码迷,mamicode.com
首页 > 编程语言 > 详细

OSCP Learning Notes - Enumeration(2)

时间:2019-06-22 21:19:21      阅读:164      评论:0      收藏:0      [点我收藏+]

标签:info   enum   src   res   some   tin   mic   nload   nat   

HTTP Enumeration

Target Host IP: 10.0.0.20

Brute Forcing using DirBuster

1. Start the dirbuster and set the options.

技术图片

Note:

  1. The wordlist can be found locally or downloaded from the Internet.   

    技术图片

   OR  Dirbuster-ng big wordlist dowload site:https://github.com/digination/dirbuster-ng/tree/master/wordlists

2. Progress in sacanning.

技术图片

 

3. Scan result tree. We may find some interesting things here.

技术图片

4.Open the test.php in browser, and review the source code.

技术图片

 

 Brute Forcing using nikto

1. Scan the target port 80(http).

nikto -h 10.0.0.20

技术图片

2. Scan the target port 443(https).

nikto -h 10.0.0.20:443

技术图片

 

OSCP Learning Notes - Enumeration(2)

标签:info   enum   src   res   some   tin   mic   nload   nat   

原文地址:https://www.cnblogs.com/keepmoving1113/p/11070336.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!