Information collection of Web penetration - flirting with girls (Part 1)

Preface

In this vast world, there is always a goal that makes your heart beat. When you accidentally meet a beautiful woman who is attracted by your heart, needless to say, the little deer in your heart will definitely start to bump around, and the iceberg that has been frozen for a long time will start to melt.
If you want to catch the young lady, you need to do it step by step. First of all, you need to collect information. You need to know his personal information, such as his name, contact information, preferences, where he works, what industry he is in, or his home address, etc.

Collect domain name information

Usually when we want to know the name of this sweetheart, we have to find a way to get his business card, which usually introduces his name, occupation, unit, and unit address.

Here, perform a whois query on the target to check whether the domain name is registered, the registrar, and DNS. It's like looking at the other person's business card. Here are several ways to get each other’s business cards.

whois query

1. Domain name whois query-Webmaster Home

http://whois.chinaz.com/
Insert image description here
2. IP138 website

https://site.ip138.com/
Insert image description here
3. Domain name information query-Tencent Cloud

https://whois.cloud.tencent.com/Insert image description here
4、ICANN LOOKUP

https://lookup.icann.org/

Insert image description here

Filing information query

1. SEO comprehensive query

https://www.aizhan.com/cha/
Insert image description here
2. ICP Registration Query-Webmaster Tools

http://icp.chinaz.com/
Insert image description here

IP reverse check site

1、Dnslytics

Using Dnslytics to reversely check the IP, you can get the following information:

IP information
Network information
Hosting information
SPAM database lookup
Open TCP/UDP ports
Blocklist lookup
Whois information
Geo information
Country information
Update information

Using Dnslytics to reversely check the domain name, you can get the following information

Domain and Ranking Information
Hosting Information{
A / AAAA Record
NS Record
MX Record
SPF Record
}
Web Information
Whois Information

https://dnslytics.com/
Insert image description here

Related application information

1. Sky Eye Check

https://www.tianyancha.com/
Insert image description here

2. Qimai data

https://www.qimai.cn/
Insert image description here

Find real IP

CDN (content distribution network) is used on some large websites, which can make content transmission faster and more stable. , the CDN system can redirect the user's request to the service node closest to the user in real time based on comprehensive information such as network traffic and the connection and load status of each node, as well as the distance to the user and response time. Generally, CDN hides the real IP of the target server, which also improves security.
Just like when you ask someone for his name, and he tells you a fake name or nickname, it seems that he is not very interested in you. At this time, you don’t even know the real name of your sweetheart, so how can you proceed to the next step? Isn’t that cool? It's cold. Here is how to identify whether the name given to you is real or fake, and how to get the real name if a fake name is given.
Insert image description here

How to tell whether to use a CDN

1. Ping the target main domain

Determine whether to use CDN by pinging the target main domain and observing the domain name resolution. Insert image description here
Found that CDN was used.

2、Nslookup

If the resolution results of different DNS are different, it is likely that there is a CDN service. Insert image description here
3. Ping detection platform

Ping Detection-Webmaster Tools
Address: http://ping.chinaz.com/
Insert image description here

Common ways to bypass CDN

1. Ping the main domain

Some websites only allow the www domain name to use CDN, and you can remove www under ping.

Insert image description here
2. DNS history search

The CDN may have been online for a while after the website was online. You can find the real IP by looking for domain name resolution records. The following introduces several platforms
https://sitereport.netcraft.com/
Insert image description here
https://viewdns.info/
Insert image description here
Insert image description here
https://tools.ipip.net/cdn.php
Insert image description here
3. How to query subdomain names

Generally, the main site joins the CDN. Many subdomain sites do not join the CDN. They can be obtained through subdomain names. There is a detailed introduction to collecting subdomain names below. Here is an example.
https://x.threatbook.cn/ Insert image description here
4. Website email header information

For example, in functional scenarios such as email registration, email password retrieval, RSS email subscription, etc., you can send emails to yourself through the website, so that the target can actively expose their real IP, check the email header information, and obtain the real IP of the website.
Note: This must be the target's own mail server, third-party or public mail servers are not useful.

5. Cyberspace Search Engine Law

Through keywords or website domain names, you can find out the included IP. In many cases, what you get is the real IP of the website.

Eye of Zhong Kui: https://www.zoomeye.org
Shodan: https://www.shodan.io
Fofa: https://fofa.so Insert image description here
6. Website vulnerability search

Obtain the real IP through website information leakage such as phpinfo leakage, github information leakage, command execution and other vulnerabilities.

Collect subdomains

We have obtained the address and name before, so let us say our love out loud. If we fail to confess to our sweetheart, we should not give up. After all, women who are not available like this are so fragrant. If we know his workplace or home address before, we can start with his colleagues or neighbors. This is usually easier to get girls. information to help you understand him more deeply. Maybe I can win over this aloof woman with some kind words from my colleagues or neighbors.

Online platform

1、IP138

https://site.ip138.com/
Insert image description here

2. Webmaster Tools

http://tool.chinaz.com/subdomain/?domain=
Insert image description here
3、hackertarget

https://hackertarget.com/find-dns-host-records/
Insert image description here
4、phpinfo

https://phpinfo.me/domain/
Insert image description here
5、dnsdumpster

https://dnsdumpster.com/

Insert image description here
6、zcjun

http://z.zcjun.com/

Insert image description here
7、Censys

https://censys.io/certificates?q=

Insert image description here

IP reverse check binding domain name website

1、something

http://s.tool.chinaz.com/same?s=

Insert image description here
2. Love Station

https://dns.aizhan.com/
Insert image description here
3、webscan.cc

https://www.webscan.cc/
Insert image description here

Asset search engine

Personally commonly used ones include Google and FOFA, but you can also use Shodan and zoomeye.

1. Google Grammar

Common grammar

site :指定搜索域名 例如:site:baidu.com
inurl : 指定url中是否存在某些关键字 例如: inurl:.php?id=
intext :  指定网页中是否存在某些关键字 例如:intext:网站管理
filetype : 指定搜索文件类型 例如:filetype:txt
intitle :  指定网页标题是否存在某些关键字 例如:intitle:后台管理
link : 指定网页链接 例如:link:baidu.com 指定与百度做了外链的站点
info : 指定搜索网页信息 info:baidu.com

2. FOFA syntax

You can click Query Syntax on the home page to view it.
Insert image description here

Tool enumeration

Commonly used here are sublist3r, OneForAll, and subDomainsBrute.

1、sublist3r

下载地址:https://github.com/aboul3la/Sublist3r

Insert image description here
2、OneForAll

下载地址:https://github.com/shmilylty/OneForAll
After the operation is completed, a csv file will be generated
Insert image description here

3、subDomainsBrute

下载地址:https://github.com/lijiejie/subDomainsBrute

Insert image description here

Use DNS collection

Common DNS records include the following categories:

A记录       IP地址记录,记录一个域名对应的IP地址
AAAA记录    IPv6地址记录,记录一个域名对应的IPv6地址
CNAME记录   别名记录,记录一个主机的别名
MX记录      电子邮件交换记录,记录一个邮件域名对应的IP地址
NS记录      域名服务器记录 ,记录该域名由哪台域名服务器解析
PTR记录     反向记录,也即从IP地址到域名的一条记录
TXT记录     记录域名的相关文本信息
MX记录: 建立电子邮箱服务,将指向邮件服务器地址,需要设置MX记录。建立邮箱时,一般会根据邮箱服务商提供的MX记录填写此记录。

Insert image description here
NS record: Domain name resolution server record. If you want to specify a subdomain name server for resolution, you need to set an NS record.

Insert image description here
SOA record: SOA is called the starting authority record, NS is used to identify multiple domain name resolution servers, and SOA record is used to determine which one of the many NS records is the main server.
Insert image description here
TXT record: Can be filled in arbitrarily or left blank. This item is generally used when making some verification records, such as making SPF (anti-spam) records.

Insert image description here
DNS domain transfer vulnerability

1. Principle: DNS servers are divided into: main server, backup server and cache server. To synchronize the database between the primary and secondary servers, you need to use "DNS domain transfer". Domain transfer means that the backup server copies data from the primary server and updates its own database with the obtained data.

If the DNS server is not configured properly, an attacker may obtain all records for a domain. Leaking the entire network topology to potential attackers, including some less secure internal hosts such as test servers. At the same time, hackers can quickly identify all hosts in a specific zone, collect domain information, select attack targets, find unused IP addresses, and bypass network-based access control.
2.
Basic process of DNS domain transfer vulnerability detection

  1. nslookup #Enter interactive shell
  2. server dns.xx.yy.zz #Set the DNS server to be used for query
  3. ls xx.yy.zz #List all domain names in a certain domain
  4. exit #Exit
    vulnerability detection-no vulnerability exists

Insert image description here

Site information collection

Darling, is it easy to flirt with girls now? Next, let’s find out about her hobbies, whether she likes to exercise, go to entertainment venues, or stay at home, where she goes when she goes out to play, what she likes to eat, etc. Be prepared for our next offensive. I don’t believe we can’t win the heart of the young lady.

Insert image description here

Determine whether the other party is win or Linux

1. TTL value

You can check it through ping, but it may not be very accurate and can be modified. The default value is 64 for Linux and 128 for win
:
Insert image description here
Linux:
Insert image description here
2. Nmap

Use command:
nmap -O IPInsert image description here

Port collection

nmap

nmap -sV -p 1-65535 IP  # ping目标有回复时
nmap -sV -p 1-65535 -Pn IP  # ping目标没有回复时

CMS fingerprint identification

CMS (Content Management System) is used for website content management. By identifying the CMS type, you can check the corresponding vulnerabilities and take down the site.
Nowadays, some online websites query CMS fingerprint recognition, as follows:
BugScaner: http://whatweb.bugscaner.com/look/Tide
Fingerprint: http://finger.tidesec.net/Cloud
: http:// www.yunsee.cn/info.html
WhatWeb: https://whatweb.net/Yunsee
Fingerprint: http://www.yunsee.cn/finger.html
WhatWeb: https://whatweb.net/
Insert image description here

directory scan

1. Yujian Scan
Insert image description here
2. dirbuster

First enter the URL to be scanned in the Target URL input box and set the request method during the scanning process to "Auto Switch (HEAD and GET)".
Set up the thread yourself (too large may cause the system to crash)
and select the scan type. If you use a personal dictionary to scan, select the "List based bruteforce" option.
Click "Browse" to load the dictionary.
Standalone "URL Fuzz", select URL fuzz testing (if you don't select this option, use standard mode) and
enter "/{dir}" in URL to fuzz. {dir} here is a variable used to represent each line in the dictionary. {dir} will be replaced by the directory in the dictionary at runtime.
Click "start" to start scanning.
Insert image description here
You can also use kali's own
Insert image description here
3. dirscan.

Download address: https://github.com/j3ers3/Dirscan
Insert image description here
4. dirsearch

Download address: https://github.com/maurosoria/dirsearch
Insert image description here

Google Hacking

Its basic syntax is introduced above, and its typical usage is introduced below:

Find the specified backend address

site:xx.com intext:管理 | 后台 | 后台管理 | 登陆 | 登录 | 用户名 | 密码 | 系统 | 账号 | login | system

site:xx.com inurl:login | inurl:admin | inurl:manage | inurl:manager | inurl:admin_login | inurl:system | inurl:backend

site:xx.com intitle:管理 | 后台 | 后台管理 | 登陆 | 登录

Check the file upload vulnerabilities of the specified website

site:xx.com inurl:file

site:xx.com inurl:load

site:xx.com inurl:upload

Inject page

site:xx.com inurl:php?id=

Directory traversal vulnerability

site:xx.com intitle:index.of

SQL error

site:xx.com intext:"sql syntax near" | intext:"syntax error has occurred" | intext:"incorrect syntax near" | intext:"unexpected end of SQL command" | intext:"Warning: mysql_connect()" | intext:”Warning: mysql_query()" | intext:”Warning: pg_connect()"

phpinfo()

site:xx.com ext:php intitle:phpinfo "published by the PHP Group"

Configuration file leaked

site:xx.com ext:.xml | .conf | .cnf | .reg | .inf | .rdp | .cfg | .txt | .ora | .ini

Database file leak

site:xx.com ext:.sql | .dbf | .mdb | .db

Log file leak

site:xx.com ext:.log

Backup and historical file leaks

site:xx.com ext:.bkf | .bkp | .old | .backup | .bak | .swp | .rar | .txt | .zip | .7z | .sql | .tar.gz | .tgz | .tar

Public document leaks

site:xx.com filetype:.doc | .docx | .xls | .xlsx | .ppt | .pptx | .odt | .pdf | .rtf | .sxw | .psw | .csv

Email information

site:xx.com intext:@xx.com
site:xx.com 邮件
site:xx.com email

social work information

site:xx.com intitle:账号 | 密码 | 工号 | 学号

Query which applications the user has registered through some of the user's information (Mail, Name, ID, Tel)
https://www.reg007.com/

Github information leak

Many websites and systems use pop3 and smtp to send emails. Many developers will also put relevant configuration file information on Github due to lack of security awareness. Therefore, if we use Google search syntax at this time, we can put these sensitive The information was found.

site:Github.com smtp
site:Github.com smtp @qq.com
site:Github.com smtp @126.com
site:Github.com smtp @163.com
site:Github.com smtp @sina.com.cn

Database information leakage:

site:Github.com sa password
site:Github.com root password

Summarize

Of course, if you want to win over the young lady, you have to do it step by step. The previous information collection work is very important. From choosing a target at the beginning, to obtaining simple personal information, how to see if the other party is cheating on you, and then if the refusal fails, start with the people around him. It can be said that the collection work plays a crucial role in pursuing success.
It is mainly used for novices to exchange experiences with each other, so that experienced drivers can continue driving.

Guess you like

Origin blog.csdn.net/qq_32277727/article/details/131883456