当前位置:网站首页>Domain name (subdomain name) collection method of Web penetration
Domain name (subdomain name) collection method of Web penetration
2022-07-28 04:38:00 【Hai Yong*】
- Personal website :【 Hai Yong 】【 Fishing games 】
- 🤟 Humorous front-end learning courses :28 Cases interesting learning front end
- Want to find a little partner to learn and communicate together , Please click on 【 Full stack technology exchange group 】
- Free and practical computer related knowledge question bank : Come in and hang out
Give you Amway a free and practical front-end brush question ( Daquan of facial scriptures ) Website , Click to jump to the website .
Jump straight to the end Participate in comments and send books
It's going on Web Infiltration time , We often need to collect sub domain names . Compared with the main station , The safety of the substation will be worse . Sub domain name collection can be done by hand 、 Tools or analysis of search engines and other methods to achieve . Next, let's see what we can do
1. Subdomain name guessing and test access
This is the simplest and stupid method , about Web Guess the subdomain name , Then go to the browser to check whether it really exists . such as baidu.com, Guess it may have fanyi/tieba/pay/bbs.baidu.com etc. ;csdn.net, Guess the possible subdomains are blog/download/mail/bbs.csdn.net etc. , This method works well for common subdomain names .
2. Search engine instruction query
Search through search engine “site:csdn.net” To search its main domain name csdn.net Subdomains under . There may be many duplicate pages and results when using search engines to find subdomains , We can use the following instructions to make a more accurate search :
Before using instructions , Let's do some basic settings for the search engine first , Set the search results to display on one page 50 strip ,

- allintext: = Search text , But it does not include page titles and links .
- allinlinks: = Search for links , Text and title are not included .
- related:URL = List and objectives URL Address related web pages . This command is not applicable to some niche websites , Sometimes I can't find anything .
- link:URL = List the general situation of the external chain of a site .
- Use “-” Get rid of the results you don't want to see , Such as sitecsdn.net - blog.csdn.net
3. Inquire about DNS The parsing record of
Query its domain name mx、cname Record , Mainly through nslookup command , Such as :
nslookup -qt=mx 163.com // Query mailbox server , Its mx You can change the following parameters to query
- A: Address record (Ipv4)
- AAAA: Address record (Ipv6)
- AFSDB Andrew: File system database server records
- ATMA ATM: Address record .
- CNAME: Alias record .
- HINFO: Hardware configuration record , Include CPU、 Operating system information .
- ISDN: The domain name corresponds to ISDN number .
- MB: The server where the specified mailbox is stored .
- MG: Mail group records .
- MINFO: Information record of mail group and mailbox .
- MR: The email record of the change of name .
- MX: Mail server records .
- NS: Name server record .
- PTR: Reverse recording .
- RP:: The person in charge records .
- RT: Route penetration record .
- SRV TCP: Server information records .
- TXT: The text information corresponding to the domain name .
- X25: The domain name corresponds to X.25 Address record .
4. be based on DNS Brute force cracking of queries
At present, there are many open source tools to support sub domain name brute force cracking , By trying the dictionary +“.”+“ The main domain name ” To test , As in the dictionary bbs/admin/manager. Yes baidu.com Try , Will crawl bbs baidu.com、admin baidu.com. manager.baidu.com, By visiting its address , Determine whether it is opened and exists according to the corresponding status keywords .
5. Manual analysis
By looking at the main website home page and related pages , from html Code and links to the place to manually find , As its main domain name or under other domain names crossdomim.xml The file will contain some sub domain information .
Participate in comments and send books
In the future, at least three friends will be selected from the new article review area every week to send books , You can continue to pay attention to me : Hai Yong

【 Content abstract 】
The enterprise network contains a lot of computing resources 、 Data resources and business system resources , It is the key target of malicious attackers . This book introduces the protocol principle of enterprise network group 、 Domain forest experimental environment and installation process ; Introduce how to efficiently collect effective domain information in the domain , Analyze the attack means against domain network 、 Typical vulnerabilities and corresponding detection and defense means ; This paper introduces the method of making a secure hidden back door in the domain , And introduce the detection methods based on metadata for these domain backdoors .
This book is highly professional , Suitable for having a certain network foundation 、 Programming based 、 Read by professionals on the basis of attack and defense , It can also be used as a teaching book for the major of network security .
JD self purchase link : 《Kerberos Domain network security from entry to proficiency 》- Jingdong books
边栏推荐
- How much does it cost to build a self built server for ark survival evolution?
- Power consumption: leakage power
- [Sylar] framework chapter -chapter21- environment variable module
- Object locking in relational database transactions
- 【sylar】框架篇-Chapter10-Address 模块
- Niuke, convert string to integer
- 【sylar】框架篇-Chapter8-定时器模块
- Information system project manager (2022) - key content: Project Risk Management (11)
- 物联网工业串口转WiFi模块 无线路由WiFi模块的选型
- Idea start project MVN command terminal cannot recognize "MVN" item as cmdlet
猜你喜欢

Information system project manager (2022) - key content: intellectual property rights and standards and specifications (22)

Pyqt based grouping tool

Elementary level of C language -- while, for, do while

Practice and thinking of AI standardization engine in pink client

Esp8266 WiFi module and mobile communication

Campus stray cat information recording and sharing applet source code

Learn regular expressions (regexp)

Select sorting method

校园流浪猫信息记录和分享的小程序源码
![[performance optimization methodology series] III. core idea of performance optimization (2)](/img/3c/9a2daea9bc136ae48d20d96e8f0402.png)
[performance optimization methodology series] III. core idea of performance optimization (2)
随机推荐
关系数据库事务中的对象锁定
[kinematics] simulation of orbital angular momentum based on MATLAB [including Matlab source code 1971]
Harmony's Application on the shelves reported an error. The solution of "please use the API of the released version to develop the application and apply for listing"
物联网工业串口转WiFi模块 无线路由WiFi模块的选型
登录之后右上角改变 进入登录状态
Attempt method in laravel user authentication
[Niuke] find 1+2+3+... +n
There are so many ways to view the web source code! Do you know?
10 more advanced open source command line tools
【sylar】框架篇-Chapter7-IO 协程调度模块
could only be written to 0 of the 1 minReplication nodes. There are 0 datanode(s) running and 0 node
高数_第4章__曲线积分
ADB environment configuration
Strlen introduction, and the difference between sizeof
Reading the paper "learning span level interactions for aspect sentimental triple extraction"
Information system project manager (2022) - key content: Project Contract Management (13)
Study of the Intel aria 10 Avalon mm DMA interface for PCI Express solutions User Guide
【sylar】框架篇-Chapter23-模块篇总结
Information system project manager (2022) - key content: information system integrated testing and management, project management maturity model, quantitative project management (21)
【二、移动web网页开发】2D&3D转换与动画、移动端布局、响应式布局