To be familiar with the system architecture of the target website, it is essential to know which directories are available on the website.
To awvs and burp large-scale scanning tools, you can also perform directory scanning. However, I personally feel that it is far from a professional scanning tool.
0x01 dirbuster
Introduction: dirbuster is a directory and hidden file developed by OWASP (Open Web software
Discovering Files and folders using DirbusterDirbuster is a tool for discovering existing files and directories in a WEB server by blasting. We'll use it in this cheats to search for a specific list of files and directories.Get readyWe'll use a text file that contains a list of words we asked Dirbuster to look for. Create a text file dictionary.txt that contains the following items:
Info
Server-status
Server-info
Cgi-bin
Robo
Use phpMyAdmin vulnerability to upload Trojan horse program, get Webshell.The CGI script did not properly handle the request parameters, causing the source code to leak, allowing the remote attacker to insert the execution command into the request parameters.First, using the Nmap tool to scan the target hostThe 1.1 uses the Nmap command to scan the target host. Click on the left side of the desktop and select "Open in Terminal" in the context menu.1.2 Enter the command "NMAP–SV 192.168.1.3" in
1, the Safety test application scope
2. Safety Test process Diagram
3. Safety Test Path
3.1, automated vulnerability Scanning Tool AppScan, etc.
3.2, Server account permissions test, port scan
3.3. HTTP protocol basic method test: Put, delete, trace, move, copy
3.4. Web server version information (known exploit)
3.5, Dirbuster tool Way Sensitive Interface traversal (enumeration method)
3.6, the Robots way Sensitive interface lookup
3.7. Web C
, violating the law, you have Apache 0day directly to attack IIS, the results may also be futile. There are several aspects of web penetration testing: Collecting information, exploiting vulnerabilities, and getting shells.Information collection, we are interested in a lot of things, such as domain name information, subdomain information, dns,web application server information, Site directory structure, Web application name, Web application plug-ins, administrator user name, email address, secur
)Devicetype:generalpurposeRunning:Linux3.X|4.XOSCPE:cpe:/o:linux:linux_kernel:3cpe:/o:linux:linux_kernel:4OSdetails:Linux3.2-4.0Uptimeguess:199.640days(sinceSatMay904:40:312015)NetworkDistance:1hopTCPSequencePrediction:Difficulty=262(Goodluck!)IPIDSequenceGeneration:AllzerosServiceInfo:OS:Linux;CPE:cpe:/o:linux:linux_kernel
Service Enumeration
HTTP Enumeration
Run OWASP dirbuster on port 80 to expose the JavaScript and PHP files in/scriptz /.
Sour
Analysis of SpyderSec challenge solving ideas
The challenge we are going to solve today is very interesting. It is called SpyderSec. We will build it on the VirtualBox Virtual Machine and open Nmap. After Nmap scans, it will only open port 80. In the browser, type 192.168.0.7 and we will see a webpage.
Obtain. FBI video files
?? Use the WEB fuzzy testing tool dirbuster for the target, but no interesting information is obtained. Here we can see that
Dirbuster for catalog guessing, click Test to see if the Authorized access page can be opened without authorizationRepair method:A page file contains a file that a user verifies that the session/token is valid, or a new filterThree. Questions about verification codes that are easy to appear1. The verification code is stored in a cookie and can be checked directly to see2, verification code fails to refresh the verification code after verification fai
-6553510.99.99.1
We can see that the HTTP service is running on port 80 of 10.99.99.1. Let's see what it is.
It seems that there is nothing special. It doesn't matter. Let's look at port 10000:
First, analyze the HTTP service. We can see that this is the default page after the Apache HTTP service is installed. There is nothing special. We need to perform in-depth scanning and Analysis for more information. Here we use DirBuster for further scanning
Hackports is a penetration framework under OS X. Hackports is a "super project" that makes full use of the existing code porting work. security professionals can now use hundreds of penetration tools on MAC systems without virtual machines.
Tool list:
0 trace
3 proxy
Air-Automated Image Installer
Android APK Tool
Android SDK framework
Apache users
Autospy
Blindelephant
Braa
Bed
Beef
Binwalk
Btdsd
Chkrootkit
Chntpwd
Casefile-maltego
Cewl
Cisc0wn
Cisco sequence (Ciscos)
Cisco
Objective:It is possible that you will encounter a problem in the penetration testing process: The target station exists SQL injection, but can not find the background, this is not very painful? So this is the purpose of writing this article: How to find the website backstage1. Dictionary Scanprinciple : Using a sensitive URL (commonly known as a dictionary of many URLs) to contract the site, using the return packet status code to distinguish, common such as 200 (existence), 403 (existence but n
Kali Linux Infiltration Basics finishing Series article reviewVulnerability scanning
Network traffic
Nmap
Hping3
Nessus
Whatweb
Dirbuster
Joomscan
Wpscan
Network trafficNetwork traffic is the amount of data transmitted over the network.TCP protocolTCP is the Transport layer protocol in the Internet, using three-time handshake protocols to establish a connection. When the active party sends a
Contact Us
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.