当前位置:网站首页>The collection method of penetration test, and which methods can be used to find the real IP
The collection method of penetration test, and which methods can be used to find the real IP
2022-06-24 03:51:00 【Rain bamboo shoot Education】
Rain bamboo shoots education Xiaobian today teaches you how to find common in infiltration and collection work ip Methods ,11 There's always a trick for you .
One 、 Verify that... Exists CDN
No bypass CDN Penetration , It is highly possible that there are various cloud shields to block .
test method : Super Ping
Related websites :
Home of stationmaster
BOCE
explain :
There are many similar sites , The above two are very accurate and easy to use .
If there are multiple results IP There is CDN, On the contrary, there is no .
Two 、 From subdomain
principle : The main station did CDN, But the sub station does not
evaluation : This method is effective , The cost is not high
Tools : Online sub domain name mining
//z.zcjun.com/
https://phpinfo.me/domain
explain :
Since the focus of this article is not sub domain name collection , Therefore, only a few convenient .
3、 ... and 、 From address location
principle : The webmaster didn't do it in the city where the server is located CDN
evaluation : The method of hearsay , I haven't tried
Four 、 Abroad Ping
principle : The goal is not done for foreign users CDN, direct Ping Can get real IP
Tools :
https://check-host.net/check-ping?
http://port.ping.pe/
evaluation : The effect of this method is not very good , But the cost is low
Case study : See a lot of foreign servers go Ping, obtain IP Are all the same , The maximum probability is true IP
5、 ... and 、 history DNS Record
Tools :
https://viewdns.info/iphistory/?domain=
http://www.jsons.cn/nslookup/
https://securitytrails.com/domain
https://dnsdumpster.com/
https://securitytrails.com/domain/baidu.com/history/a
evaluation : This method has good effect , But it takes time to find it
Case study : Test domain name and 【 6、 ... and 】 identical
Can see , Latest records and 【 6、 ... and 】 The results are consistent .
6、 ... and 、 Get rid of 3W Dafa
evaluation : This method is effective , And no cost
Case study :https://www.xxx.com
1. Super Ping give the result as follows , There is CDN
2. When removing www when , You can get the truth IP
7、 ... and 、 Try your luck
Tools :
https://get-site-ip.com/
evaluation : The effect of this method is general , But no cost
Case study : Test domain name and 【 6、 ... and 】 identical
Can see , The results are consistent .
8、 ... and 、 adopt ICO Icon hash
principle : The picture has a unique hash , Cyberspace mapping engine will collect the whole network IP Sort and collect the information , So the information of these icons , It will naturally be collected in the target of Surveying and mapping analysis .
Tools :FOFA
evaluation : This method is effective
Case study : And 【 11、 ... and 】 It's the same domain name
1. Find the ICO route
2. Fofa You can input URL, You can also upload ico picture , Convert automatically icon_hash
3. Shodan
xxxx yes icon_hash
Search syntax :http.favicon.hash:xxxx
Nine 、 Through the mail
Take advantage of the location of useful messages in the website , For example, register to send e-mail 、 Retrieve password, send email, etc , Check the original email to find the truth IP.
Ten 、 adopt APP End
Grab through the bag grabbing tool APP Request package for , Finding truth IP.
11、 ... and 、 Pass site certificate
Case study :
1. The required site is https Of
2. Copy serial number
3. The serial number is 16 Base number , We need to convert to 10 Base number
Online conversion tools
4. Search syntax :cert=”xxxx”
Twelve 、SSL Certificate query
Tools :https://censys.io/certificates?q=
evaluation : This method has high accuracy
Case study : domain name www.xxx.com
1. Input Syntax : parsed.names: www.xxx.com and tags.raw: trusted
2. find IPv4 Hosts, Click in
3. You can see the first one
summary
It needs to be tried in many ways , Guarantee accuracy .
Today's penetration practice is shared here , There are many loopholes that will be shared later , Pay more attention to rain bamboo shoots Education .
source : Li tanran
边栏推荐
- Old popup explorer Exe has stopped working due to problems. What should I do?
- Psexec right raising
- Protect your system with fail2ban and firewalld blacklists
- Received status code 502 from server: Bad Gateway
- getLocationInWindow源码
- 老弹出explorer.exe遇到问题已停止工作,怎么办?
- halcon知识:区域(Region)上的轮廓算子(2)
- Industrial security experts talk about how to build security protection capability for government big data platform?
- Thank you for your recognition! One thank-you note after another
- 左滑从小窗到大窗口DispatchFrameLayout
猜你喜欢

Black hat SEO actual combat directory wheel chain generates millions of pages in batch

一次 MySQL 误操作导致的事故,「高可用」都顶不住了!

Idea 1 of SQL injection bypassing the security dog

SQL注入绕过安全狗思路一

【代码随想录-动态规划】T392.判断子序列

ClickHouse(02)ClickHouse架构设计介绍概述与ClickHouse数据分片设计

你了解TLS协议吗?
![[Numpy] Numpy对于NaN值的判断](/img/aa/dc75a86bbb9f5a235b1baf5f3495ff.png)
[Numpy] Numpy对于NaN值的判断

Pine Script脚本常用内容

Brief ideas and simple cases of JVM tuning - how to tune
随机推荐
Rasa 3.x 学习系列-Rasa 3.2.0 新版本发布
Received status code 502 from server: Bad Gateway
[Numpy] Numpy对于NaN值的判断
Prometheus pushgateway
What does cloud computing elasticity mean? What are its functions?
内存泄漏之KOOM-Shark中的Hprof信息
4. go deep into tidb: detailed explanation of the implementation process of the implementation plan
Technical dry goods - how to use AI technology to accurately identify mining Trojans
Interpreting Tencent cloud product experience through user experience elements
Build a small program + management background in 7 days, and this goose factory HR is blessed!
LeetCode 1281. Difference of sum of bit product of integer
halcon知识:区域(Region)上的轮廓算子(2)
开源一款监控数据采集器,啥都能监控
讲讲我的不丰富的远程办公经验和推荐一些办公利器 | 社区征文
Use lightweight application server to automatically download and upload to onedrive
LeetCode 2006. Number of pairs whose absolute value of difference is k
Several key tools for cloud native implementation
Summary of common SSH commands
Tens of millions of Android infected with malicious virus and Microsoft disabled a function of Excel | global network security hotspot on October 9
What is the difference between elasticity and scalability of cloud computing? What does elastic scaling of cloud computing mean?