当前位置:网站首页>Goby+awvs realize attack surface detection
Goby+awvs realize attack surface detection
2022-06-24 16:07:00 【Bypass】
An expanding range of attacks against , Enterprises need to start from the perspective of attackers , Detect the enterprise's network assets from the outside , Also on Web In depth scanning of the site , Timely identify and deal with high-risk risks , Then it can effectively converge the attack surface .
Automatic detection of attack surface through some tools , To a certain extent, it can improve the work efficiency of safety personnel , This article shares Goby+AWVS Realize attack surface detection , Now let's learn .
Use scenarios : Enterprise asset detection 、web Vulnerability scanning 、 Teamwork, etc .
01、Goby Server deployment
take Goby Deploy to the server to run , You can achieve unlimited scanning , Any member can share assets only by accessing the server , Conducive to team assistance .
(1) download Goby, decompression
wget https://gobies.org/goby-linux-x64-1.9.325.zip
unzip goby-linux-x64-1.9.325.zip(2) Background operation , Output to the specified log file
# establish .sh And write the command
/home/admin/goby-linux/golib/goby-cmd-linux -apiauth user:pass -mode api -bind 0.0.0.0:8361
# Realize screen output recording to log file
nohup sh goby.sh > info.log &(3) Local Goby client , Server management → increase , Fill in the remote server information .
02、 linkage AWVS Vulnerability scanning
(1)Goby add-in , download AWVS plug-in unit .
(2) stay Goby, Set up → Extended settings , Fill in AWVS Of API Key And address .
AWVS Of API Key Get the location as follows :
(3) stay Goby Of Web Detection inside , See the scanned assets , You can click AWVS The button , You can start the scanning task .
(4) stay AWVS Console , You can see Goby Scanning tasks issued , And the scanning task has been completed .
(5) go back to Goby client , You can see the vulnerability scanning results , Exportable vulnerability report .
边栏推荐
- 对深度可分离卷积、分组卷积、扩张卷积、转置卷积(反卷积)的理解
- Global and Chinese markets of Leyte coin exchange 2022-2028: Research Report on technology, participants, trends, market size and share
- How to expand disk space on AWS host
- Global and Chinese market of computer protective film 2022-2028: Research Report on technology, participants, trends, market size and share
- MongoDB入门实战教程:学习总结目录
- sql 多表更新数据非常慢
- 中国产品经理的没落:从怀恋乔布斯开始谈起
- 2021-04-18: given a two-dimensional array matrix, the value in it is either 1 or 0,
- Apple is no match for the longest selling mobile phone made in China, and has finally brought back the face of the domestic mobile phone
- April 26, 2021: the length of the integer array arr is n (3 < = n < = 10^4), and each number is
猜你喜欢

几种常见的DoS攻击

Three solutions for Jenkins image failing to update plug-in Center

我与“Apifox”的网络情缘

Wechat official account debugging and natapp environment building

Most common usage of vim editor
MySQL Advanced Series: Locks - Locks in InnoDB

Still worried about missing measurements? Let's use Jacobo to calculate the code coverage

【面试高频题】难度 3/5,可直接构造的序列 DP 题

Remote connection raspberry pie in VNC Viewer Mode
MySQL進階系列:鎖-InnoDB中鎖的情况
随机推荐
Implement Domain Driven Design - use ABP framework - domain logic & application logic
The decline of China's product managers: starting from the nostalgia for jobs
期货怎么开户安全些?哪些期货公司靠谱些?
Apple is no match for the longest selling mobile phone made in China, and has finally brought back the face of the domestic mobile phone
How to obtain ECS metadata
Istio FAQ: failed to resolve after enabling smart DNS
Detailed explanation of estab of Stata regression table output
Understanding openstack network
Database tools in intelij can connect but cannot display schema, tables
Recommend several super practical data analysis tools
A new weapon to break the memory wall has become a "hot search" in the industry! Persistent memory enables workers to play with massive data + high-dimensional models
转置卷积详解
一文详解JackSon配置信息
ThinkPHP 漏洞利用工具
打破内存墙的新利器成行业“热搜”!持久内存让打工人也能玩转海量数据+高维模型
What is a framework?
Mongodb Getting started Practical Tutoriel: Learning Summary Table des matières
Global and Chinese market of computer protective film 2022-2028: Research Report on technology, participants, trends, market size and share
Flink Kubernetes Application部署
Fastjson 漏洞利用技巧