当前位置:网站首页>Information collection of penetration test
Information collection of penetration test
2022-07-05 15:37:00 【GALi_ two hundred and thirty-three】
information gathering
Domain information collection
whois Inquire about
whois Is a standard Internet Protocol , It can be used to collect network registration information , Registered domain name ,IP Address, etc .
kali Under the whois Inquire about

online whois Inquire about
- Love station network https://whois.aizhan.com/
- Home of stationmaster https://whois.chinaz.com/
Record information inquiry
Website filing is the filing that the owner of the website needs to apply to the relevant national departments according to national laws and regulations ,
Check the inner eye https://www.tianyancha.com/
ICP Record query http://www.beianbeian.com/
Home of stationmaster http://icp.chinaz.com/sina.com
Subdomain information collection
subdomain , That is, the secondary domain name , It is the domain name under the top-level domain name . The website is large , You can start with the sub station .
layer Subdomain excavator violence enumeration

Online tools
Home of stationmaster http://tool.chinaz.com/subdomain/
Certificate transparency public log enumeration
Certificate transparency (Certificate Transparnecy , CT) It's a certificate authority (CA) A project for , The certificate authority will SSL/TLS Publish the certificate to the public log . One SSL/TLS Certificates usually contain domain names 、 Subdomain name and email address .
crt.sh https://crt.sh/
censys https://censys.io/
Search engine enumeration
utilize google Search search sites under specific domain names
“site: baidu.com”
Sensitive information collection
Google Haking
Common grammar
| keyword | explain |
|---|---|
| Site | Specify domain name |
| Inurl | URL Keywords existing in |
| Intext | Keywords in the body of a web page |
| Filetype | Specify file type |
| Intitle | Keywords in the page title |
| Link | link:baidu.com That is, return and baidu.com Made a link URL |
| Info | Find some basic information about the designated site |
| cache | Search for Google About caching some content in |
Such as searching the background management page

Port information collection
Port information collection is a very important process , The corresponding service can be identified by scanning the open port of the server , Then look for attack methods for services .
Commonly used tools Nmap, Massan, Royal sword high speed TCP Port scanning tools, etc .
Common ports and descriptions
File sharing service port
| Port number | Port specification | Direction of attack |
|---|---|---|
| 21/22/69 | FTP/TFTP File transfer protocol | Allow anonymous Uploads 、 download 、 Blasting and sniffing operations |
| 2049 | Nfs service | Improper configuration |
| 139 | Samba service | Blast 、 Unauthorized access 、 Remote code execution |
| 389 | Ldap Directory Access Protocol | Inject 、 Allow anonymous access 、 Weak password |
Remote connection service port
| Port number | Port specification | Direction of attack |
|---|---|---|
| 22 | SSH Remote connection | Blast 、SSH Tunnel and Intranet agent forwarding 、 File transfer |
| 23 | Telnet Remote connection | Blast 、 Sniffing 、 Weak password |
| 3389 | Rdp Remote Desktop Connection | Shift back door ( need Window Server 2003 The following systems )、 Blast |
| 5900 | VNC | Weak password burst |
| 5632 | PyAnywhere service | Grab the code 、 Code execution |
Web Application service port
| Port number | Port specification | Direction of attack |
|---|---|---|
| 80/443/8080 | common Web Service port | Web attack 、 Blast 、 Corresponding server version vulnerability |
| 7001/7002 | WebLogic Console | Java Deserialization 、 Weak password |
| 8080/8089 | Jboss/Resin/Jetty/Jenkins | Deserialization 、 Console weak password |
| 9090 | WebSphere Console | Java Deserialization 、 Weak password |
| 4848 | GlassFish Console | Weak password |
| 1352 | Lotus domino The mail service | Weak password 、 Information leakage 、 Blast |
| 10000 | Webmin-Web Control panel | Weak password |
Database service port
| Port number | Port specification | Direction of attack |
|---|---|---|
| 3306 | MySQL | Inject 、 Raise the right 、 Blast |
| 1433 | MSSQL database | Inject 、 Raise the right 、SA Weak password 、 Blast |
| 1521 | Oracle database | TNS Blast 、 Inject 、 rebound shell |
| 5432 | PostgreSQL database | Blast 、 Inject 、 Weak password |
| 27017/27018 | MongoDB | Blast 、 Unauthorized access |
| 6379 | Redis database | Unauthorized access can be attempted 、 Weak password burst |
| 5000 | SysBase/DB2 database | Blast 、 Inject |
Mail service port
| Port number | Port specification | Direction of attack |
|---|---|---|
| 25 | SMTP The mail service | Mail forgery |
| 110 | POP3 agreement | Blast 、 Sniffing |
| 143 | IMAP agreement | Blast |
Network common protocol port
| Port number | Port specification | Direction of attack |
|---|---|---|
| 53 | DNS The domain name system | Allow zone transfer 、DNS hijacked 、 Cache poisoning 、 cheating |
| 67/68 | DHCP service | hijacked 、 cheating |
| 161 | SNMP agreement | Blast 、 Collect target intranet information |
Special service port
| Port number | Port specification | Direction of attack |
|---|---|---|
| 2181 | Zookeeper service | Unauthorized access |
| 8069 | Zabbix service | Remote execution 、SQL Inject |
| 9200/9300 | Elasticsearch service | Remote execution |
| 11211 | Memcache service | Remote execution |
| 512/513/514 | Linux Rexec service | Blast 、Rlogin Sign in |
| 873 | Rsync service | Anonymous access 、 Upload files |
| 3690 | Svn service | Svn leak 、 Unauthorized access |
| 50000 | SAP Management Console | Remote execution |
fingerprint identification
Don't use fingerprints here to refer to websites CMS The fingerprint , Computer operating system or web The fingerprint of the container , These fingerprints are actually some feature codes or keywords , Such as WordPress in robots.txt Will contain wp-admin, index.php Will contain generator-wordpress 3.xx etc. . Identify the system used by the target , In order to find the vulnerability of the corresponding version to attack .
CMS(Content Managerment System), Content management system , It's a kind of being in WEB front end (Web The server ) And back office systems or processes ( Content creation 、 edit ) Between the software systems . The creator of the content 、 Editors 、 Publishers use the content management system to submit 、 modify 、 The examination and approval 、 Publish content . I mean “ Content ” May include documents 、 form 、 picture 、 Data in the database or even videos and everything you want to publish to Internet、Intranet as well as Extranet Website information .
common CMS:
- Enterprise station building system :MetInfo( Mito )、 Cicada knowledge 、SiteServer CMS(.net platform ) etc. ;
2.B2C Mall system : Business school shopex、ecshop、hishop、xpshop etc. ;
3. Portal station building system :DedeCMS( DedeCms ,PHP+MYSQL)、 The empire CMS(PHP+mysql)、PHPCMS、 Move easily 、cmstop,dianCMS( Change point CMS,.net platform ) etc. ;
4. The blog system :wordpress、Z-Blog etc. ;
5. Forum Community :discuz、phpwind、wecenter etc. ;
6. Question answering system :Tipask、whatsns etc. ;
7. Encyclopedia system :HDwiki;
8.B2B Portal system :destoon、B2Bbuilder、 A friendly neighbor B2B etc. ;
9. Talent recruitment website system : The knight CMS、PHP Cloud talent management system ;
10. Real estate website system :FangCms etc. ;
11. Online Education station building system :kesion( Kexun ,ASP)、EduSoho Online school ;
12. Movie website system : Apple cms、ctcms、movcms etc. ;
13. The system of building novel literature station :JIEQI CMS;
Tool recommendation : Mitsurugi Web fingerprint identification , Whatweb
Online fingerprint identification website :
- BugScaner:http://whatweb.bugscaner.com/look/
- The cloud knows the fingerprint :http://www.yunsee.cn/finger.html
- WhatWeb:https://whatweb.net/
real IP
Through domain name resolution , You can get the website IP, But sometimes it can be parsed IP Not the real server address IP. If the goal is done CDN, that The parsing result may be CDN Node IP Address .
CDN The full name is Content Delivery Network, The content distribution network .CDN It is an intelligent virtual network based on the existing network , Rely on edge servers deployed everywhere , Load balancing through the central platform 、 content distribution 、 Scheduling and other functional modules , Let users get the content they need nearby , Reduce network congestion , Improve user access response speed and hit rate .CDN The key technologies are content storage and distribution technology .
For websites , adopt CDN Acceleration can improve the speed of website access , Because this is a technology that distributes website content to different nodes through caching . When the website has CDN After acceleration , It can often be based on the user's request region , Choose a cache server on the network closest to the user , This can provide users with content services faster , It is no different from directly accessing the source site , This way to shorten the distance from the content network , Technology to achieve accelerated effect . Only when the user has actual data interaction, it will be from the remote Web Server response .
Check whether the target uses CDN

Obtained from different regions IP The address is different , Then it is possible to do CDN, It can be detected through online websites
https://www.17ce.com/
Bypass CDN
- Internal mailbox source . Register through website users or RSS Subscription function , Generally, it is not done here cdn
- Scan website test files . Such as phpinfo、test etc.
- Sub station domain name .
- Foreign agent visits .(http://asm.ca.com/en/ping.php)
- Query domain name resolution record .(https://www.netcraft.com)
- APP Grab the bag
- Bypass CloudFlare CDN Find the real IP.(http://www.crimeflare.us/cfs.html#box)
Sensitive directory information collection
Detecting the directory structure and hidden sensitive files of the target site is an essential content . It is possible to get the background page of the website , File upload page , Even the source code of the website .
Most tools are combined with dictionaries to detect
Commonly used tools :DirBuster、 Background scan of Royal sword
Online tools :https://www.webscan.cc/
Reference resources :《Web Safe attack and defense Penetration test practice guide 》
边栏推荐
- RepLKNet:不是大卷积不好,而是卷积不够大,31x31卷积了解一下 | CVPR 2022
- Bugku's eyes are not real
- mapper.xml文件中的注释
- SQL Server learning notes
- Detailed explanation of QT creator breakpoint debugger
- I spring and autumn blasting-1
- Optional parameters in the for loop
- Noi / 1.5 37: mercenaries
- Where is the operation of convertible bond renewal? Is it safer and more reliable to open an account
- 30岁汇源,要换新主人了
猜你喜欢
随机推荐
Redis distributed lock principle and its implementation with PHP (2)
社区团购撤城“后遗症”
I spring and autumn blasting-2
Codasip为RISC-V处理器系列增加Veridify安全启动功能
30岁汇源,要换新主人了
Linear DP (basic questions have been updated)
Aike AI frontier promotion (7.5)
How can the boss choose programmers to help me with development?
R 熵权法计算权重及综合得分
JS topic - console log()
I spring web upload
可转债打新在哪里操作开户是更安全可靠的呢
Data communication foundation - routing communication between VLANs
The difference between abstract classes and interfaces in PHP (PHP interview theory question)
Can I pass the PMP Exam in 20 days?
Advanced level of static and extern
Detailed explanation of C language branch statements
Database learning - Database Security
Anti shake and throttling
The elimination strategy of redis









