"Penetration Testing" - Preliminary Information Collection and Tool Introduction 02 (ARL, Cwebscanner)


Subdomain Collection Tool

ARL (docker)

Introduction
Quickly detect Internet assets associated with the target and build a basic asset information database. Assist Party A's security team or penetration testers in effective reconnaissance and retrieval of assets, and discover existing weak points and attack surfaces.

characteristic

Domain name asset discovery and sorting
IP/IP segment asset sorting,
port scanning and service identification,
WEB site fingerprinting,
asset group management and search,
task strategy configuration
, task planning and periodic task
Github keyword monitoring,
domain name/IP monitoring assets,
site change monitoring,
file and other risk detection and
verification PoC call

System Requirements
Windows is not currently supported. Docker is recommended for Linux and MAC, and the minimum system configuration is 2 cores 4G.
Since a large number of contracts will be sent during the automatic asset discovery process, it is recommended to use a cloud server to bring a better package experience.

Docker start ARL

git clone https://github.com/TophantTechnology/ARL

cd ARL/docker/

docker volume create arl_db

docker-compose pull

docker-compose up -d 

insert image description here
insert image description here
insert image description here
insert image description here
insert image description here
So far, ARL has started successfully. Use the docker -ps command to view the port number mapped by the container, and use the server IP address + port number to access the ARL management background.

The default port number is 5003 (https), and the default username and password are admin/arlpass

log in page

insert image description here

Description of task options

serial number options illustrate
1 mission name mission name
2 mission target Task target, supports IP, IP segment and domain name. Multiple targets can be delivered at one time
3 Domain name blasting type For domain name blasting dictionary size, large dictionary: 20,000 dictionary size is commonly used. Test: a few dictionaries, often used to test whether the function is normal
4 port scan type ALL: all ports, TOP1000: commonly used top 1000 ports, TOP100: commonly used top 100 ports, test: few ports
5 domain blasting Whether to enable domain name blasting
6 DNS dictionary intelligent generation Generate a dictionary based on an existing domain name for blasting
7 domain lookup plug-in There are 11 supported data sources, alienvault, certspotter, crtsh, fofa, hunter, etc.
8 ARL History Query Query the results of arl historical tasks for this task
9 port scan Whether to enable port scanning, if not enabled, the site will detect 80,443 by default
10 service identification Whether to perform service identification, it may be blocked by the firewall and the result will be empty
11 OS identification Whether to identify the operating system, it may be blocked by the firewall and the result will be empty
12 SSL certificate acquisition Obtain an SSL certificate for the port
13 skip CDN For the IP that is determined as a CDN, the port will not be scanned, and ports 80 and 443 are considered to be open
14 site identification Fingerprinting a site
15 search engine call Use search engine results to crawl the corresponding URL
16 site crawler Use static crawlers to crawl the corresponding URL of the site
17 site screenshot Take a screenshot of the homepage of the site
18 file leak File leak detection on the site will be intercepted by WAF
19 Host Collision Detect improper vhost configuration
20 nuclei calls Call nuclei default PoC to detect the site, it will be intercepted by WAF, please use this function with caution

forgot password reset

When you forget the login password, you can execute the following command, and then use admin/admin123 to log in.

docker exec -ti arl_mongodb mongo -u admin -p admin
use arl
db.user.drop()
db.user.insert({
    
     username: 'admin',  password: hex_md5('arlsalt!@#'+'admin123') })

Cwebscanner C segment scanning tool

network scanner

Enter and download to the local
1. Use winscp to upload the file to the Linux system
insert image description here
2. Enter the specified directory of the Linux upload file to find Cwebscanner-master.zip and use the unzip command to decompress
insert image description here
3. Enter the decompressed Cwebscanner-master directory
insert image description here
4. Use the command python + Cwebscan.py + domain name/ip address (port 80 is scanned by default) Supports custom port scanning using the command python +Cwebscan.py + domain name/ip address-p80,8080 Note: If the other party
insert image description here
uses CDN technology, it cannot be scanned, and at the same time, the other party can be judged Using a CDN
insert image description here

Guess you like

Origin blog.csdn.net/weixin_44971640/article/details/127243150