当前位置:网站首页>Yiwen teaches you Kali information collection
Yiwen teaches you Kali information collection
2022-06-27 02:25:00 【The end of the world and you】
Yiwen teaches you Kali information gathering
1.Kali Introduce
Kali Linux Is based on Debian Of Linux Distribution version , Designed for digital forensics and penetration testing and Hacker attack and defense . from Offensive Security Ltd Maintenance and funding . By the first Offensive Security Of Mati Aharoni and Devon Kearns By rewriting BackTrack To complete ,BackTrack They wrote it for forensics Linux Distribution version .
Kali Linux Many penetration test software are pre installed , Include nmap ( Port scanner )、Wireshark ( Packet analyzer )、John the Ripper ( Password cracker ), as well as Aircrack-ng ( A set of software for wireless LAN penetration test ). Users can use the hard disk 、live CD or live USB function Kali Linux.Metasploit Of Metasploit Framework Support Kali Linux,Metasploit A set of development and execution tools for remote hosts Exploit Code tools .
2. Common tools for information collection
- Robots File detection
- DNS information gathering
- Sensitive directory detection
- Port detection
- Whole station identification
- Waf Probe
- Use of tool type stations
- Google grammar
3.Robots file
Get the live file of the hidden sensitive directory of the website
such as : The installation directory , Upload directory , Editor Directory , Management directory , Management page, etc
View method examples :
www.baidu.com/robots.txt
4.DNS collect
Collect website domain name information , Such as subdomain name , Other domain names , Resolution server , Area transfer vulnerability, etc
Commonly used tools :dnsenum、dig、fierce
Whois Information gathering
example :
whois Website domain name
dnsenum
dnsenum
You can guess the possible domain names through the dictionary or Google , And reverse check a network segment .
for example :
dnsenum --enum cracer.com
Besides , It also has three parameters :
- -r Allows users to set recursive queries
- -w Allow users to set whois request .
- -o Allows the user to specify the input file location
fierce
fierce
The tool is mainly used to scan sub domain names and collect information . Use fierce
The tool gets all the data on a target host ip Address and host information . You can also test for zone transfer vulnerabilities .
for example :
fierce -dns baidu.com
--wordlist
Specify a dictionary
fierce -dns ns9.baidu.com --wordlist host.txt /tmp/12.txt
dig
dig
Tools are also popular dns Investigative tools
example :
dig www.cracer.com # Inquire about dns
dig -t ns cracer.com # Find the authorization to resolve the domain name dns
5. Sensitive directory detection
Directory brute force cracking tool dirb
dirb
Tool is a very easy-to-use tool for guessing directory violence , Bring your own powerful dictionary
example :
dirb http://www.cracer.com
dirb https://www.cracer.com
dirb http://www.cracer.com /usr/wordlist.txt
Directory brute force cracking tool dirbuster
dirbuster
Tool is a very easy-to-use tool for guessing directory violence , Bring your own powerful dictionary
6. Whole station identification
whatweb
Used to identify websites cms And tools for the platform environment
example :
whatweb -v http://www.cracer.com
Can identify the platform of the website 、 Script 、cms、 Containers 、 Database and other information
7.WAF distinguish
wafw00f
Used to identify websites waf A tool for
example :
wafw00f www.qufu123.com
The following test results represent that the website does not exist Waf:
8. Comprehensive scanning tool DMitry
DMitry(Deepmagic Information Gathering Tool) It is an integrated information collection tool . It can be used to collect the following information :
- Port scanning
- whois host IP And domain information
- from Netcraft.com Get host information
- subdomain
- The email address contained in the domain name
Although this information can be found in Kali Through a variety of tools , But use DMitry The collected information can be saved in a file , Convenient view .
example :
dmitry -wnpb cracer.com
dmitry -winse cracer.com Scan website registration information
dmitry -p cracer.com -f -b View the host open port
All the tools are just AIDS , The real strength still depends on yourself , Bear in mind , Don't be a script boy
边栏推荐
- Flink学习4:flink技术栈
- pytorch_grad_cam——pytorch下的模型特征(Class Activation Mapping, CAM)可视化库
- TopoLVM: 基于LVM的Kubernetes本地持久化方案,容量感知,动态创建PV,轻松使用本地磁盘
- Flink learning 5: how it works
- Oracle/PLSQL: VSize Function
- Oracle/PLSQL: Replace Function
- svg拖拽装扮Kitty猫
- Oracle/PLSQL: Translate Function
- memcached基礎12
- Paddlepaddle 20 implementation and use of exponentialmovingaverage (EMA) (support static graph and dynamic graph)
猜你喜欢
Docker deploy redis cluster
Calculation of average wind direction and speed (unit vector method)
Look! In June, 2022, the programming language ranking list was released! The first place is awesome
Canvas particles: mouse following JS effect
执念斩长河暑期规划
ConstraintLayout(约束布局)开发指南
Flink学习2:应用场景
Cvpr2022 | pointdistiller: structured knowledge distillation for efficient and compact 3D detection
pytorch_grad_cam——pytorch下的模型特征(Class Activation Mapping, CAM)可视化库
Is the division of each capability domain of Dama, dcmm and other data management frameworks reasonable? Is there internal logic?
随机推荐
Mmdetection uses yolox to train its own coco data set
Microsoft365开发人员申请
Oracle/PLSQL: Ltrim Function
Learn Tai Chi Maker - mqtt (VIII) esp8266 subscribe to mqtt topic
Oracle/PLSQL: NumToYMInterval Function
jwt的认证流程和使用案例
Oracle/PLSQL: Rtrim Function
Constraintlayout Development Guide
Oracle/PLSQL: CharToRowid Function
Why pass SPIF_ Sendchange flag systemparametersinfo will hang?
Flink Learning 2: Application Scenarios
paddlepaddle 21 基于dropout实现用4行代码dropblock
docker部署redis集群
STM32入门介绍
TechSmith Camtasia最新2022版详细功能讲解下载
dat.gui.js星星圆圈轨迹动画js特效
Oracle/PLSQL: Cast Function
Oracle/PLSQL: To_Clob Function
C # check whether the date is in the correct format
bluecms代码审计入门