小白日记6:kali渗透测试之被动信息收集(五)-Recon-ng
Recon-ng
Recon-NG是由python编写的一个开源的Web侦查(信息收集)框架。Recon-ng框架是一个全特性的工具,使用它可以自动的收集信息和网络侦查。其命令格式与Metasploit!默认集成数据库,可把查询结果结构化存储在其中,有报告模块,把结果导出为报告。1、启动Recon-NG框架[recon-ng][default] >提示符表示启动成功<span style="font-size:18px;">root@kali:~# recon-ng _/_/_/ _/_/_/_/ _/_/_/ _/_/_/ _/ _/ _/ _/ _/_/_/
_/ _/ _/ _/ _/ _/ _/_/ _/ _/_/ _/ _/
_/_/_/ _/_/_/ _/ _/ _/ _/ _/ _/ _/_/_/_/ _/ _/ _/ _/ _/_/_/
_/ _/ _/ _/ _/ _/ _/ _/_/ _/ _/_/ _/ _/
_/ _/ _/_/_/_/ _/_/_/ _/_/_/ _/ _/ _/ _/ _/_/_/ +---------------------------------------------------------------------------+
| _ ___ _ __ |
| |_)| _ _|_ |_|.|| _ | _ |_ _ _ _ _ _|_o _ _ (_ _ _ _o_|_ |
| |_)|(_|(_|\ | ||||_\ _|_| || (_)| |||(_| | |(_)| | __)(/_(_|_|| | | \/ |
| / |
| Consulting | Research | Development | Training |
| http://www.blackhillsinfosec.com |
+---------------------------------------------------------------------------+ [recon-ng v4.6.3, Tim Tomes (@LaNMaSteR53)] [71] Recon modules #71个侦查模块
[7] Reporting modules #7个报告模块
[2] Import modules #2个导入模块
[2] Exploitation modules #2个渗透攻击模块
[2] Discovery modules #2个发现模块
</span>使用help命令查看所有可执行的命令或-h
<span style="font-size:18px;">[recon-ng][default] > help Commands (type [help|?] <topic>):
---------------------------------
add Adds records to the database #将记录添加到数据库中
back Exits the current context #退出当前上下文
delete Deletes records from the database
exit Exits the framework
help Displays this menu
<strong>keys Manages framework API keys #管理框架API
load Loads specified module #加载指定模块</strong>
pdb Starts a Python Debugger session #启动python调试器
query Queries the database #查询数据库
record Records commands to a resource file #记录命令到源文件中
<strong>reload Reloads all modules #重新加载所有模块</strong>
resource Executes commands from a resource file #在框架下从源文件中执行命令
<strong>search Searches available modules #搜索可用模块</strong>
set Sets module options #设置模块参数
<strong>shell Executes shell commands #执行shell命令
show Shows various framework items #显示各种框架项目
snapshots Manages workspace snapshots #管理工作区快照
</strong>spool Spools output to a file #输出到一个文件上
unset Unsets module options #复原模块参数
<span style="color:#ff0000;">use Loads specified module #加载指定模块</span>
workspaces Manages workspaces #管理工作区
</span>root@kali:~# recon-ng -h
usage: recon-ng [-h] [-v] [-w workspace] [-r filename] [--no-check]
[--no-analytics] recon-ng - Tim Tomes (@LaNMaSteR53) tjt1980[at]gmail.com optional arguments:
-h, --help show this help message and exit
-v, --version show program's version number and exit
-w workspace load/create a workspace #设置不同工作区
-r filename load commands from a resource file#把recon-ng框架下的命令存成文本文件,可自动执行里面的指令
--no-check disable version check #每次启动不去检查recon-ng版本检查
--no-analytics disable analytics reporting #每次启动不去检查工作报告[recon-ng][sina.com] > show options Name Current Value Required Description
---------- ------------- -------- -----------
DEBUG False yes enable debugging output
NAMESERVER 8.8.8.8 yes nameserver for DNS interrogation
PROXY no proxy server (address:port)
THREADS 10 yes number of threads (where applicable)
TIMEOUT 10 yes socket timeout (seconds)
<strong>USER-AGENT Recon-ng/v4 yes user-agent string #伪装USER-AFENT</strong>
VERBOSE True yes enable verbose output注:可用抓包发现USER-AFENT
[recon-ng][sina.com] > show schema #显示数据库中的数据结构2、最常用命令use
[recon-ng][sina.com] > use双击tab键 #显示模块,可用search 寻找模块
无Google API 使用recon/domains-hosts/google_site_web使用show options/info先看一下参数
[recon-ng][sina.com][google_site_web] > show
Shows various framework items Usage: show [companies|contacts|credentials|dashboard|domains|globals|hosts|info|inputs|leaks|locations|modules|netblocks|options|ports|profiles|pushpins|schema|source|vulnerabilities] [recon-ng][sina.com][google_site_web] > show options Name Current Value Required Description
------ ------------- -------- -----------
SOURCE default yes source of input (see 'show info' for details) [recon-ng][sina.com][google_site_web] > show info Name: Google Hostname Enumerator
Path: modules/recon/domains-hosts/google_site_web.py
Author: Tim Tomes (@LaNMaSteR53) Description:
Harvests hosts from Google.com by using the 'site' search operator. Updates the 'hosts' table with
the results. Options:
Name Current Value Required Description
------ ------------- -------- -----------
SOURCE default yes source of input (see 'show info' for details) Source Options:
default SELECT DISTINCT domain FROM domains WHERE domain IS NOT NULL ORDER BY domain
<string> string representing a single input
<path> path to a file containing a list of inputs
query <sql> database query returning one column of inputs [recon-ng][sina.com][google_site_web] > show s
schema source
[recon-ng][sina.com][google_site_web] > show schema指定域
[recon-ng][sina.com][google_site_web] > set SOURCE <strong>sina.com</strong>
SOURCE => sina.com运行:run #搜索部分结果会短暂sleep,防止被搜索引擎屏蔽
没找到结果
query 使用数据库语句 select * from hosts#Select * from hosts where host like ‘%baidu.com%’ order by ip_address#select * from hosts where host like '%www%'
[recon-ng][sina.com][bing_domain_web] > search brut
[*] Searching for 'brut'... Exploitation
------------
exploitation/injection/xpath_bruter Recon
-----
recon/domains-domains/brute_suffix
recon/domains-hosts/brute_hosts [recon-ng][sina.com][bing_domain_web] > use recon/domains-hosts/brute_hosts
[recon-ng][sina.com][brute_hosts] > show options Name Current Value Required Description
-------- ------------- -------- -----------
SOURCE default yes source of input (see 'show info' for details)
WORDLIST /usr/share/recon-ng/data/hostnames.txt yes path to hostname wordlist [recon-ng][sina.com][brute_hosts] > set SOURCE sina.com
SOURCE => sina.com
[recon-ng][sina.com][brute_hosts] > run
<strong style="font-family: Arial, Helvetica, sans-serif; "></strong><pre name="code" class="plain" style="display: inline !important;">--------
4、解析IP地址(查询数据库)
</pre><pre name="code" class="plain">[recon-ng][sina.com][brute_hosts] > search res
[*] Searching for 'res'... Discovery
---------
discovery/info_disclosure/interesting_files Recon
-----
recon/hosts-hosts/resolve
recon/hosts-hosts/reverse_resolve
recon/netblocks-hosts/reverse_resolve [recon-ng][sina.com][brute_hosts] > use recon/hosts-hosts/resolve
[recon-ng][sina.com][resolve] > show options Name Current Value Required Description
------ ------------- -------- -----------
SOURCE default yes source of input (see 'show info' for details) [recon-ng][sina.com][resolve] > show info Name: Hostname Resolver
Path: modules/recon/hosts-hosts/resolve.py
Author: Tim Tomes (@LaNMaSteR53) Description:
Resolves the IP address for a host. Updates the 'hosts' table with the results. Options:
Name Current Value Required Description
------ ------------- -------- -----------
SOURCE default yes source of input (see 'show info' for details) Source Options:
default SELECT DISTINCT host FROM hosts WHERE host IS NOT NULL AND ip_address IS NULL
<string> string representing a single input
<path> path to a file containing a list of inputs
<span style="color:#ff0000;">query</span> <sql> database query returning one column of inputs Comments:
* Note: Nameserver must be in IP form.#负载均衡,一个域名可能被解析为多个IP地址
[recon-ng][sina.com][resolve] > set SOURCE query select host from hosts where host like '%youku.com%'### SQL语句,
SOURCE => query select host from hosts where host like '%youku.com%'
[recon-ng][sina.com][resolve] > run
5、导出为报告模块
[recon-ng][sina.com][resolve] > search report
[*] Searching for 'report'... Reporting
---------
reporting/csv
reporting/html
reporting/json
reporting/list
reporting/pushpin
reporting/xlsx
reporting/xml [recon-ng][sina.com][resolve] > use reporting/html
[recon-ng][sina.com][html] > show options Name Current Value Required Description
-------- ------------- -------- -----------
CREATOR yes creator name for the report footer
CUSTOMER yes customer name for the report header
FILENAME /root/.recon-ng/workspaces/default/results.html yes path and filename for report output
SANITIZE True yes mask sensitive data in the report [recon-ng][sina.com][html] >
[recon-ng][sina.com][html] > set CREATOR ZiXuan
CREATOR => ZiXuan
[recon-ng][sina.com][html] > set CUSTOMER youku.com
CUSTOMER => youku.com
[recon-ng][sina.com][html] > set FILENAME /root/sina.html
FILENAME => /root/sina.html
[recon-ng][sina.com][html] > run
[*] Report generated at '/root/sina.html'.
小白日记,未完待续……
小白日记6:kali渗透测试之被动信息收集(五)-Recon-ng的更多相关文章
- 小白日记2:kali渗透测试之被动信息收集(一)
一.被动信息收集 被动信息收集指的是通过公开渠道可获得的信息,与目标系统不产生直接交互,尽量避免留下一切痕迹的信息探测.被动探测技术收集的信息可以大致分为两类, 即配置信息和状态信息. 被动探测可收集 ...
- 小白日记3:kali渗透测试之被动信息收集(二)-dig、whios、dnsenum、fierce
一.DIG linux下查询域名解析有两种选择,nslookup或者dig.Dig(Domain Information Groper)是一个在类Unix命令行模式下查询DNS包括NS记录,A记录,M ...
- 小白日记5:kali渗透测试之被动信息收集(四)--theHarvester,metagoofil,meltag,个人专属密码字典--CUPP
1.theHarvester theHarvester是一个社会工程学工具,它通过搜索引擎.PGP服务器以及SHODAN数据库收集用户的email,子域名,主机,雇员名,开放端口和banner信息. ...
- 小白日记4:kali渗透测试之被动信息收集(三)--Shodan、Google
搜索引擎 公司新闻动态 重要雇员信息 机密⽂文档 / 网络拓扑 用户名密码 目标系统软硬件技术架构一.Shodan Shodan只搜网络设备.很多设备并不应该接入互联网,却由于本地网络管理员的疏忽和懒 ...
- 小白日记7:kali渗透测试之主动信息收集-发现(一)--二层发现:arping/shell脚本,Netdiscover,scapy
主动信息收集 被动信息收集可能不准确,可以用主动信息收集验证 特点:直接与目标系统交互通信,无法避免留下访问痕迹 解决方法:1.使用受控的第三方电脑进行探测,使用代理 (做好被封杀的准备) 2 ...
- 小白日记8:kali渗透测试之主动信息收集(二)三层发现:ping、traceroute、scapy、nmap、fping、Hping
三层发现 三层协议有:IP以及ICMP协议(internet管理协议).icmp的作用是用来实现intenet管理的,进行路径的发现,网路通信情况,或者目标主机的状态:在三层发现中主要使用icmp协议 ...
- 小白日记9:kali渗透测试之主动信息收集(二)四层发现:TCP、UDP、nmap、hping、scapy
四层发现 四层发现的目的是扫描出可能存活的IP地址,四层发现虽然涉及端口扫描,但是并不对端口的状态进行精确判断,其本质是利用四层协议的一些通信来识别主机ip是否存在. 四层发现的优点: 1.可路由且结 ...
- kali linux之被动信息收集(dns信息收集,区域传输,字典爆破)
公开可获取的信息,不与目标系统产生交互,避免留下痕迹 下图来自美军方 pdf链接:http://www.fas.org/irp/doddir/army/atp2-22-9.pdf 信息收集内容(可利用 ...
- 小白日记25:kali渗透测试之提权(五)--利用配置不当提权
利用配置不当提权 与漏洞提权相比,更常见的方法.在大部分企业环境下,会有相应的补丁更新策略,因此难以通过相应漏洞进行入侵.当入侵一台服务器后,无法照当相应的补丁进行提权,可通过寻找是否存在配置不当进行 ...
随机推荐
- stl+模拟 CCF2016 4 路径解析
// stl+模拟 CCF2016 4 路径解析 // 一开始题意理解错了.... #include <iostream> #include <string> #include ...
- hadoop2.6.0汇总:新增功能最新编译 32位、64位安装、源码包、API下载及部署文档
相关内容: hadoop2.5.2汇总:新增功能最新编译 32位.64位安装.源码包.API.eclipse插件下载Hadoop2.5 Eclipse插件制作.连接集群视频.及hadoop-eclip ...
- 十个提升你Emacs生产力的高招
转载 十个提升你Emacs生产力的高招 Emacs是世界上最好的编辑器(真的有很多人这么认为).不要以为emacs只是在编写程序时很牛X,其实只要你真正精通了emacs,会发现她几乎在所有用到打字 ...
- UVALive 7456 Least Crucial Node (并查集)
Least Crucial Node 题目链接: http://acm.hust.edu.cn/vjudge/contest/127401#problem/C Description http://7 ...
- HDU 5676 ztr loves lucky numbers (模拟)
ztr loves lucky numbers 题目链接: http://acm.hust.edu.cn/vjudge/contest/121332#problem/I Description ztr ...
- STC-ISP下载过程
- POJ1189钉子和小球(DP)
对钉子DP,如果钉子存在DP[i+1][j]+=DP[i][j]; DP[i+1][j+1]+=DP[i][j]; 如果不存在DP[i+2][j+1]+=4*DP[i][j]; 见代码:(有一个比较坑 ...
- 转:使用memc-nginx和srcache-nginx模块构建高效透明的缓存机制
原文地址:http://blog.codinglabs.org/articles/nginx-memc-and-srcache.html 为了提高性能,几乎所有互联网应用都有缓存机制,其中Memcac ...
- UVA 11134 - Fabled Rooks(贪心+优先队列)
We would like to place n rooks, 1 ≤ n ≤ 5000, on a n×n board subject to the following restrict ...
- c# 递归算法
c# 递归算法 2009-03-13 09:44 6950人阅读 评论(8) 收藏 举报 算法c#funn2c 1)1.1.2.3.5.8.......用递归算法求第30位数的值? 首先我们可以发现从 ...
没找到结果