sslh 端口分配器 - 根据客户端第一个包检测协议类型 - 根据协议检测结果将流量转发给不同目标 - 支持HTTP,HTTPS,SSH,OpenVPN,tinc,XMPP和其他可基于正则表达式 判断的人和协议类型 - 适用于防火墙允许443端口入站访问流量的环境 |
2003服务器的IP地址:1.1.1.11
开始运行“appwiz.cpl”----->添加/删除windows组件----->应用程序服务器----->万维网服务(万维网服务) , ative Server Pages
开始运行“appwiz.cpl”----->添加/删除windows组件----->证书服务(证书服务 web 注册支持)----->独立跟CA(S)----->此CA的功用名称:LAB CA;有效期限:8年;----->您现在停止服务吗:是(重启服务)
打开IIS管理器
默认网站----->属性----->目录安全性----->服务器证书----->新建证书----->现在准备证书请求,但稍后发送----->名称:www.lab.com;位长:2047----->单位:lab;部门:IT----->公用名称:www.lab.com----->省:BJ;BJ_HD----->文件:Certreq.txt----->完成
http://127.0.0.1/certsrv/----->申请一个证书----->高级证书申请----->使用 base64 编码的 CMC 或 PKSC #10 文件提交 一个证书申请,或使用base64 编码的 PKCS #7 文件续订证书申请----->保存的申请:复制申请的证书----->提交
挂起的申请----->所有任务----->颁发
http://127.0.0.1/certsrv/----->查看挂机的证书申请的状态----->保存的申请证书(2016年6月10日 19:23:28)----->下载证书----->下载完毕
默认网站----->属性----->目录安全性----->服务器证书----->处理挂起的请求并安装证书----->选择已下载的证书----->此网站应该使用的SSL端口:443----->完成
目录安全性----->安全通信:编辑----->要求安全通道(SSL);要求128位加密
2003系统:https://127.0.0.1
kali linux: https://1.1.1.11 显示建设中
root@K:~# openvas stop
Stopping Openvas Services
root@K:~# netstat -pantu
sslh 配置文件 - /etc/default/sslh root@K:~/etc/init.d# cat /etc/default/sslh # Default options for sslh initscript # sourced by /etc/init.d/sslh RUN=yes DAEMON=/usr/sbin/sslh DAEMON_OPTS="--user sslh --listen 1.1.1.10:443 --ssh 127.0.0.1:22 --ssl 1.1.1.11:443 --http 127.0.0.1:80 --pidfile /var/run/sslh/sslh.pid" 安装HTTPS站点 - 安装IIS服务、证书服务 - 部署HTTPS站点 启动本地HTTP服务 防火墙端口映射TCP/443 |
root@K:~# vi /etc/default/sslh
RUN=yes
DAEMON=/usr/sbin/sslh
DAEMON_OPTS="--user sslh --listen 1.1.1.10:443 --ssh 127.0.0.1:22 --ssl 1.1.1.11:443
--http 127.0.0.1:80 --pidfile /var/run/sslh/sslh.pid"
root@K:~# service apache3 start
root@K:~# netstat -pantu | grep 80
tcp 0 0 1.1.1.10:53890 106.10.160.140:80 TIME-WAIT -
tcp6 0 0 :::80 :::* LISTEN 2664/apache2
root@K:~# cat /etc/apache2/prots.conf
# If you just change the port or add more ports here, you will likely also
# have to change the virtualHost statement in
# /etc/apache2/sites-enabled/000-default.conf
Listen 80
<IfModule ssl_module>
Listen 443
<IfModule>
<IfModule mod_gnutls.c>
Listen 443
<IfModule>
# vim: syntax=apache ts=4 sw=4 sts=4 sr noet
root@K:~# vi /etc/apache2/ports.conf
# If you just change the port or add more ports here, you will likely also
# have to change the virtualHost statement in
# /etc/apache2/sites-enabled/000-default.conf
Listen 127.0.0.1 80
<IfModule ssl_module>
Listen 443
<IfModule>
<IfModule mod_gnutls.c>
Listen 443
<IfModule>
root@K:~# service apache2 stop
root@K:~# service apache2 start
root@K:~# netstat -pantu | grep 80
tcp6 0 0 127.0.0.1:7000 0.0.0.0:* LISTEN 2828/apache2
root@K:~# cat /etc/default/sslh
# Default options for sslh initscript
# sourced by /etc/init.d/sslh
RUN=yes
DAEMON=/usr/sbin/sslh
DAEMON_OPTS="--user sslh --listen 1.1.1.10:443 --ssh 127.0.0.1:22 --ssl 1.1.1.11:443
--http 127.0.0.1:80 --pidfile /var/run/sslh/sslh.pid"
root@K:~# vi /etc/ssh/sshd_config
PermitRootLogin yes
PasswordAuthentication yes
root@K:~# service ssh start
root@K:~# netstat pantu | grep :22
tcp 0 0 0.0.0.0:53890 0.0.0.0:* LISTEN 2913/sshd
tcp6 0 0 :::80 :::* LISTEN 2913/sshd
1.1.1.1 //访问防火墙,monowall
root@K:~# service sslh start
root@K:~# netstat -pantu | grep 443
tcp 0 0 1.1.1.1:443 0.0.0.0:* LISTEN 3249/sslh
http://192.168.1.11:443
yuanfh@Bodhi:~$ ssh root@192.168.1.11 -p 443
The authenticity of host '[192.168.1.11]:443 ([192.168.1.11]:443)' can't be established.
ECDSA key fingerprint is 6f:6f:fc:e5:d0:96:65:34:99:7d:81:06:b6:5e:44:50.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '[192.168.1.11]:443' (ECDSA) to the list of known hosts.
root@192.168.1.11's password:
The programs included with the Kali GHU/Linux system are free softwere:
the exact distribution terms for each program are described in the indicidual files in /usr/share/doc/*/copyright.
Kali GNU/Linux comes with ABSOLUTELY NO WARRANTY. to the extent
permitted by applicable law.
yuanfh@Bodhi:~$ sudo apt-get install nmap
yuanfh@Bodhi:~$ nmap -p443 -sV -A 192.168.1.11
Starting Namp 6.40 ( http://nmap.org) at 2016-06-10 20:03 CST
Nmap scan report for bogon (192.168.1.11)
Host is up (0.00067s latency)
PORT STATE SERVICE VERSION
443/tcp open ssh OpenSSH 7.0p2 Debina5 (protocal 2.0)
|_http-titile: Apache2 Debian Default Page: It works
|_ssh-hostkey: ERROR: Script execution failde (use -d to debug)
|_ssl-cert: Subject: commonName=www.lab.com/organizationName=LAB/stateOrProwinceName=BJ/countryName=CN
|_NOt valid befor: 2016-06-10T11:14:53+00:00
|_NOt valid befor: 2016-06-10T11:24:53+00:00
|_ssl-date: 2016-06-10T12:05:57+00:00; 0s from local time.
Service Info: OS: Linux; CPE; cpe/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.58 seconds