当前位置:网站首页>Common penetration tools -goby
Common penetration tools -goby
2022-07-01 09:53:00 【beirry】
Common tools for penetration -Goby
Preface
I haven't updated this column for a long time , Today, let's introduce the tools that are often used :Goby
Novice security friends may not be familiar with this tool , This is mainly used as a tool to scan assets for vulnerabilities , There are many built-in POC( Vulnerability verification ) package , After the test, a detailed report will be sent to the user .
Goby download
goby Link to the official website of :https://gobies.org/
Download the corresponding version according to your own operating system , I am here windows edition , So the download is the first one .

Download and get a compressed package , After unzipping, you can see the following files , open Goby.exe file 
Goby Use
In the lower left corner, you can set the language to Chinese .
New scan task
Click on Scan You can create a scan task .
After establishing the scanning task, you can see the scanning information 
Asset information :
Vulnerability information :
Scan report :
So the above is what you can get from creating a new scanning task , Next, let's talk about components
Add the component
Adding components is nothing more than to make us better use Goby, such as fofa Components , Can pass fofa To obtain possible vulnerable hosts in the whole network .
and Xray It can be done to Web Scan the page , Give Way Goby More comprehensive scanning of .
Components are a good thing , Cousins can download components and use them through their own needs .
Goby Red team version
Goby To get the red team version, you can see this article :https://zhuanlan.zhihu.com/p/361351060
Finally, I would like to invite my cousins to do the penetration test , It must be authorized to penetrate , This article is only for learning and communication , If there is any illegal event, it has nothing to do with me .
边栏推荐
- In terms of use
- Scratch big fish eat small fish Electronic Society graphical programming scratch grade examination level 2 true questions and answers analysis June 2022
- 关于OpenCV中图像的widthStep
- Computer USB, HDMI, DP various interfaces and speeds
- IPv6 learning notes
- 富文本实现插值
- [unity rendering] customized screen post-processing
- PHP string to binary conversion
- 炒币,亏了1000万。
- 华为帐号多端协同,打造美好互联生活
猜你喜欢

Win11账号被锁定无法登录怎么办?Win11账号被锁定无法登录

Precautions for lvgl v8.2 string display on keil MDK (take little bear pie as an example)

华为帐号多端协同,打造美好互联生活

Huawei accounts work together at multiple ends to create a better internet life

Module 9: design e-commerce seckill system

Packetdrill script analysis guide

I like two men...

苹果放大招!这件事干的太漂亮了……

Initial experience of Flink, a mainstream real-time stream processing computing framework

历史上的今天:九十年代末的半导体大战;冯·诺依曼发表第一份草案;CBS 收购 CNET...
随机推荐
The latest masterpiece of Alibaba, which took 182 days to produce 1015 pages of distributed full stack manual, is so delicious
JS prototype inheritance can only inherit instances, not constructors
JS use toString to distinguish between object and array
年薪100万,在北上广深买的起房子吗?
关于OpenCV中图像的widthStep
Drive away bad emotions and stop worrying
Problems caused by delete and delete[]
Cortex M4 systick details
Initial experience of Flink, a mainstream real-time stream processing computing framework
SQL学习笔记(04)——数据更新、查询操作
奇怪,为什么ArrayList初始化容量大小为10?
The stock position building rate of global funds and asset management reached a new low in 15 years
持续进阶,软通动力稳步推动云智能战略
[untitled]
Configure load balancing
HMS core audio editing service 3D audio technology helps create an immersive auditory feast
MySQL interception_ MySQL method for intercepting strings [easy to understand]
Who has the vision to cross the cycle?
JS functionarguments object
线程基础知识