涉及工具:
https://github.com/ffuf/ffuf
https://github.com/ffuf/ffuf/releases/tag/v1.2.1
ffuf -w /path/to/wordlist -u https://target/FUZZ
ffuf -w /path/to/vhost/wordlist -u https://target -H "Host: FUZZ" -fs 4242
ffuf -w /path/to/wordlist -u https://target/FUZZ -maxtime 60
Fuzz Faster U Fool - v1.2.0-git
https://github.com/fofapro/Hosts_scan
一个用于IP和域名碰撞匹配访问的小工具,旨意用来匹配出渗透过程中需要绑定hosts才能访问的弱主机或内部系统。
IP_hosts_scan_multithreading.py 为 Rivaill 修改为多线程版本并添加了进度条,Python2.* / Python3.* 均可执行
Python => 3.X
python IP_hosts_scan.py
读取 ip.txt 和 hosts.txt 遍历匹配访问
案例:
http://r3start.net/wp-content/uploads/2019/08/2019080916135087.pdf