first
This commit is contained in:
32
md/OSS-315.md
Normal file
32
md/OSS-315.md
Normal file
@@ -0,0 +1,32 @@
|
||||
# 【M22项目】AdGuard VPN特征提取
|
||||
|
||||
| ID | Creation Date | Assignee | Status |
|
||||
|----|----------------|----------|--------|
|
||||
| OSS-315 | 2024-07-16T09:30:25.000+0800 | 程思源 | 完成 |
|
||||
|
||||
|
||||
---
|
||||
|
||||
1、AdGuard VPN特征提取
|
||||
|
||||
2、可以使用44.228环境进行特征提取,BJ环境进行误封测试
|
||||
|
||||
3、[https://docs.geedge.net/pages/viewpage.action?pageId=129101971]
|
||||
|
||||
4、[~chengsiyuan] 和[~gaojiajun] 一起进行这个软件的特征提取**wuyuanmeng** commented on *2024-08-28T17:33:19.638+0800*:
|
||||
|
||||
对AdGuardVPN分别在IOS、Android、Windows三个平台进行抓包分析
|
||||
经分析发现该VPN使用TLS1.3协议伪造sni连接节点
|
||||
使用ServerIP作为特征进行阻断
|
||||
提取12个ServerIP
|
||||
在228环境下对三个平台进行测试,未发现CT现象
|
||||
在M Demo环境下使用安卓模拟器和远程主机进行进行复测,未发现CT现象
|
||||
|
||||
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
||||
## Attachments
|
||||
|
||||
Reference in New Issue
Block a user