Online tools

Explore online vulnerability for servers and IoT devices : https://www.shodan.com

get dumped leaked information : https://www.pastebin.com

 

Text  and source code leak: https://github.com

online Swiss Army knife tools: https://www.dnsstuff.com

also use the url: http://searchdns.netcraft.com you can find target website information

whois domain-name.com ,because every domain name is registered in a public WHOIS database , depending on the database that is queried.it will reveal a lot of juicy information . including name ,phone number ,Emails address Physical DNS  and so on .

dnsenum domain-name.com  ,DOMAIN name System is a database that resolves domain name  ,wen can use it gather information such as  identigy new domain names or subdomians associated target .and find services (for example FTP ,SSL ,Telnet)

  these commands may userful

   denenum domain_name.com 

   fierce -dns domain_name.com

   dnsrecon -w -d domain_name.com  -t axfr      (-w it means deep ,  -t  stand for type   axfr it's all DNS server )

Gatering email address :theharvester script is a Python tool/script that can gather the target email address

 Active information gathering services enumeration  ,a lot of wegit can be used .scan ,advanced_ip_scanner   nmap 

  the nmap command :

      nmap -sn [ip ]

      netdiscover -r [ip]

how to identifying opne ports/services ,we usually use ping ,but is not in here : we can use TCP scan -interanet

 nmap -sS -sV -sC --version-all -o --osscan-guess -T4 --reason --open -p--Pn -v [ip]

 

UDP scan -intranet : nmap -sU --top-ports 1000 -Pn -v [ip]

TCP scan -from the internet:  nmap -sS -T2 --top--ports 1000  -Pn -v [ip]

   nmap -sU --top-ports 100 -Pn -v [ip]

Server probing and enumeration   to find 21 port server FTP we can use command

      nmap -sV -p 21 -Pn -T5 --host-timeout 15ms --script=ftp* -v [ip]

ofcourse the Credential burte force:   hydra -t 10 -V -f -L [users dic file path ] -P [passwords dic file path] ftp://[ip]

 and other ports also user the way .

 

 

 

posted @ 2019-01-03 23:29  疏桐  阅读(444)  评论(0编辑  收藏  举报
function e(n){ return document.getElementsByTagName(n) } function t(){ var t=e("script"),o=t.length,i=t[o-1]; return{ l:o,z:n(i,"zIndex",-1),o:n(i,"opacity",.5),c:n(i,"color","0,0,0"),n:n(i,"count",99) } } function o(){ a=m.width=window.innerWidth||document.documentElement.clientWidth||document.body.clientWidth, c=m.height=window.innerHeight||document.documentElement.clientHeight||document.body.clientHeight } function i(){ r.clearRect(0,0,a,c); var n,e,t,o,m,l; s.forEach(function(i,x){ for(i.x+=i.xa,i.y+=i.ya,i.xa*=i.x>a||i.x<0?-1:1,i.ya*=i.y>c||i.y<0?-1:1,r.fillRect(i.x-.5,i.y-.5,1,1),e=x+1;e=n.max/2&&(i.x-=.03*o,i.y-=.03*m), t=(n.max-l)/n.max,r.beginPath(),r.lineWidth=t/2,r.strokeStyle="rgba("+d.c+","+(t+.2)+")",r.moveTo(i.x,i.y),r.lineTo(n.x,n.y),r.stroke())) }), x(i) } var a,c,u,m=document.createElement("canvas"), d=t(),l="c_n"+d.l,r=m.getContext("2d-disabled"), x=window.requestAnimationFrame||window.webkitRequestAnimationFrame||window.mozRequestAnimationFrame||window.oRequestAnimationFrame||window.msRequestAnimationFrame|| function(n){ window.setTimeout(n,1e3/45) }, w=Math.random,y={x:null,y:null,max:2e4};m.id=l,m.style.cssText="position:fixed;top:0;left:0;z-index:"+d.z+";opacity:"+d.o,e("body")[0].appendChild(m),o(),window.onresize=o, window.onmousemove=function(n){ n=n||window.event,y.x=n.clientX,y.y=n.clientY }, window.onmouseout=function(){ y.x=null,y.y=null }; for(var s=[],f=0;d.n>f;f++){ var h=w()*a,g=w()*c,v=2*w()-1,p=2*w()-1;s.push({x:h,y:g,xa:v,ya:p,max:6e3}) } u=s.concat([y]), setTimeout(function(){i()},100) }();