1, attack target: http://duwei19921019.vicp.cc:8881/
Note Points for information collection:
Site is static/dynamic
Which scripting languages are developed
Types of Web servers
is CMS, if so, what is the name of the CMS?
Whether CDN is turned on
Website Real IP
Do you have a robots.txt file
Port/Server Open condition
2, Random point open a picture link, http://duwei19921019.vicp.cc:8881/affiche.php?ad_id=32&uri=
See a Dynamic Web site developed by PHP.
3, randomly enter a nonexistent address. Http://duwei19921019.vicp.cc:8881/go
Appeared 404, also feedback out the website used to the nginx
can also be passed, http://fuwuqixitongshibie.51240.com/
4, the site query, directly in the query box input http://duwei19921019.vicp.cc:8881/query now has expired
5, can be through http://whatweb.bugscaner.com/
Online CMS recognition can be identified, such as www.freebuf.com for WordPress.
Some of them are ecshop.
6. Detect the presence of robots.txt files Http://duwei19921019.vicp.cc:8881/robots.txt
Verify the existence of cdn:ping this domain name, see the address and domain name is not the original ping itself, such as our 51cto is enabled CDN
C:\users\li>ping www.51cto.com
Pinging web.dns.51cto.com [118.144.78.52] with 32 bytes of
Reply from 118.144.78.52: Byte =32 time =21ms ttl=51
Reply from 118.144.78.52: Byte =32 time =22ms ttl=51
Reply from 118.144.78.52: Byte =32 time =23ms ttl=51
7. Online Port scan: http://tool.chinaz.com/port/default.aspx
or locally with Nmap scan
Example: Nmap-n-pn www.51cto.com
Starting Nmap 6.46 (http://nmap.org) at 2015-09-21 23:47 China Standard Time
Nmap Scan Report for www.51cto.com (118.144.78.54)
Host is up (0.039s latency).
Other addresses-www.51cto.com (not scanned): 118.144.78.52
Not shown:986 closed ports
PORT State SERVICE
80/TCP Open http
111/TCP Open Rpcbind
135/tcp Filtered Msrpc
139/tcp Filtered NETBIOS-SSN
256/tcp Filtered Fw1-secureremote
445/tcp Filtered Microsoft-ds
593/tcp Filtered Http-rpc-epmap
1025/tcp Filtered Nfs-or-iis
3268/tcp Filtered Globalcatldap
3269/tcp Filtered Globalcatldapssl
3283/tcp Filtered Netassistant
3333/TCP Open Dec-notes
4444/tcp Filtered krb524
6129/tcp Filtered Unknown
Nmap done:1 IP Address (1 host up) scanned in 2.88 seconds
Do not easily use large tools to go directly to the power scan or some scan frequently scanning tool, it is likely to be directly to the website IP
Either the agent or the online scan.
After the information is collected, the classification is stored.
There is no useless information, only a momentary useless information.
More simulated attacks can better derive a more realistic defensive approach.
This article is from the "love to Learn bear children" blog, please be sure to keep this source http://molilinzi.blog.51cto.com/8282931/1696935
Web Security Learning Notes-collecting information manually