You’ll need to make use of many free services similar to EC2
. Prepare lots of fingerprint browsers or virtual machines.
For example, I can run 16 virtual machines at once.
What is a fingerprint browser? (generated by GPT‑4 with Bing) A fingerprint browser is a specialized browser technology used to identify and track visitors. It lets users log in to multiple accounts on the same machine without linking them. This anti-association feature is mainly used in cross-border e-commerce and social media marketing. It keeps data isolated and allows you to modify info like timezone or address.
Now prepare 16 Google accounts and 16 Microsoft accounts to log in. Sign in to common developer websites.
webBenchmark -c [COUNT] -s [URL] -r [REFERER]
-c int
concurrent routines for download (default 16)
-r string
referer url
-s string
target url (default "https://baidu.com")
-i string
custom ip address for that domain, multiple addresses automatically will be assigned randomly
-H http header pattern
http header pattern, use Random with number prefix will generate random string, same key will be overwritten
-f string
randomized X-Forwarded-For and X-Real-IP address
-p string
post content
what is slowloris: cloudflare link
ksubdomain is a stateless subdomain brute-forcing tool for Windows/Linux/Mac. It can blast DNS queries very quickly—up to 300k/s on Mac and Windows and 1.6M/s on Linux.
Sending and receiving are decoupled from the system, so even with high concurrency it doesn’t exhaust file descriptors.
Use --test
to check your local sending rate. Actual throughput depends on your network. The tool simplifies this with the -b
parameter—for example -b 5m
—to throttle packets automatically.
The IP used before a domain was behind a CDN is often the real origin IP.
https://github.com/zidansec/CloudPeler
This tool serves to find the original IP behind websites that have been protected by CloudFlare, the information generated can be useful for further penetration. The information generated by this tool is as follows.
Check whether HTTP_X_FORWARDED_FOR
is empty; if not, treat it as the IP address, otherwise use REMOTE_ADDR
.
If you can upload files to the server, add code like this:
Request.ServerVariables("LOCAL_ADDR")
gets the server IP
Request.ServerVariables("REMOTE_ADDR")
gets the client IP (possibly a proxy)
request.ServerVariables("HTTP_X_FORWARDED_FOR")
gets the real client IP
Have the server initiate a connection to us (including RSS mail subscriptions)
Directly visiting a CDN-protected domain hits the CDN first. But if we make the server connect back to us, we can quickly learn its real IP.
Most sites send email directly from their own servers. If the server has sendmail installed, registering will trigger a message. Check the email headers to see the real IP, which is often in the same subnet as the main site. Probe port 80 hosts in that range.
https://www.isitdownrightnow.com/
Check whether a site is truly reachable.
Look up DNS records such as A, AAAA, CNAME, NS and MX.
Internet-wide scanning engines work by using many servers around the clock to probe everything exposed online—every IP address, open port and service, and the response to each request.
Most websites have an icon. These engines also collect icon hashes. Calculate your site’s icon hash and search it on FOFA—if another IP uses the same hash, that’s probably your real address.