本文記錄 Kali Linux 2018.7 學習使用和滲透測試的詳細過程,教程爲安全牛課堂裏的《Kali Linux 滲透測試》課程php
參考 https://blog.csdn.net/Kevinhanser/article/details/79734491html
1. 搜索引擎 2. SHODAN 3. GOOGLE搜索 4. YANDEX 5. 查詢用戶信息 6. CUPP 製做我的專屬字典 7. 圖片信息
8.Rencon-ng
簡介python
簡介linux
查8.8.8.8github
常見filter:shell
net數據庫
net:8.8.8.0/24
citywindows
city:Beijing
country(CN、US)api
country:US
port(80、2一、2二、23)
port:80
port:80,22
os
os:linux
Hostname(主機或域名)
hostname:www.baidu.com
簡介
簡介
郵件
Usage: theharvester options -d: Domain to search or company name -b: data source: google, googleCSE, bing, bingapi, pgp, linkedin, google-profiles, jigsaw, twitter, googleplus, all -s: Start in result number X (default: 0) -v: Verify host name via dns resolution and search for virtual hosts -f: Save the results into an HTML and XML file (both) -n: Perform a DNS reverse query on all ranges discovered -c: Perform a DNS brute force for the domain name -t: Perform a DNS TLD expansion discovery -e: Use this DNS server -l: Limit the number of results to work with(bing goes from 50 to 50 results, google 100 to 100, and pgp doesn't use this option) -h: use SHODAN database to query discovered hosts Examples: theharvester -d microsoft.com -l 500 -b google -h myresults.html theharvester -d microsoft.com -b pgp theharvester -d microsoft -l 200 -b linkedin theharvester -d apple.com -b googleCSE -l 500 -s 300 root@kali:~# theharvester -d microsoft.com -b pgp
文件
Usage: metagoofil options
-d: domain to search -t: filetype to download (pdf,doc,xls,ppt,odp,ods,docx,xlsx,pptx) -l: limit of results to search (default 200) -h: work with documents in directory (use "yes" for local analysis) -n: limit of files to download -o: working directory (location to save downloaded files) -f: output file
Examples:
metagoofil -d apple.com -t doc,pdf -l 200 -n 50 -o applefiles -f results.html
metagoofil -h yes -o applefiles -f results.html (local dir analysis)
簡介
安裝
git clone https://github.com/Mebus/cupp.git python cupp.py -i (注意python3版本與python2.7版本)
exif (linux)
用法: exif [選項...] 文件 -v, --version 顯示軟件版本 -i, --ids 顯示 IDs,以代替信息標識名稱 -t, --tag=信息標識 選擇信息標識 --ifd=IFD 選擇 IFD -l, --list-tags 列出全部 EXIF 信息標識 -|, --show-mnote 顯示 MakerNote 的內容 --remove 刪除信息標識或是 ifd -s, --show-description 顯示信息標識說明 -e, --extract-thumbnail 解出縮略圖 -r, --remove-thumbnail 刪除縮略圖 -n, --insert-thumbnail=FILE 將 FILE 做爲縮略圖插入 --no-fixup 不修覆文件中存在的標識信息 -o, --output=FILE 將數據寫入 FILE --set-value=STRING tag 值 -c, --create-exif 若是 EXIF 數據不存在就建立它 -m, --machine-readable 以機器可讀的格式(tab 分隔)輸出 -w, --width=寬度 輸出寬度 -x, --xml-output 以 XML 格式輸出 -d, --debug 顯示調示信息 幫助選項: -?, --help 顯示此幫助信息 --usage 顯示簡短的使用信息
foca (windows)
Recon-NG是由python編寫的一個開源的Web偵查(信息收集)框架。Recon-ng框架是一個全特性的工具,使用它能夠自動的收集信息和網絡偵查。其命令格式與Metasploit!默認集成數據庫,可把查詢結果結構化存儲在其中,有報告模塊,把結果導出爲報告。一、啓動Recon-NG框架[recon-ng][default] >提示符表示啓動成功root@kali:~
使用help命令查看全部可執行的命令或-h[recon-ng][ default] > help
add Adds records to the database back Exits the current context delete Deletes records from the database exit Exits the framework help Displays this menu <strong>keys Manages framework API keys load Loads specified module pdb Starts a Python Debugger session query Queries the database record Records commands to a resource file <strong>reload Reloads all modules resource Executes commands from a resource file <strong>search Searches available modules set Sets module options <strong>shell Executes shell commands show Shows various framework items snapshots Manages workspace snapshots </strong>spool Spools output to a file unset Unsets module options <span style= "color:#ff0000;">use Loads specified module workspaces Manages workspaces
root@kali:~ usage: recon-ng [-h] [-v] [-w workspace] [-r filename] [--no-check] [--no-analytics] -h, --help show this help message and exit -v, --version show program 's version number and exit -w workspace load/create a workspace -r filename load commands from a resource file --no-check disable version check --no-analytics disable analytics reporting
[recon-ng][sina.com] > show options Name Current Value Required Description ---------- ------------- -------- ----------- DEBUG False yes enable debugging output NAMESERVER 8.8.8.8 yes nameserver for DNS interrogation PROXY no proxy server (address:port) THREADS 10 yes number of threads (where applicable) TIMEOUT 10 yes socket timeout (seconds) <strong>USER-AGENT Recon-ng/v4 yes user-agent string VERBOSE True yes enable verbose output
root@localhost:~# recon-ng -w sina
參考文獻:
https://blog.csdn.net/kevinhanser/article/details/79734494