Hello universe!
于是,就懂得了,有时候,重复让人踏实,新鲜反而让人无感。
- Reconnaissance(侦察)
- Passive/Semi-Passive(被动/半被动信息收集)
- Third Party Resources(第三方资源们)
- Locate Target Range
- ARIN - https://www.arin.net/
- Fingerprint Domain/Website(收集域名/网站指纹)
- Shodan - https://www.shodan.io/
- Censys - https://www.censys.io/
- Zoomeye - https://www.zoomeye.org
- Netcraft - https://www.netcraft.com/
- Extended Network Information(加强版网络信息)
- Central Ops - https://centralops.net/co/DomainDossier.aspx
- Robtex - https://www.robtex.net/
- Metasploit Scanning(Metasploit扫描)
- auxiliary/scanner/*
- portscan/tcp
- http/http_version
- http/tomcat_enum
- http/trace_axd
- Google - site:
filetype:axd OR inurl:trace.axd - Command Line Recon(命令行侦察)
- Network Information (网络信息)
- nslookup
- DNS cache snooping
- dig
- Security Mechanisms (安全机制)
- halberd
- Metadata(元数据)
- exiftool
- strings
- strings -e b (big endian) OR -e l (little endian)
- People Search(搜人)
- Yahoo People Search - http://itools.com/tool/yahoo-people-search
- Switchboard - http://www.switchboard.com/person
- Google Finance - https://www.google.com/finance
- Zaba - http://www.zabasearch.com/
- Active(主动信息收集)
- Command Line Recon Tools(命令行侦察工具们)
- General Recon(通用侦察手段)
- Recon-NG
- Automated with https://github.com/jhaddix/domain
- Domain/Subdomain Information(域名/子域名信息)
- Fierce
- The Harvester
- Dirb
- Dirbuster
- Nmap
- nmap -Pn -sSU -sV –top-ports 20
- Create Custom Worldlist(建立自定义字典)
- Software(软件们)
- FOCA
- SPARTA
- Maltego
- Dirbuster
- Browser Extensions(浏览器插件们)
- Chrome
- Firefox
- Safari
- Google Searching(Google高级搜索)
- site:”target name” jobs,careers,openings,etc
- intitle:”index of
“
- Keyword
- .bash_history
- etc/shadow
- finances.xls(x)
- htpasswd
- inurl:maillog
- site:.edu filetype:.bak OR
- Keyword
- *.conf
- *.backup
- Enumeration(信息枚举)
- Internal(内部网络)
- Scanning(扫描)
- Map Internal Network(建立内网拓扑)
- Command Line Tools(命令行工具们)
- arp -a
- ip neigh show
- smbtree -NS 2>/dev/null
- nbtscan -r
- netdiscover -r
- nmap -n -Pn -T5 -sS
- nmap NSE scripts
- NFS
- SMB
- Pivoting(跳板/转发)
- SSH Proxy Tunneling with Proxychain
- External(外部网络)
- Scanning(扫描)
- Nmap
- Unicornscan
- OneTwoPunch
- Combines nmap and unicorn scan https://github.com/superkojiman/onetwopunch/blob/master/onetwopunch.sh
- Exploitation(漏洞利用)
- External(外部网络)
- Web Vulnerability Scanners(Web漏洞扫描器们)
- Burp
- Wapiti
- w3af
- Nikto
- Framework(框架)
- web2attack
- Command Line Tools(命令行工具们)
- Internal(内部网络)
- LAN Attacks(LAN攻击)
- Local Python Server -
- Serve Shells/Exploits(建立Shell和Exploits下载站)
- python -m SimpleHTTPServer
- python3 -m http.server
- php -S
: - LLMNR/NBT-NS Poisoning(LLMNR/NBT-NS投毒)
- Responder - https://github.com/SpiderLabs/Responder
- Listen/respond to LLMNR NBTNS requests
- Local Vulnerability Scanning(本地漏洞扫描)
- LinEnum- https://github.com/rebootuser/LinEnum
- Unix-privesc-check
- Linux_Exploit_Suggester
- Comprehensive Linux Enumeration(详细,全面的Linux枚举)
- Bypass AV(反病毒软件绕过)
- PowerSploit - Python Powershell Shell
- Download Files via Command Line(通过命令行下载文件)
- Reverse Shells(反向Shell)
- Attack Tools(攻击工具)
- Post-Exploitation(后渗透阶段)
- Comprehensive Wiki
- Pivoting(跳板/平移)
- Stealing Hashes(窃取hashes)
- Password Sniffing(密码嗅探)
- Tcpdump
- tcpdump -i eth0 port http or port ftp or port smtp or port imap or port pop3 -l -A | egrep –i ‘pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=||name=|name:|pass:|user:|username:|password:|login:|pass |user ‘ –color=auto –line-
- Ngrep
- ngrep -q -W byline “GET|POST HTTP”
- Dsniff
- dsniff -m
- Attack Frameworks/Tools(攻击框架/工具)
- Empire
- Armitage
- Privilege Escalation(权限提升)
- PowerSploit - https://github.com/PowerShellMafia/PowerSploit
- Download Files via Command Line(通过命令行下载文件)
- Information Gathering(信息收集)
- LinEnum - http://www.rebootuser.com/?p=1758
- privilege-escalation-awesome-scripts-suite - https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite
- Exfiltration(撤出)
- Detection Capabilities(探测能力)
- Egress-Assess
- Outbound Port Detection (find unfiltered outbound connections)(探测出端口,指找到未被过滤的出口连接)
- Network Exfiltration(网络撤出)
- Phishing(钓鱼)
- Important: Immediately pivot from initial host(重要:应尽快从最初入侵的主机跳转/平移出去)
- Tools(工具们)
- Initial Access Techniques(建立初始入侵的技术们)
- Office Macros
- Tools for Internal Use(内部使用的工具)
- PowerView - stealuserhunter
- Misc.(杂项)
- Find Exploits(查找漏洞利用)
- Linux
- Command line
- searchsploit -e Windows 7
- searchsploit windows 2007 | grep -i local
- Web
- Exploit-db
- Packet Storm
- Various Automation(各种自动化工具)