Recon ASRC Conference

场景

ASRC漏洞挖掘

方法论

1、Brands

https://www.crunchbase.com/

https://en.wikipedia.org

Footers & about us: https://www.alibaba.com/

  • ASNs

https://bgp.he.net

http://viewdns.info/reversewhois/

Search unique identifier:

Name

Registered Email

  • Search Engine Dorks

Google、bing、baidu、DuckDuckGO

GHDB: https://www.exploit-db.com/google-hacking-database/

  • Search Engines for Servers

shodan

censys

zoomeye

2、Subdomain

  • Subdomain Discovery

https://dnsdumpster.com/

Subfinder

Amass

Aquatone

  • Subdomain Bruteforcing

subbrute

massdns

subfinder

All.txt - JHaddix

  • Fingerprinting

Wappalyzer

Builtwith

Vulners

WPScan

droopescan

3、Mapping

Directory brute forcing:
GoBuster
Burp Discover Content
Search engine dorks

4、Hack

5、Recon again!

上一篇:JS验证姓名、邮箱、电话号码


下一篇:HTML 表单元素之 input 元素