WEB penetration commonly used tool - learning Notes

Reconnaissance tool:

httrack: Copy URL information

Scan tool :( proxy mode and active scanning mode)

Nobody

nikto -update # Masu级 nikto 插件

nikto -list-plugins # View plug-in

nikto -host http: //1.1.1.1# scan the specified URL address

nikto -host 192.168.1.2 -port 80,443 # specified IP and port

nikto -host 192.168.1.2 -port 443 -ssl # support https scanning

nikto -host host.txt # import batch scanning

nmap -p80 192.168.1.0/24 -oG - | nikto -host - # find all open ports 80 and 11 IP scan

nikto -host 192.168.1.1 -useproxy http: // localhost: 8087 # using a proxy to scan

nobody -vhost

When nikto being scanned commonly used shortcut keys:

space-report current scan status # report the current scan status

v - verbose mode on / off # show details

d - debug mode no / off # debug information

Error e -error reporting on / off # scan

p - progress reporting on / off # scan progress

r - redirect display on / off # redirect display information

c - cookie display on / off # display cookie

a - auth display on / off # display authentication process

q -quit # exit

N - at a host next host #

P - Pause # pause

nikto configuration (/etc/nikto.conf)

STATIC-COOKIE = "cookie1" = "cookie value"; "cookie2" = "cookie value" # Scan Authentication URL when you need to set a cookie value

-evasion x (1-8): Use in LibWhisker evasions of the IDS can be used the following types:

1, a random URL encoding (non UTF-8 mode)

2, since the path selection (/../)

3, premature spend the night URL

4, a long random string priority

5, parameters cheat

6, as a command using the TAB delimiter

7, using the change of URL

8, using the Windows path separator "\"

 

Vega graphical scanning tool (scan mode, proxy mode)

Set external agent:

user-Agent deleted information

After opening the scan, login required crawling target sites, each page manual crawling

Information crawled taken:

Add Scan Scope

Start scanning

Select the scanning module

Fill in the authentication information site (if login authentication URL is not blank):

All the way next start scanning:

For data communications between a truncated, modified data:

 

Skipfish (only supports active mode)

Advantages: detecting dictionary, faster (multiple single-threaded, full asynchronous network I / O, memory management and scheduling overhead elimination), heuristic automatic content identification, relatively low false alarm rate based.

skipfish -o test http://1.1.1.1 # -o output directory

skipfish -o test @ url.txt # url address file, scan multiple URLs targets

skipfish -o test -S complet.wl -W a.wl http://1.1.1.1 # -S -W specified dictionary to record the current directory feature characters that can be found in the dictionary left-use scanning hidden directory

-I: check only the URL contains a 'string' of

-X: Do not check the URL contains 'string' of

-K: not specified parameters Fuzz testing

-D: Cross-site climb another domain

-l: The maximum number of requests per second

-m: The maximum number of concurrent connections per IP

--config: specify the configuration file

Authentication:

skipfish -A user:pass -o test http://1.1.1.1 #使用账号密码进行身份认证扫描

skipfish -C "name=val" -o test http://1.1.1.1 #使用cookie进行身份认证扫描

 

发布了38 篇原创文章 · 获赞 10 · 访问量 10万+

Guess you like

Origin blog.csdn.net/winux123/article/details/103571771