当前位置:网站首页>Penetration information collection steps (simplified version)
Penetration information collection steps (simplified version)
2022-06-25 04:53:00 【Key_ Words】
First step : Domain name information collection
1.whois Information Service 、 Record information inquiry
Relevant inquiry address :
Check the inner eye :https://www.tianyancha.com/
ICP Record inquiry network :http://www.beianbeian.com/
National enterprise credit information publicity system :http://www.gsxt.gov.cn/index.html
Love station filing query :https://icp.aizhan.com
The second step : Subdomain collection
1. Side station and C Segment online query address :
http://www.webscan.cc/
https://phpinfo.me/bing.php
2. Use sub domain name excavator and other software
The third step : Fingerprint identification of websites
1. Website CMS
Relevant inquiry address :
http://www.yunsee.cn/finger.html
https://whatweb.net/
http://whatweb.bugscaner.com/look/
2. The server (Linux/Windows)
utilize URL Case judgment 、 utilize ping Address determination 、 utilize nmap -O or -A To test
3. Containers (Apache/Nginx/Tomcat/IIS)
4. Script (php/jsp/asp/aspx)
According to the website URL To judge 、 Using Google grammar :site:xxx filetype:php 、 According to Firefox To determine
5. database (Mysql(3306)/Oracle(1521)/Accees/Mqlserver(1433))
Step four : Host scan 、 Port scanning
Nessus The use of scanners
https://blog.csdn.net/qq_36119192/article/details/82852117
The common ones are 135 、137 、138 、139 、445, Vulnerabilities often break out in these ports . Port scanning tools have (Nmap、masscan)
Step five : Website missed scanning
Use AWVS、Appscan、NESSUSS And so on .
Step six : Website sensitive directories and files
Use wwwscan、 The imperial sword scans the directory
边栏推荐
- Fun CMD command line~
- 30岁了开始自学编程,家里比较困难还来得及吗?
- Code scanning payment flow chart of Alipay payment function developed by PHP
- 2.0springmvc uses restful
- 哪个编程语言实现hello world最烦琐?
- ThinkPHP 5 log management
- Student achievement management system based on SSH
- 515. find the maximum value / Sword finger offer II 095 in each tree row Longest common subsequence
- Why does the SQL statement hit the index faster than it does not?
- 2021-10-24
猜你喜欢

Deep learning - several types of learning
Triangle class (construction and deconstruction)

Successfully solved: selenium common. exceptions. TimeoutException: Message: timeout: Timed out receiving message from

buuctf(re)

Php7.2 add JPEG extension

第九章 APP项目测试(2) 测试工具

哪个编程语言实现hello world最烦琐?
三角形类(构造与析构)

基于SSH实现的学生成绩管理系统

JS' sort() function
随机推荐
OOP栈类模板(模板+DS)
What if win11 Bluetooth fails to connect? Solution of win11 Bluetooth unable to connect
How do the defi protocols perform under this round of stress test?
大话云原生数据库中的存算分离
How to open the DWG file of the computer
Integrate CDN to create the ultimate service experience for customers!
Part I Verilog quick start
Vscade setting clang format
Teach you to write non maintainable PHP code step by step
【Flink】RocksDB增量模式checkpoint大小持续增长的问题及解决
Records of ros2/dds/qos/ topics
parallel recovery slave next change & parallel recovery push change
At the age of 30, I began to learn programming by myself. Is it still time for me to have difficulties at home?
Le chemin de l'apprentissage immutable - - Adieu à la copie traditionnelle
Excel exports data to SQL and pictures to folder through macro | VBA
Leader: who can use redis expired monitoring to close orders and get out of here!
初识 Flutter 的绘图组件 — CustomPaint
Introduction to the hardest core PWN in the whole network_ Graphic analysis
Cookie & session & JSP (XII)
Separation of storage and computing in Dahua cloud native database