自己的怎样才能让别人查不到自己的ip地址(How to let others can not find their IP address)

ip查地址  时间:2021-03-01  阅读:()

怎样才能让别人查不到自己的ip地址How to let others can notfind their IP address

ARP principle: a machine A to send the message to the host B,will query the local ARP cache table, to find the B address ofthe IP corresponding to the MAC address, it will be datatransmission. If not found, broadcast A, a ARP request message(carrying the host A' s IP address Ia - physical address Pa) ,requesting the IP address of Ib host B, and answering thephysical address Pb. All hosts on the Internet, including theB, receive the ARP request, but only the host B recognizes itsown IP address and sends back a ARP response message to the Ahost. This includes the B address of the MAC, and the local ARPcache is updated after the A receives the B response. The datais then sent using this MAC address (with the MAC addressappended by the network card) . Therefore, the ARP table of thelocal cache is the basis for the local network flow, and thecache is dynamic.

The ARP protocol does not receive the ARP response only whenthe ARP request is sent. When the computer receives the ARPresponse packet, it updates the local ARP cache and stores theIP and MAC addresses in the ARP cache. Therefore, when a machinein the LAN B to send A ARP response a forgery, and if thisresponse is B to C posing as the IP address forgery, C, IP, andMAC address is fake, then when A receives the ARP response Bforged, will update the local the ARP cache, so in A it seemsC IP address has not changed, but it is not the original oneMAC address. Because the LAN network flow is not carried outaccording to the IP address, but is transmitted according tothe MAC address. So the forged MAC address was changed to a

nonexistent MAC address on A, which would cause the network tofail and cause A to fail to pass Ping through C! This is a simpleARP spoofing.

2. , the network law enforcement officer is using thisprinciple!

In the network to a law enforcement official, to restrict themachine online, just click the"card"menu"permissions, selectthe card number or click on the list of users in the card row,select" permission"from the menu in the dialog box to restrictthe user' s permissions. For an unregistered network card, youcan limit its on-line: as long as the set of all known users(Registration) , the network card default permissions toprohibit on-line, you can stop all unknown network card on-line.With these two functions, users can be restricted to theinternet. The principle is to pass the ARP spoofing to theattack computer, a false gateway IP address corresponding toMAC, so that it can not find the gateway' s real MAC address,so that it can prohibit its access to the internet.

3. , modify the MAC address, break the blockade of the networklaw enforcement off icer

According to the above analysis, it is not difficult to drawa conclusion that as long as the MAC address is modified, wecan cheat the scanning of the Internet law enforcement officersoas toachieve the goal of breaking through the blockade. Hereis how to modify the MAC address of the network card:In the run of the start menu, enter regedit, open the registry

editor, and expand the registry to: HKEY_LOCAL_

MACHINE/System/CurrentControl

Set/Control/Class/{4D36E972-E325-11CE-BFC1-08002BE10318} key, 000000010002 sub branch in DriverDesc in the searchkey (if you have more than one card, there are 00010002. . . . . .here is keeping on your card information, the DriverDesccontent is the card information description, such as my cardis Intel 210

41, based, Ethernet, Controller) here, suppose your networkcard is in the 0000 child key.

Add a string under the 0000 child key, named NetworkAddress.The key value is the modified MAC address, which requires 12consecutive 16 hexadecimal numbers. Then, in the NDI/paramsunder the "0000" sub key, a new subkey called NetworkAddressis added. Under the subkey, a string called default is added,and the key value is the modified MAC address.

Under the child key of the NetworkAddress, continue toestablish a string called ParamDesc, which acts as thespecified Network

Description of Address,

Its value is "MAC Address"". Then open the network neighbor"attribute", double-click the network cardwill finda"senior"setting, the existence of MAC Address under the new

"NetworkAddress" option, it is for you to join in the registry,then as long as the MAC address can be modified.

Close the registry, restart, and your network card address hasbeen changed. Open the property of the network neighbor anddouble-click the corresponding network card entry to find anadvanced setting item of MAC Address for modifying the MACaddress directly.

The MAC address is also called a physical address, a hardwareaddress, or a link address. It is written inside the hardwarewhen it is produced by the network device manufacturer. Theaddress and the network that has nothing to do with this addressboth hardware (such as cards, hubs, routers) access to thenetwork where it will have the same MAC address, MAC addresswill not be changed, can not be set by the user. The MAC addressis usually expressed as a decimal number between 16 and 12, thenumber of 16 m each of the 2 separated by a colon, such as:

08:00:20:0A:8C:6D is an MAC address, the first 6 hexadecimalnumber 16, 08:00:20 represents the network hardwaremanufacturer' s serial number, it is allocated by IEEE, and then3 hexadecimal number 16 0A:8C:6D represents a network productthe manufacturer made (such as card serial number) . Eachnetwork manufacturer must ensure that each Ethernet device itmanufactures has the same first three bytes and different threebytes later. This ensures that eachEthernet device in the worldhas a unique MAC address.

In addition, the principle of network law enforcement officeris to send a computer to the MAC address of the false gatewayIP address through ARP spoofing, so that it can not find the

real MAC address of the gateway. Therefore, as long as we modifythe mapping from IP to MAC, the ARP spoofing of the networkadministrator fails and breaks the restriction of breakingthrough it. You can Ping the gateway in advance and then usethe ARP-a command to get the MAC address of the gateway. Finally,you can map the IP address of the gateway and its MAC addresswith the ARP -s IP card MAC address command.

4. find the one that makes you unable to access the InternetAfter removing the network administrator' s blockade, we can useArpkiller' s "Sniffer killer" to scan the entire LAN IP section,and then f ind the "promiscuous" mode of the computer, you canfind each other. The specific method is: run Arpkiller (Figure

2) , and then click the "Sniffer monitoring tool", in the"Sniffer killer" window, enter the start and end of the testIP (Figure 3) , click "start testing" on it.

When the test is complete, if the corresponding IP is a greenicon, the IP is in normal mode, and if it is a red hat, the cardis in promiscuous mode. It' s our goal, that this guy is messingwith cyber law enforcement officials.

While scanning, I'm in promiscuous mode, and I can' t countmyself in it!

It' s up to you to deal with each other when you find him. Forexample, you can use the Internet law enforcement officer toblock the other party

JustHost:俄罗斯/新西伯利亚vps,512MB内存/5GB空间/不限流量/200Mbps/KVM/自由更换IP,$1.57/月

justhost怎么样?justhost是一家俄罗斯主机商,2006年成立,提供各种主机服务,vps基于kvm,有HDD和SSD硬盘两种,特色是200Mbps不限流量(之前是100Mbps,现在升级为200Mbps)。下面是HDD硬盘的KVM VPS,性价比最高,此外还有SSD硬盘的KVM VPS,价格略高。支持Paypal付款。国内建议选择新西伯利亚或者莫斯科DataLine。支持Paypal付...

半月湾($59.99/年),升级带宽至200M起步 三网CN2 GIA线路

在前面的文章中就有介绍到半月湾Half Moon Bay Cloud服务商有提供洛杉矶DC5数据中心云服务器,这个堪比我们可能熟悉的某服务商,如果我们有用过的话会发现这个服务商的价格比较贵,而且一直缺货。这里,于是半月湾服务商看到机会来了,于是有新增同机房的CN2 GIA优化线路。在之前的文章中介绍到Half Moon Bay Cloud DC5机房且进行过测评。这次的变化是从原来基础的年付49....

[黑五]ProfitServer新加坡/德国/荷兰/西班牙VPS五折,不限流量KVM月付2.88美元起

ProfitServer已开启了黑色星期五的促销活动,一直到本月底,商家新加坡、荷兰、德国和西班牙机房VPS直接5折,无码直购最低每月2.88美元起,不限制流量,提供IPv4+IPv6。这是一家始于2003年的俄罗斯主机商,提供虚拟主机、VPS、独立服务器、SSL证书、域名等产品,可选数据中心包括俄罗斯、法国、荷兰、美国、新加坡、拉脱维亚、捷克、保加利亚等多个国家和地区。我们随便以一个数据中心为例...

ip查地址为你推荐
木马病毒什么是木马病毒?视频截图软件怎么把视频截成动图?还有一般剪辑视频什么的用什么软件比较好?博客外链博客外链怎么做好怎么在qq空间里添加背景音乐怎么在QQ空间里插入背景音乐??ghostxp3GHOST系统 ghostxp3 ghostxp2 ghostxp1 三者有什么区别?显卡温度多少正常显卡温度多少正常数码资源网哪个网站可以直接在线做照片?功能要齐全的`硬盘人克隆一个人需要多少人多长时间啊神雕侠侣礼包大全神雕侠侣陈晓礼包兑换码怎么获得商标注册查询官网商标注册查询官方网站?
免费域名注册网站 最新代理服务器ip sharktech 视频存储服务器 香港cdn 服务器cpu性能排行 绍兴高防 已备案删除域名 卡巴斯基破解版 创建邮箱 空间首页登陆 网站加速软件 徐州电信 mteam 免费赚q币 免费获得q币 九零网络 windowsserverr2 symantec 德国代理 更多