⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 vpnlecture.html

📁 黑客培训教程
💻 HTML
📖 第 1 页 / 共 5 页
字号:
sec</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; also</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; also</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; it is important to keep in mind</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; client management for VPNs </P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; selecting the appropriate routers 

for the job etc</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ok</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; questions?</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Ralph&gt; -m first</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;phatal&gt; why was this held here</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Ralph&gt; haha!</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_rpc-&gt; HEH</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;th0rn&gt; k, so lemme put all the info i've 

absorbed into a more accurate definition of a VPN... (tell me if this is correct 

or not) a VPN is a method of transport that provides security through encryption 

and packet header modification that implements a VIRTUAL p2p link between shared 

networks... correct?</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;c0ld&gt; lol</P>

<P style="MARGIN-BOTTOM: 0cm">--- _rpc- is now known as rpc</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;phatal&gt; instead of #lecture?</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;LiquidCrystalDismay&gt; oh i wanted to see the 

rest :)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;th0rn&gt; lol, that was some pretty nice ascii 

art ;-D</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; kf26t3a (kf26t3a@mtdCfs6iqTg.eseenet.com) 

has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;th0rn&gt; lol @ liquid</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; thorn yea</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;th0rn&gt; k, cool</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; my fingers are tired</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;th0rn&gt; heheh, i bet</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Phaedrus&gt; How are the actual crypto bits 

handled? What protocols is it using? Aren't the packets encapsulated and not 

modified at header level? </P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; i will get into that also</P>

<P style="MARGIN-BOTTOM: 0cm">* Phaedrus ohs...sits tight</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; at the bit level for you :-D</P>

<P style="MARGIN-BOTTOM: 0cm">Phaedrus phatal &gt;phatal&lt; they are always 

held here</P>

<P style="MARGIN-BOTTOM: 0cm">* Phaedrus has an exam on this stuff in two 

days</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Pleb&gt; _Jonah_, could you repeat that? I 

wasn't paying attention.</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Pleb&gt; ;)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; so lemme sip some whater</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;rpc&gt; hi phaedrus</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Phaedrus&gt; hi</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ok</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Pleb&gt; lol</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;th0rn&gt; fuck, i need a more comfortable 

chair</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;th0rn&gt; :-\</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; next i'll begin to talk about VPN 

Architectures &amp;&amp; Implementation</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ithink we all</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; got an idea of how vpns work</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; and the fundamental concepts</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; i'll go into packet security 

etc</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; and how the step by step process 

of VPNs are set up</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; and taken down ,, (LOGICALLY of 

course)</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; _Acolyte- 

(a@9J3lMVShCog.tnt1.orange.au.da.uu.net) has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; there are a whole bunch of </P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; architecture arrangements</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; for VPN implementation</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; like i said the most popular</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; are routers on the p2p</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; but</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; it can b client to router like in 

the wan-dial up user scenario</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; logically</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; its the encrypted tunnel 

connection on a shared network</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the imediate benefit of a VPN is 

the tocal cost of ownership</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; instead of leasing lines for p2p 

connections</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; you have the free access of the 

(internet) or shared network</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; plus</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the sexiest thing is</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; Mikkkeee (mike@yxlXiJEpTppc.150.108.234.O) 

has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; link failure is virtually 

eliminated</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; e.g. in the leased line 

scenario</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; if there's a cut</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; byebye network</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; however in the VPN, link failure 

is protected using routing protocols</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; like RIP,EIGRP.. etc</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; those protocols auto sense link 

failures and redirect traffic</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ok</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; thers something called IPSsec</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; IPSec</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; (internet protocol security)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; lemme attempt to make a 

diagram</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; a typical ip packet is designed 

like this</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; hmm</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- _Acolyte- 

(a@9J3lMVShCog.tnt1.orange.au.da.uu.net) has left #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the packet is like a rectangle</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Mikkkeee&gt; sup ppl</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; |header|data|</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; in the header</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; Acolyte 

(a@9J3lMVShCog.tnt1.orange.au.da.uu.net) has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; theres |destination ip|source 

ip|dest. port|source port|</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; followed by the data</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; what ipsec does</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; it encrypts the entire packet</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; before it gets sent out the VPN 

gateway</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; an dputs it in an entirely new 

packet</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; where - |new header|old 

packet|</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the entire old packet is put in 

the data</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; section</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; including the oldheader...etc</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; take a second to grasp that 

concept</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- Acolyte 

(a@9J3lMVShCog.tnt1.orange.au.da.uu.net) has left #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; then when that new ipsec packet 

arrives at the end VPN gateway</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; it does the VPN Header checks from 

the IPSEC header</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; reforms the packet and redirects 

it on the private network</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the IPSec core is located b/w 

layers 3(network layer) and layer 4(tcp/udp) layer</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; or the ipsec header/ESP (data 

body)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ESP = hmm</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; something Security Payload</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; i forget i'm sorry</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; so</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; to reinterate</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the new IPsec packet</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; has the new AHA header followed 

bye the ESP body/data</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ESP ensures packet encryption</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; while</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the AHA... Authentication Hashing 

Algorithm</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; esures</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; packet delivery</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; there are two modes</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; for IPSec</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; tranparent</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; and Tunnel mode</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; Transparent btw is rarely ever 

used anymore</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; in trans. mode, only the data is 

encrypted</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; so remote routers located within 

the tunnel can implement QoS b/c they can read the header</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; in tunnel mode</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the entire packet is 

encapsulated</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; and a new packet is created...</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; just as i describe above</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; now</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; when implementing VPN you may want 

to use trans. mode if you have a whole bunch of dial up users</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; b/c of all the hops their packets 

are going to take</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; Zomart (Zomart@y9ppfhSBLZ22.om.om.cox.net) 

has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; however the argument to not using 

it(which is the predominant one)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; is that packet transport integrity 

is very high</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; Chris (melphies@VDSQtysxETo.ipt.aol.com) 

has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; so its a more secure soln. to use 

tunnel mode</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; thers another</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; VPN routing/packet protocol</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; and its GRE.... Generic Routing 

Encapsulation</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ahh ESP ... Encapsulation Security 

Payload</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; GRE simply allows APpletalk and 

IPX/SPX packets to communication over a IP VPN backbone</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ;-D</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; PPTP , point to point tunneling 

protocol is for Dial up users</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ok</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; with all those in mind</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; we move on to something called</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- aphrael has quit ()</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; Security Association</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; there are a whole bunch of 

encryption/decryption methods choices to employ</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; i.e. DES,AHA,SHA,MD5...etc</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; also</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; there are security keys related to 

each session</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; all this info is combined in 

statement of security policies </P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; these statements have been 

negotiated by both endpoints of the VPN connection</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; btw its unidirectional</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- piksel has quit (leaving)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; each endpoin has there own 

SA...(Security Association)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ok</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; QUestions?</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Ralph&gt; -m!</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; thnx</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;LiquidCrystalDismay&gt; isn't PPTP for 

windows, or some shit?</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;rpc&gt; few comments</P>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -