2025-09-14 21:52:36 +00:00
|
|
|
|
# 【M22项目】AdGuard VPN特征提取
|
|
|
|
|
|
|
|
|
|
|
|
| ID | Creation Date | Assignee | Status |
|
|
|
|
|
|
|----|----------------|----------|--------|
|
|
|
|
|
|
| OSS-315 | 2024-07-16T09:30:25.000+0800 | 程思源 | 完成 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
---
|
|
|
|
|
|
|
|
|
|
|
|
1、AdGuard VPN特征提取
|
|
|
|
|
|
|
|
|
|
|
|
2、可以使用44.228环境进行特征提取,BJ环境进行误封测试
|
|
|
|
|
|
|
|
|
|
|
|
3、[https://docs.geedge.net/pages/viewpage.action?pageId=129101971]
|
|
|
|
|
|
|
|
|
|
|
|
4、[~chengsiyuan] 和[~gaojiajun] 一起进行这个软件的特征提取**wuyuanmeng** commented on *2024-08-28T17:33:19.638+0800*:
|
|
|
|
|
|
|
|
|
|
|
|
对AdGuardVPN分别在IOS、Android、Windows三个平台进行抓包分析
|
|
|
|
|
|
经分析发现该VPN使用TLS1.3协议伪造sni连接节点
|
|
|
|
|
|
使用ServerIP作为特征进行阻断
|
|
|
|
|
|
提取12个ServerIP
|
|
|
|
|
|
在228环境下对三个平台进行测试,未发现CT现象
|
|
|
|
|
|
在M Demo环境下使用安卓模拟器和远程主机进行进行复测,未发现CT现象
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2025-09-14 22:26:17 +00:00
|
|
|
|
# Attachments
|
2025-09-14 21:52:36 +00:00
|
|
|
|
|