Prior Disclaimer: There may be underreporting of the method (well, in the case of poor character)
Well, we use www.wooyun.org as an example.
First of all, from the page where the www.wooyun.org service has been hung multiple times, it can be seen that Wooyun uses Baidu's CDN service, and from Wooyun's vulnerability case, we can also know that Wooyun uses Ucloud's service, and we can boldly assume that the IP of Wooyun's server is in China.
0x1. Get a CN IP
Get the IP assigned to the Asian region from apnic and filter out the IP of CN.
wget ftp://ftp.apnic.net/public/apnic/stats/apnic/delegated-apnic-latest
http://eric-zhang.googlecode.com/svn/trunk/code/bash/iproute2/ip/cnip.txt
0x2. Port scanning
Use zmap to scan 80 ports of IP for all CNs.
Well, it takes about 20 minutes on my VPS, so go out for a coffee first :)
0x3. Get a banner
Use zmap's banner-grab to banner scrape hosts with 80 open ports
Well, in http-req Host writes www.wooyun.org, and uses ulimit to modify the maximum number of file descriptors to a larger value,
Direct scanning:
Well, here, considering that the www.wooyun.org opens quite slowly, so set the connection timeout and read timeout to 30s, during which time you can go out to watch a movie.
0x4. Data Processing
Use the keyword "80sec" to simply filter the acquired data
These 400+ servers can generally be divided into three types:
* baidu cdn server
* http proxy server
* www.wooyun.com server
You can do another banner on these 400+ servers, don't set Host, filter out baidu cdn error pages, empty pages, timeouts and other messy pages, and then you can get the result, I went to ask the relevant person in charge www.wooyun.org the real IP, and sure enough, :)
The total time was about two hours.
0x5. Conjecture
Some companies' test servers are placed on the public network, and generally only the host can be accessed, so...
0x6. Thanks
Hmm, this theme is a conjecture from seeing someone setting up some inexplicable host on my vps honeypot. thx
|