OSCP Learning Notes - Enumeration(2)
2020-12-13 03:11
标签:info enum src res some tin mic nload nat HTTP Enumeration Target Host IP: 10.0.0.20 Brute Forcing using DirBuster 1. Start the dirbuster and set the options. Note: 1. The wordlist can be found locally or downloaded from the Internet. OR Dirbuster-ng big wordlist dowload site:https://github.com/digination/dirbuster-ng/tree/master/wordlists 2. Progress in sacanning. 3. Scan result tree. We may find some interesting things here. 4.Open the test.php in browser, and review the source code. Brute Forcing using nikto 1. Scan the target port 80(http). 2. Scan the target port 443(https). OSCP Learning Notes - Enumeration(2) 标签:info enum src res some tin mic nload nat 原文地址:https://www.cnblogs.com/keepmoving1113/p/11070336.htmlnikto -h 10.0.0.20
nikto -h 10.0.0.20:443
文章标题:OSCP Learning Notes - Enumeration(2)
文章链接:http://soscw.com/essay/27169.html