By: Jaimin Gohel
Saves time
Consistency
Accuracy
easier to pass on to other testers
Bad guys are automating too
eg:- malware that spreads without user interaction, botnets (send commands to several machines at a time).
- Dridex malware scans memory for credit card numbers
Grab list of subdomains (sublister, knockpy,google dorks)
Ping sweap (script to check which ip addresses are up in the network)
Nmap + Nikto
Nmap + Searchsploit
Directory Buster
Subdomain finding scripts (sublist3r)
python sublist3r.py -d starbucks.com
-d is for domain
Subdomain finding scripts (sublist3r) cont.
Subdomain finding scripts (knockpy)
written in python used to enumerate subdomains.
knockpy starbucks.com
knockpy -w subdomains-top1mil-5000.txt tesla.com
can take custom word list as argument.
Subdomain finding scripts (knockpy) cont.
Subdomain finding scripts (knockpy) cont.
-w custom wordlist
Find Subdomain using google dorking
site:starbucks.com -inurl:www
Ping sweap
for ip in $(seq 59 70); do ping -c 1 117.196.35.$ip | grep "bytes from" | cut -d" " -f4
done
Ping sweap (break down)
Nmap
Nmap (Network Mapper) is a security scanner, used to discover hosts and services on a computer network, thus building a "map" of the network.
Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers.
nmap -p80,443 72.247.230.85 -oG - | nikto -h -
BREAK DOWN
nmap -sV -F 72.247.230.85 -oX text.xml
Step 1: Generate Xml
Step 2: Pass into searchsploit
searchsploit --nmap test.xml
-sV: Probe open ports to determine service/version info
-F: Fast mode - Scan fewer ports than the default scan
-oX output the xml version