OSCP Learning Notes - Enumeration(2)

2020-12-13 03:11

阅读:285

标签:info   enum   src   res   some   tin   mic   nload   nat   

HTTP Enumeration

Target Host IP: 10.0.0.20

Brute Forcing using DirBuster

1. Start the dirbuster and set the options.

技术图片

Note:

  1. The wordlist can be found locally or downloaded from the Internet.   

    技术图片

   OR  Dirbuster-ng big wordlist dowload site:https://github.com/digination/dirbuster-ng/tree/master/wordlists

2. Progress in sacanning.

技术图片

 

3. Scan result tree. We may find some interesting things here.

技术图片

4.Open the test.php in browser, and review the source code.

技术图片

 

 Brute Forcing using nikto

1. Scan the target port 80(http).

nikto -h 10.0.0.20

技术图片

2. Scan the target port 443(https).

nikto -h 10.0.0.20:443

技术图片

 

OSCP Learning Notes - Enumeration(2)

标签:info   enum   src   res   some   tin   mic   nload   nat   

原文地址:https://www.cnblogs.com/keepmoving1113/p/11070336.html


评论


亲,登录后才可以留言!