The importance of information gathering hindsight

collect message

When I realized the importance of information gathering penetration testing, when listening to a lesson for my own to sort out ideas, but also allows me to find myself so important step I missed something, every time I collect information new knowledge will be supplemented finishing.
classification:

* 主动信息收集
* 被动信息收集

Vulnerability Mining

When we do web penetration time, first determine a good goal, that is what we got to do is first of its domain name?
Find the corresponding domain name ip : If there is CDN should find how to get around is really ip?
For example, you can start according to the subdomain; three ways:
1. Google search syntax;
2.layer tools crawling;
3. python command-line tool;

Whois information of domain name : Love station network, home owners
, including sub-domain information-gathering

Sensitive information collection:
such sensitive directory:
a robots.txt, back catalog, the installation package (packaged website, backup, install files), upload directory,
MySQL management interface, the installation page, phpinfo (), editor, IIS file security page : install.php and so on;

The whole point of the analysis:
the type of server (platform version) : Operating system Windows / Linux (which determine the methods and tools)
script types : PHP / ASP / ASPX / JSP
1. directly from the page
2.dirbuster
3. search engine syntax (filetpye )
database type : MySQL / access / SQL server /
oracle / db2 / postgresql / website container : IIS, apache, ngnix, tomcat, etc. whatweb \ nmap tool
CMS type (keyword readme.txt bottom information) weaving dreams, Empire, dizcuz, wordpress, aspcms and other
tools: Sword web fingerprinting, whatweb and other
protective cases : waf web application level firewall (how to bypass?)

Background site directory
dictionaries blasting (kaili) dirb http: // ip target
Sword background and other tools;

Next to the station and c segment
master bad invasion - to find other web- scored webshell- on the same server to get control of the server - then won the master webshell
next station : a server with other sites
paragraph (c) : the same network segment other servers

Common tools:
Web >> K8 next station, Sword 1.5
port >> portscan

Vulnerability mining
system host: Nessus \ openvas \ Xscan
Web Vulnerability: AWVS \ OWASP ZIP \ WPSCAN

Common tools
dictionaries blasting >> Sword, dirbuster, wwwscan, IIS_shortname_scanner such as
spider crawling >> choppers, webrobot, burp and other
port scanning Metasploit >>, nmap
nmap -O target IP detection system type
nmap -sV detection target IP Type of Service - sT -sU and other
open close open close filtered masked firewall \ IDS \ IPS, etc., can not determine the status of
unfiltered not masked
commonly used ports
21/22/29 file sharing ports

22/23/3389 remote port
80/443/8080 web application port
7001/7002 container is WebLogic
3306 MySQL
1443 MSSQL
1521 Oracle
6379 Redis
25/110/143 (the IMAP)
53 is the DNS
67/68 spoofing hijacking the HDCP

Published 10 original articles · won praise 10 · views 2742

Guess you like

Origin blog.csdn.net/qq_43571759/article/details/104718987