Kail Linux滲透測試教程之Recon-NG框架

Kail Linux滲透測試教程之Recon-NG框架

信息收集

信息收集是網絡攻擊最重要的階段之一。要想進行滲透攻擊,就須要收集目標的各種信息。收集到的信息越多,攻擊成功的機率也就越大。本章將介紹信息收集的相關工具。html

Recon-NG框架

Recon-NG是由python編寫的一個開源的Web偵查(信息收集)框架。Recon-ng框架是一個強大的工具,使用它能夠自動的收集信息和網絡偵查。下面將介紹使用Recon-NG偵查工具。python

啓動Recon-NG框架,執行命令以下所示:shell

 

  • root@kali:~# recon-ng
  •                                                                                         
  •     _/_/_/    _/_/_/_/    _/_/_/    _/_/_/    _/      _/            _/      _/    _/_/_/
  •    _/    _/  _/        _/        _/      _/  _/_/    _/            _/_/    _/  _/      
  •   _/_/_/    _/_/_/    _/        _/      _/  _/  _/  _/  _/_/_/_/  _/  _/  _/  _/  _/_/_/
  •  _/    _/  _/        _/        _/      _/  _/    _/_/            _/    _/_/  _/      _/
  • _/    _/  _/_/_/_/    _/_/_/    _/_/_/    _/      _/            _/      _/    _/_/_/   
  •                                                                                        
  •      +---------------------------------------------------------------------------+     
  •      |  _                     ___    _                        __                 |     
  •      | |_)| _  _|_  |_|.|| _   |  _ |_ _  _ _  _ _|_o _  _   (_  _  _    _o_|_   |     
  •      | |_)|(_|(_|\  | ||||_\  _|_| || (_)| |||(_| | |(_)| |  __)(/_(_|_|| | | \/ |     
  •      |                                                                        /  |     
  •      |              Consulting | Research | Development | Training               |     
  •      |                     http://www.blackhillsinfosec.com                      |     
  •      +---------------------------------------------------------------------------+     
  •                       [recon-ng v4.1.4, Tim Tomes (@LaNMaSteR53)]                      
  • [56] Recon modules
  • [5]  Reporting modules
  • [2]  Exploitation modules
  • [2]  Discovery modules
  • [1]  Import modules
  • [recon-ng][default] >

 

以上輸出信息顯示了Recon-NG框架的基本信息。例如在Recon-NG框架下,包括56個偵查模塊、5個報告模塊、2個滲透攻擊模塊、2個發現模塊和1個導入模塊。看到[recon-ng][default] >提示符,表示成功登陸Recon-NG框架。如今,就能夠在[recon-ng][default] >提示符後面執行各類操做命令了。數據庫

首次使用Recon-NG框架以前,可使用help命令查看全部可執行的命令。以下所示:網絡

 

  • [recon-ng][default] > help
  • Commands (type [help|?] <topic>):
  • ---------------------------------
  • add             Adds records to the database
  • back            Exits current prompt level
  • del             Deletes records from the database
  • exit            Exits current prompt level
  • help            Displays this menu
  • keys            Manages framework API keys
  • load            Loads specified module
  • pdb             Starts a Python Debugger session
  • query           Queries the database
  • record          Records commands to a resource file
  • reload          Reloads all modules
  • resource        Executes commands from a resource file
  • search          Searches available modules
  • set             Sets module options
  • shell           Executes shell commands
  • show            Shows various framework items
  • spool           Spools output to a file
  • unset           Unsets module options
  • use             Loads specified module
  • workspaces      Manages workspaces

 

以上輸出信息顯示了在Recon-NG框架中可運行的命令。該框架和Metasploit框架相似,一樣也支持不少模塊。此時,可使用show modules命令查看全部有效的模塊列表。執行命令以下所示:session

 

  • [recon-ng][default] > show modules
  •   Discovery
  •   ---------
  •     discovery/info_disclosure/cache_snoop
  •     discovery/info_disclosure/interesting_files
  •   Exploitation
  •   ------------
  •     exploitation/injection/command_injector
  •     exploitation/injection/xpath_bruter
  •   Import
  •   ------
  •     import/csv_file
  •   Recon
  •   -----
  •     recon/companies-contacts/facebook
  •     recon/companies-contacts/jigsaw
  •     recon/companies-contacts/jigsaw/point_usage
  •     recon/companies-contacts/jigsaw/purchase_contact
  •     recon/companies-contacts/jigsaw/search_contacts
  •     recon/companies-contacts/linkedin_auth
  •     recon/contacts-contacts/mangle
  •     recon/contacts-contacts/namechk
  •     recon/contacts-contacts/rapportive
  •     recon/contacts-creds/haveibeenpwned
  • ……
  •     recon/hosts-hosts/bing_ip
  •     recon/hosts-hosts/ip_neighbor
  •     recon/hosts-hosts/ipinfodb
  •     recon/hosts-hosts/resolve
  •     recon/hosts-hosts/reverse_resolve
  •     recon/locations-locations/geocode
  •     recon/locations-locations/reverse_geocode
  •     recon/locations-pushpins/flickr
  •     recon/locations-pushpins/picasa
  •     recon/locations-pushpins/shodan
  •     recon/locations-pushpins/twitter
  •     recon/locations-pushpins/youtube
  •     recon/netblocks-hosts/reverse_resolve
  •     recon/netblocks-hosts/shodan_net
  •     recon/netblocks-ports/census_2012
  •   Reporting
  •   ---------
  •     reporting/csv
  •     reporting/html
  •     reporting/list
  •     reporting/pushpin
  •     reporting/xml
  •  [recon-ng][default] >

 

從輸出的信息中,能夠看到顯示了五部分。每部分包括的模塊數,在啓動Recon-NG框架後能夠看到。用戶可使用不一樣的模塊,進行各類的信息收集。app

【實例3-1】使用recon/domains-hosts/baidu_site模塊,枚舉baidu網站的子域。具體操做步驟以下所示:框架

(1)使用recon/domains-hosts/baidu_site模塊。執行命令以下所示:dom

 

  • [recon-ng][default] > use recon/domains-hosts/baidu_site

 

(2)查看該模塊下可配置選項參數。執行命令以下所示:ide

 

  • [recon-ng][default][baidu_site] > show options
  •   Name      Current Value       Req     Description
  •   --------------  ----------------------    ---------  --------------------------------------------------------
  •   SOURCE     default            yes      source of input (see 'show info' for details)
  • [recon-ng][default][baidu_site] >

 

從輸出的信息中,能夠看到有一個選項須要配置。

(3)配置SOURCE選項參數。執行命令以下所示:

 

  • [recon-ng][default][baidu_site] > set SOURCE baidu.com
  • SOURCE => baidu.com

 

從輸出的信息中,能夠看到SOURCE選項參數已經設置爲baidu.com。

(4)啓動信息收集。執行命令以下所示:

 

  • [recon-ng][default][baidu_site] > run
  • ---------
  • BAIDU.COM
  • ---------
  • [*] URL: http://www.baidu.com/s?pn=0&wd=site%3Abaidu.com
  • [*] map.baidu.com
  • [*] 123.baidu.com
  • [*] jingyan.baidu.com
  • [*] top.baidu.com
  • [*] www.baidu.com
  • [*] hi.baidu.com
  • [*] video.baidu.com
  • [*] pan.baidu.com
  • [*] zhidao.baidu.com
  • [*] Sleeping to avoid lockout...
  • -------
  • SUMMARY
  • -------
  • [*] 9 total (2 new) items found.

 

從輸出的信息中,能夠看到找到9個子域。枚舉到的全部數據將被鏈接到Recon-NG放置的數據庫中。這時候,用戶能夠建立一個報告查看被鏈接的數據。

【實例3-2】查看獲取的數據。具體操做步驟以下所示:

(1)選擇reporting/csv模塊,執行命令以下所示:

 

  • [recon-ng][default] > use reporting/csv

 

(2)建立報告。執行命令以下所示:

 

  • [recon-ng][default][csv] > run
  • [*] 9 records added to '/root/.recon-ng/workspaces/default/results.csv'.

 

從輸出的信息能夠看到,枚舉到的9個記錄已被添加到/root/.recon-ng/workspaces/default/results.csv文件中。打開該文件,如圖3.1所示。

 

 

圖3.1  results.csv文件

(3)從該界面能夠看到,枚舉到的全部子域。

用戶也可使用Dmitry命令,查詢關於網站的信息。下面將介紹Dmitry命令的使用。

查看Dmitry命令的幫助信息。執行命令以下所示:

 

  • root@kali:~# dmitry -h
  • Deepmagic Information Gathering Tool
  • "There be some deep magic going on"
  • dmitry: invalid option -- 'h'
  • Usage: dmitry [-winsepfb] [-t 0-9] [-o %host.txt] host
  •   -o  Save output to %host.txt or to file specified by -o file
  •   -i   Perform a whois lookup on the IP address of a host
  •   -w Perform a whois lookup on the domain name of a host
  •   -n  Retrieve Netcraft.com information on a host
  •   -s  Perform a search for possible subdomains
  •   -e  Perform a search for possible email addresses
  •   -p  Perform a TCP port scan on a host
  • * -f    Perform a TCP port scan on a host showing output reporting filtered ports
  • * -b   Read in the banner received from the scanned port
  • * -t 0-9 Set the TTL in seconds when scanning a TCP port ( Default 2 )
  • *Requires the -p flagged to be passed

 

以上信息顯示了dmitry命令的語法格式和全部可用參數。下面使用dmitry命令的-s選項,查詢合理的子域。執行命令以下所示:

 

  • root@kali:~# dmitry -s google.com
  • Deepmagic Information Gathering Tool
  • "There be some deep magic going on"
  • HostIP:173.194.127.71
  • HostName:google.com
  • Gathered Subdomain information for google.com
  • ---------------------------------
  • Searching Google.com:80...
  • HostName:www.google.com
  • HostIP:173.194.127.51
  • Searching Altavista.com:80...
  • Found 1 possible subdomain(s) for host google.com, Searched 0 pages containing 0 results
  • All scans completed, exiting

 

從輸出的信息中,能夠看到搜索到一個子域。該子域名爲www.google.com,IP地址爲173.194.127.51。該命令默認是從google.com網站搜索,若是不能鏈接google.com網站的話,執行以上命令將會出現Unable to connect: Socket Connect Error錯誤信息。

本文選自:Kail Linux滲透測試實訓手冊大學霸內部資料,轉載請註明出處,尊重技術尊重IT人!

相關文章
相關標籤/搜索