Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

拆分包貌似已经无效了 #1

Open
albertjin opened this issue Mar 22, 2015 · 7 comments
Open

拆分包貌似已经无效了 #1

albertjin opened this issue Mar 22, 2015 · 7 comments

Comments

@albertjin
Copy link

老早我这么干过,长时间用下来发现还是有漏的。只好检测对方发来的数据,如果有特定特征关键词,代理内部断开连接,重新请求。

有个明显特征是,劫持后居然不发 Server 。呵呵,好傻好明显的特征。都劫持了,伪造个随机 Server 会死人啊。

@lehui99
Copy link
Owner

lehui99 commented Mar 22, 2015

是否是DNS劫持呢?测试过一段时间,漏的情况都是被DNS劫持到运营商的服务器上了。DNS服务器的真正返回在被劫持的数据包之后,正确结果被丢弃了。

@albertjin
Copy link
Author

我的DNS也是自己写的程序,用TCP连到阿里的服务器,应该不会被劫持

@lehui99
Copy link
Owner

lehui99 commented Mar 23, 2015

嗯,后续计划考虑加入检查服务器返回的功能。

@MewX
Copy link

MewX commented Dec 20, 2015

我感觉还是有不少包没用……联通的这鬼HTTP劫持太恶心了……

下面这个图是iframe劫持,恶心……ADB拦截之后CPU直接100%,js代码里面有检测是否成功显示出来。

qq 20151220162529

@albertjin
Copy link
Author

因为前面那个js就是被劫持的,要在源头上解决掉。目前比较可靠的方案就是用iptables的重定向,用软件的方式代理检查服务器返回。直接过滤包问题很多。

@MewX
Copy link

MewX commented Dec 21, 2015

@albertjin 嗯,整个页面都被重写了,好多网页都乱套了……还真没辙,如果持续劫持我就打算写个stylish脚本脱去iframe了。。

@cjkzwe
Copy link

cjkzwe commented Aug 30, 2017

github上有基于ttl检测的防劫持github.com/KCCat/DROP-ISP-TCP-Hijacking

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants