首页 > 编程语言 > 详细

OSCP Learning Notes - Enumeration(2)

时间:2019-06-22 21:24:54      阅读:139      评论:0      收藏:0      [点我收藏+]

HTTP Enumeration

Target Host IP: 10.0.0.20

Brute Forcing using DirBuster

1. Start the dirbuster and set the options.

技术分享图片

Note:

  1. The wordlist can be found locally or downloaded from the Internet.   

    技术分享图片

   OR  Dirbuster-ng big wordlist dowload site:https://github.com/digination/dirbuster-ng/tree/master/wordlists

2. Progress in sacanning.

技术分享图片

 

3. Scan result tree. We may find some interesting things here.

技术分享图片

4.Open the test.php in browser, and review the source code.

技术分享图片

 

 Brute Forcing using nikto

1. Scan the target port 80(http).

nikto -h 10.0.0.20

技术分享图片

2. Scan the target port 443(https).

nikto -h 10.0.0.20:443

技术分享图片

 

OSCP Learning Notes - Enumeration(2)

原文:https://www.cnblogs.com/keepmoving1113/p/11070336.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!