-
Notifications
You must be signed in to change notification settings - Fork 130
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
拆分包貌似已经无效了 #1
Comments
是否是DNS劫持呢?测试过一段时间,漏的情况都是被DNS劫持到运营商的服务器上了。DNS服务器的真正返回在被劫持的数据包之后,正确结果被丢弃了。 |
我的DNS也是自己写的程序,用TCP连到阿里的服务器,应该不会被劫持 |
嗯,后续计划考虑加入检查服务器返回的功能。 |
因为前面那个js就是被劫持的,要在源头上解决掉。目前比较可靠的方案就是用iptables的重定向,用软件的方式代理检查服务器返回。直接过滤包问题很多。 |
@albertjin 嗯,整个页面都被重写了,好多网页都乱套了……还真没辙,如果持续劫持我就打算写个stylish脚本脱去iframe了。。 |
github上有基于ttl检测的防劫持github.com/KCCat/DROP-ISP-TCP-Hijacking |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
老早我这么干过,长时间用下来发现还是有漏的。只好检测对方发来的数据,如果有特定特征关键词,代理内部断开连接,重新请求。
有个明显特征是,劫持后居然不发 Server 。呵呵,好傻好明显的特征。都劫持了,伪造个随机 Server 会死人啊。
The text was updated successfully, but these errors were encountered: