1 Information collection stage
ailx10
1188 consultations
four point nine
Excellent respondent of network security
Master of Network Security
Go to consult
1.1 Domain name information
The prologue is written to the entrants. Domain name query can quickly understand who is the operator of a website. If no operator can be found, it means that it is a phishing website or an illegal website, especially engaged in financial transactions, which needs special attention.
1.1.1 Whois Query
Recommended index: ★★
1.1.2 Sky eye inspection
Tianyan Query - Business Security Tools_Enterprise Information Query _ Company Query _ Industrial and Commercial Query _ Enterprise Credit Information System
Recommended index: ★★★★★
1.1.3 Station master tools
Webmaster Tools - Home of Webmaster
Recommended index: ★★★★★
1.2 Subdomain information
1.2.1 Sublist3r
Recommended index: ★★★★
1.2.2 DNSdumpster
dns recon and research, find and lookup dns records
Recommended index: ★★★
1.2.3 CRT:SH
crt.sh | Certificate Search
Recommended index: ★★★
1.3 Port information
1.3.1 Nmap
Recommended index: ★★★★★
1.3.2 Masscan
Recommended index: ★★
1.3.3 Well known port vulnerabilities
Github details: BestBDs/port-bug
Recommended index: ★★★
File sharing server
21/22/69 ftp/tftp: file transfer protocol; blast; Sniffing; Spillover; Rear door; 2049 nfs: network file system; Improper configuration; 139 smaba: Linux file sharing; blast; Unauthorized access; Remote code execution; 389 ldap: directory access protocol; Injection; Anonymous access; Weak password;
Remote connection server
22 ssh: secure shell protocol; blast; Tunnel; 23 telnet: telecommunication network protocol; blast; Sniffing; 3389 rdp: Remote Desktop Protocol; blast; 5900 vnc: virtual network computing protocol; Weak password; blast; 5632 pcanywhere: remote control protocol; Weak password; Code execution;
WEB application server
80/8080/443/8443 web: web attack; 7001/7002 weblogic: java deserialization; Weak password; 8089 jboss/resin/jetty/jenkins: deserialize; Weak password; 9090 websphere: deserialization; Weak password; 4848 glassfish: weak password; 1352 lotus domino: weak password; Information leakage; blast; 10000 webmin web: weak password;
database server
3306 MySQL: injection; Raising rights; blast; 1433 mssql: injection; Raising rights; blast; 1521 oracle: TNS blasting; Injection; Bounce shell; 5432 postgresql: blasting; Injection; Weak password; 27017/27018 mangodb: blasting; Unauthorized access; 6379 Redis: unauthorized access; Weak password blasting; 5000 sysbase/db2: blasting; Injection;
Mail server
25 smtp: Simple Mail Transfer Protocol; Mail forgery; 110 pop3: Post office protocol version 3; blast; Sniffing; 143 imap: interactive mail access protocol; blast;
1.4 Website fingerprint information
1.4.1 whatweb
Recommended index: ★★★
1.4.2 bugscaner
Online fingerprint identification, online cms identification plug-in -- online tool
Recommended index: ★★★
1.4.3 Yunxi Fingerprint
Yunxi WEB Assets Sorting | Online CMS Fingerprint Identification Platform - Yunxi Security
Recommended index: ★★★
1.5 Sensitive information collection
1.5.1 Google Hacker
Recommended index: ★★★★
Site: specify the domain name inurl: specify the keywords existing in the url context: specify the keywords in the body of the web page filetype: specify the file type integer: specify the keywords in the title of the web page link: return all urlinfo linked to the link: find some basic information about the specified site cache: search Google's cache for some content
Anyone who is copying and pasting your article can easily find it through Google link: content. Go and see if your original article has been moved.
1.5.2 Foreign IP address query
CA App Synthetic Monitor website monitoring service
Recommended index: ★★★★
1.5.3 Domestic IP address query
Website speed measurement | Website speed test | Network speed test | Telecom | Unicom | Netcom | China | Monitoring | CDN | PING | DNS 17CE COM
Recommended index: ★★★★
1.5.4 Bypass CDN to Query IP Address
VirusTotal
Recommended index: ★★★★★
1.5.5 DirBuster website directory traversal
Recommended index: ★★
1.6 Social engineering
Free query of social worker database (It is not guaranteed to live, and the general social work library is on the hidden network)
Recommended index: ★★
Next: Take you hand in hand to build a loophole shooting range( Ailx10: Take you hand in hand to build a loophole shooting range )