE ⚠ SESSION HIJACKED XSS PAYLOAD INJECTED COMMAND EXECUTION FILE UPLOAD BYPASS ! SANDBOX ESCAPED ANTIVIRUS DISABLED REGISTRY MODIFIED PROCESS INJECTION ⚠ PERSISTENCE ACHIEVED LATERAL MOVEMENT CREDENTIAL HARVESTED HASH CRACKED ! FULL CONTROL REMOTE CODE EXECUTION API ENDPOINT EXPOSED DATABASE DUMPED ⚠ MISSION COMPLETE
HACKING NOW...

拓扑图

# 核心步骤

LSW1:

vlan batch 10 20 30 40 100
dhcp enable
interface Vlanif10
 ip address 192.168.10.254 255.255.255.0
 dhcp select interface
 dhcp server dns-list 172.16.100.1
interface Vlanif20
 ip address 192.168.20.254 255.255.255.0
 dhcp select interface
 dhcp server dns-list 172.16.100.1
interface Vlanif30
 ip address 192.168.30.254 255.255.255.0
 dhcp select interface
 dhcp server dns-list 172.16.100.1
interface Vlanif40
 ip address 172.16.100.254 255.255.255.0
interface Vlanif100
 ip address 10.10.10.2 255.255.255.0
interface GigabitEthernet0/0/1
 port link-type trunk
 port trunk allow-pass all
interface GigabitEthernet0/0/2
 port link-type access
 port default vlan 10
interface GigabitEthernet0/0/3
 port link-type access
 port default vlan 100
interface GigabitEthernet0/0/4
 port link-type access
 port default vlan 40
ip route-static 0.0.0.0 0.0.0.0 10.10.10.1

LSW3

undo info-center enable
vlan batch 20 30
interface Ethernet0/0/1
 port link-type access
 port default vlan 20
interface Ethernet0/0/2
 port link-type access
 port default vlan 30
interface GigabitEthernet0/0/1
 port link-type trunk
 port trunk allow-pass all

R1

nat address-group 1 64.1.1.5 64.1.1.5
acl number 2000
 rule 5 permit source 192.168.0.0 0.0.255.255
acl number 2001
 rule 5 deny source 192.168.10.0 0.0.0.255
 rule 10 permit
interface GigabitEthernet0/0/0
 ip address 10.10.10.1 255.255.255.0
 traffic-filter inbound acl 2001
interface GigabitEthernet0/0/1
 ip address 64.1.1.1 255.255.255.0
 nat outbound 2000 address-group 1
 nat server global 64.1.1.3 inside 172.16.100.1
ip route-static 0.0.0.0 0.0.0.0 64.1.1.10
ip route-static 172.16.100.0 255.255.255.0 10.10.10.2
ip route-static 192.168.0.0 255.255.0.0 10.10.10.2

R2

undo info-center enable
interface GigabitEthernet0/0/0
 ip address 64.1.1.10 255.255.255.0
interface GigabitEthernet0/0/1
 ip address 8.8.8.254 255.255.255.0
interface GigabitEthernet0/0/2
 ip address 9.9.9.254 255.255.255.0
ip route-static 172.16.100.0 255.255.255.0 64.1.1.1
ip route-static 192.168.0.0 255.255.0.0 64.1.1.1

# 结果

  1. 测试 ping 8.8.8.8 正常
  2. 测试各 pc 域名 vv.com dns 解析正常
  3. 测试 pc 互通
  4. 测试 pc1 ping 8.8.8.8 被 acl 拦截
更新于

请我喝[茶]~( ̄▽ ̄)~*

Vullfin 微信支付

微信支付

Vullfin 支付宝

支付宝

Vullfin 贝宝

贝宝