外网

linux 主机探测

for i in 10.0.1.{1..254}; do if ping -c 3 -w 3 $i &>/dev/null; then echo $i Find the target; fi; done

FOFA

后台挖掘 title="后台" && body="password" && host="x.cn"
子域名 title!="404" && title!="302" && host="x.cn"
C段 ip="x.x.x.x/24" && body="password" [登录场景]
框架特征 body="icon-spring-boot-admin.svg" [Spring Boot Admin]
漏洞 body="Index of /" [列目录漏洞]

正则选域名、IP

[a-zA-Z0-9]{1,62}(\.[a-zA-Z]{1,62})+\.?

behinder 免杀生成

https://github.com/Tas9er/ByPassBehinder
https://mp.weixin.qq.com/s?__biz=MzA4NzU1Mjk4Mw==&mid=2247484096&idx=1&sn=487a1f9daf0090071913aeceeb266d53&chksm=9036e478a7416d6ebced132fe4a03bb1d2584d7fb3eb433612151648743322ff900ae849d572&scene=126&sessionid=1655083196&key=7587a6a30786f155beb410247a0f7aa382808b74d907c210f7f2ae8dc8960ce8f3a89470352b16c145d30fe40d4923b732472e633c749116f81ff4cceea52190962d2700a75e8ef4b7a5c6312ec3e9a5ba98e741fbcfe9cc6dda1c0f80adaaf7f7e74957a37ee3f225514be0448e9a7bf82167773a6fc5f55f7f6a2d650b9689&ascene=15&uin=MTM1NzU2MDQ1OQ%3D%3D&devicetype=Windows+Server+2016+x64&version=63060012&lang=zh_CN&session_us=gh_def6524a5357&exportkey=A%2FGrgZa9%2Fa500CmS8xvxMJI%3D&acctmode=0&pass_ticket=CjEhAC2W%2FwUL3Nvx4G4A%2B2FL3jUI7KtSjGubH9NsA0cNGAXA1V%2Ba4hH3Kg2%2BTktU&wx_header=0&fontgear=2
posted @   xiaowawaya  阅读(1634)  评论(0编辑  收藏  举报
相关博文:
阅读排行:
· 25岁的心里话
· 闲置电脑爆改个人服务器(超详细) #公网映射 #Vmware虚拟网络编辑器
· 基于 Docker 搭建 FRP 内网穿透开源项目(很简单哒)
· 零经验选手,Compose 一天开发一款小游戏!
· 一起来玩mcp_server_sqlite,让AI帮你做增删改查!!
点击右上角即可分享
微信分享提示