当前位置:网站首页>Common penetration tools -goby
Common penetration tools -goby
2022-07-01 09:53:00 【beirry】
Common tools for penetration -Goby
Preface
I haven't updated this column for a long time , Today, let's introduce the tools that are often used :Goby
Novice security friends may not be familiar with this tool , This is mainly used as a tool to scan assets for vulnerabilities , There are many built-in POC( Vulnerability verification ) package , After the test, a detailed report will be sent to the user .
Goby download
goby Link to the official website of :https://gobies.org/
Download the corresponding version according to your own operating system , I am here windows edition , So the download is the first one .
Download and get a compressed package , After unzipping, you can see the following files , open Goby.exe file
Goby Use
In the lower left corner, you can set the language to Chinese .
New scan task
Click on Scan You can create a scan task .
After establishing the scanning task, you can see the scanning information
Asset information :
Vulnerability information :
Scan report :
So the above is what you can get from creating a new scanning task , Next, let's talk about components
Add the component
Adding components is nothing more than to make us better use Goby, such as fofa Components , Can pass fofa To obtain possible vulnerable hosts in the whole network .
and Xray It can be done to Web Scan the page , Give Way Goby More comprehensive scanning of .
Components are a good thing , Cousins can download components and use them through their own needs .
Goby Red team version
Goby To get the red team version, you can see this article :https://zhuanlan.zhihu.com/p/361351060
Finally, I would like to invite my cousins to do the penetration test , It must be authorized to penetrate , This article is only for learning and communication , If there is any illegal event, it has nothing to do with me .
边栏推荐
- JS use toString to distinguish between object and array
- Problems caused by delete and delete[]
- Change password of MySQL version 5.7 and 8.0
- Differences between JS valueof and toString
- BSN long story 10: how to ensure the safety of NFT
- Eat a rich woman's melon...
- The latest masterpiece of Alibaba, which took 182 days to produce 1015 pages of distributed full stack manual, is so delicious
- Network partition notes
- The stock position building rate of global funds and asset management reached a new low in 15 years
- JS prototype chain
猜你喜欢
嵌入式开发用到的一些工具
LVGL V8.2字符串显示在Keil MDK上需要注意的事项(以小熊派为例)
谁还在买“三只松鼠”们
[fxcg] large scale job hopping may be one of the driving forces behind the soaring inflation in the United States
Huawei accounts work together at multiple ends to create a better internet life
历史上的今天:九十年代末的半导体大战;冯·诺依曼发表第一份草案;CBS 收购 CNET...
CSDN一站式云服务开放内测,诚邀新老用户来抢鲜
Floyd repeat
uniapp微信小程序组件按需引入
Meituan P4 carefully collated microservice system architecture design manual to see the world of microservice architecture
随机推荐
mysql截取_mysql截取字符串的方法[通俗易懂]
Introduction to mt7628k eCos development
Live broadcast management project
SQL learning notes (01) - basic knowledge of database
微信表情符号写入判决书,你发的OK、炸弹都可能成为“呈堂证供”
富文本实现插值
tryhackme圣诞挑战2021-Advent of Cyber 3-day1-IDOR漏洞,不安全的访问控制漏洞
Network partition notes
Postgraduate entrance examination vocabulary 2023 sharing (1)
scratch大鱼吃小鱼 电子学会图形化编程scratch等级考试二级真题和答案解析2022年6月
[unity rendering] customized screen post-processing
Packetdrill script analysis guide
那个程序员,被打了。
Graduation summary of actual combat camp
年薪100万,在北上广深买的起房子吗?
Hololens2 development -6-eyetracking and speech recognition
The programmer was beaten.
[fxcg] large scale job hopping may be one of the driving forces behind the soaring inflation in the United States
If you meet a female driver and drive didi as an amateur, you can earn 500 a day!
In terms of use