相关阅读
视频讲解
通过本视频你将学习到侦察阶段必备的技能,黑客通常不是针对单个页面进行渗透的,在渗透测试前,通常会发现企业或者目标网站攻击暴露面,可以通过sublist3r、amass进行子域名的信息收集,这样可以发现更多功能存在的漏洞……
图文讲解
我们主要讲解上述视频中提供的2个工具
- sublist3r
- amass
sublist3r(坑比较多,不推荐)
我们这里使用Kali linux安装sublist3r
apt-get install sublist3r
![图片[1]-【漏洞赏金侦察课程】如何发现隐藏的子域名&URL-FancyPig's blog](https://static.iculture.cc/wp-content/uploads/2022/08/20220824072343213-1024x514.png?x-oss-process=image/auto-orient,1/format,webp/watermark,image_cHVibGljL2xvZ28ucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTA,x_10,y_10)
安装完成后就可以进行子域名挖掘了
![图片[2]-【漏洞赏金侦察课程】如何发现隐藏的子域名&URL-FancyPig's blog](https://static.iculture.cc/wp-content/uploads/2022/08/20220824072419403.png?x-oss-process=image/auto-orient,1/format,webp/watermark,image_cHVibGljL2xvZ28ucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTA,x_10,y_10)
![图片[3]-【漏洞赏金侦察课程】如何发现隐藏的子域名&URL-FancyPig's blog](https://static.iculture.cc/wp-content/uploads/2022/08/20220824083708786.png?x-oss-process=image/auto-orient,1/format,webp/watermark,image_cHVibGljL2xvZ28ucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTA,x_10,y_10)
这里如果使用不了Google服务,可能需要部署clash,可以参考(实际上不影响,这么多搜索引擎足够了)
当然如果懒得折腾,也可以直接在vultr上临时租用一台海外的服务器做测试,我这里由于使用的是CentOs的,因此我直接从Github上拉取仓库
- 原版(可能有bug)
git clone https://github.com/aboul3la/Sublist3r
- 推荐版本(热心网友修改版本)
git clone https://github.com/AetherBreeze/Sublist3r.git
然后安装依赖
pip3 install -r requirements.txt
然后开始扫描,我们这里以iculture.cc
为例
python3 sublist3r.py -d iculture.cc
![图片[4]-【漏洞赏金侦察课程】如何发现隐藏的子域名&URL-FancyPig's blog](https://static.iculture.cc/wp-content/uploads/2022/08/20220824083640683.png?x-oss-process=image/auto-orient,1/format,webp/watermark,image_cHVibGljL2xvZ28ucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTA,x_10,y_10)
![图片[5]-【漏洞赏金侦察课程】如何发现隐藏的子域名&URL-FancyPig's blog](https://static.iculture.cc/wp-content/uploads/2022/08/20220824083750491.png?x-oss-process=image/auto-orient,1/format,webp/watermark,image_cHVibGljL2xvZ28ucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTA,x_10,y_10)
扫描没有结果如何解决?
- CentOS因为是Github上直接下载的,很方便修改
sublist3r.py
- Kali linux可以在
/usr/lib/python3/dist-packages/sublist3r.py
修改
很多用户反馈扫描有问题,这里大家可以修改sublist3r.py
文件
class Virustotal(enumratorBaseThreaded):
def __init__(self, domain, subdomains=None, q=None, silent=False, verbose=True):
subdomains = subdomains or []
base_url = 'https://www.virustotal.com/ui/domains/{domain}/subdomains'
self.engine_name = "Virustotal"
self.q = q
super(Virustotal, self).__init__(base_url, self.engine_name, domain, subdomains, q=q, silent=silent, verbose=verbose)
self.url = self.base_url.format(domain=self.domain)
修改为
class Virustotal(enumratorBaseThreaded):
def __init__(self, domain, subdomains=None, q=None, silent=False, verbose=True):
subdomains = subdomains or []
base_url = 'https://www.virustotal.com/ui/domains/{domain}/subdomains?relationships=resolutions'
self.engine_name = "Virustotal"
self.q = q
super(Virustotal, self).__init__(base_url, self.engine_name, domain, subdomains, q=q, silent=silent, verbose=verbose)
self.url = self.base_url.format(domain=self.domain)
# Virustotal requires specific headers to bypass the bot detection:
self.headers["X-Tool"] = "vt-ui-main"
self.headers["X-VT-Anti-Abuse-Header"] = "hm" # as of 1/20/2022, the content of this header doesn't matter, just its presence
self.headers["Accept-Ianguage"] = self.headers["Accept-Language"] # this header being present is required to prevent a captcha
amass(强烈推荐)
使用下面的命令即可,-d
后面接域名,-passive
代表使用被动方式,效率更高。
amass enum -d iculture.cc -passive
![图片[6]-【漏洞赏金侦察课程】如何发现隐藏的子域名&URL-FancyPig's blog](https://static.iculture.cc/wp-content/uploads/2022/08/20220824074140782.png?x-oss-process=image/auto-orient,1/format,webp/watermark,image_cHVibGljL2xvZ28ucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTA,x_10,y_10)
© 版权声明
THE END
- 最新
- 最热
只看作者