Recon ASRC Conference

场景

ASRC漏洞挖掘

方法论

1、Brands

https://www.crunchbase.com/

https://en.wikipedia.org

Footers & about us: https://www.alibaba.com/

  • ASNs

https://bgp.he.net

http://viewdns.info/reversewhois/

Search unique identifier:

Name

Registered Email

  • Search Engine Dorks

Google、bing、baidu、DuckDuckGO

GHDB: https://www.exploit-db.com/google-hacking-database/

扫描二维码关注公众号,回复: 5960528 查看本文章
  • Search Engines for Servers

shodan

censys

zoomeye

2、Subdomain

  • Subdomain Discovery

https://dnsdumpster.com/

Subfinder

Amass

Aquatone

  • Subdomain Bruteforcing

subbrute

massdns

subfinder

All.txt - JHaddix

  • Fingerprinting

Wappalyzer

Builtwith

Vulners

WPScan

droopescan

3、Mapping

Directory brute forcing:
GoBuster
Burp Discover Content
Search engine dorks

4、Hack

5、Recon again!

猜你喜欢

转载自www.cnblogs.com/17bdw/p/10743565.html