调查目的:了解当前各基于TLS的协议方案中ClientHello的指纹独特性。理论背景见 https://arxiv.org/abs/1607.01639 。
指纹数据库:
(利益相关:我是这个的作者)
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>items</key> | |
<array> | |
<dict> | |
<key>assets</key> | |
<array> | |
<dict> |
// To run, install GreaseMonkey or TamperMonkey extension in your browser | |
// Copy this code into new user script, and enable | |
// ==UserScript== | |
// @name Disable Youtube autoplay | |
// @version 1.0 | |
// @description This script turns off Youtube's newest autoplay feature after the page loads | |
// @author Jeff Bellucci | |
// @match *://www.youtube.com/* | |
// @run-at document-start |
调查目的:了解当前各基于TLS的协议方案中ClientHello的指纹独特性。理论背景见 https://arxiv.org/abs/1607.01639 。
指纹数据库:
(利益相关:我是这个的作者)
/usr/local/etc/v2ray
mkdir -p /usr/local/etc/v2ray
mv /etc/v2ray/config.json /usr/local/etc/v2ray/config.json
systemctl stop v2ray
systemctl disable v2ray
rm -f /etc/systemd/system/v2ray.service
||a.alimama.cn | |
||acjs.aliyun.com | |
||adash.m.taobao.com | |
||adashbc.m.taobao.com | |
||adash-c.ut.taobao.com | |
||adashx.m.taobao.com | |
||adashx4yt.m.taobao.com | |
||adashxgc.ut.taobao.com | |
||adsh.m.taobao.com | |
||afp.adchina.com |
#关于 PAC 的书签夹
###比较全的 PAC 介绍
Hi there,
Apple enable this port by default if you want Wi-Fi Sync. The problem is, I (and probably you) never used this so this port should not be open. Enabling this port by default is a security risk as there is always an undocumented service (lockdownd) listening on this port.
This is an non-exhaustive list of what you are exposing to if you don't close this port:
Nginx can be configured to route to a backend, based on the server's domain name, which is included in the SSL/TLS handshake (Server Name Indication, SNI).
This works for http upstream servers, but also for other protocols, that can be secured with TLS.
nginx -V
for the following:
...
TLS SNI support enabled
// ==UserScript== | |
// @name ByeZhihuSecurity | |
// @namespace http://tampermonkey.net/ | |
// @version 0.1 | |
// @description 去除知乎点开外链的安全中心跳转 | |
// @author Lin Xiangyu | |
// @match https://www.zhihu.com/* | |
// @grant none | |
// ==/UserScript== |
破解完光猫不过隐,继续琢磨,查了些智能设备安全的教程,分析智能设备或嵌入式设备安全,第一步是要提取固件,所以接下来要提取固件了。
通过/proc
虚拟文件系统读取MTD
分区表:
/ # cat /proc/mtd
dev: size erasesize name
mtd0: 08000000 00020000 "whole flash"
mtd1: 00200000 00020000 "u-boot"