<menu id="guoca"></menu>
<nav id="guoca"></nav><xmp id="guoca">
  • <xmp id="guoca">
  • <nav id="guoca"><code id="guoca"></code></nav>
  • <nav id="guoca"><code id="guoca"></code></nav>

    uDork:一款功能強大的Google Hacking工具

    安全小白成長記2022-08-15 08:56:55

    uDork是一款功能強大的Google Hacking工具,uDork本質上來說,是一個采用Python編程語言開發的腳本工具,它可以使用高級Google搜索技術來獲取目標文件或目錄中的數據、搜索物聯網設備,或檢測目標Web應用程序的版本相關信息等等。

    uDork并不會對任何服務器執行攻擊行為,它只會使用預定義的Dork或exploit-db.com提供的官方列表來進行搜索和查詢。

    關于Google Hacking

    Google Hacking的含義原指利用Google搜索引擎搜索信息來進行入侵的技術和行為,現指利用各種搜索引擎搜索信息來進行入侵的技術和行為。

    Google Hacking是使用搜索引擎,比如谷歌來定位因特網上的安全隱患和易攻擊點。Web上一般有兩種容易發現的易受攻擊類型:軟件漏洞和錯誤配置。雖然一些有經驗的入侵者目標是瞄準了一些特殊的系統,同時嘗試發現會讓他們進入的漏洞,但是大部分的入侵者是從具體的軟件漏洞開始或者是從那些普通用戶錯誤配置開始,在這些配置中,他們已經知道怎樣侵入,并且初步的嘗試發現或掃描有該種漏洞的系統。谷歌對于第一種攻擊者來說用處很少,但是對于第二種攻擊者則發揮了重要作用。

    當一個攻擊者知道他想侵入的漏洞的種類,但是沒有明確的目標時,他使用掃描器。掃描器是自動開始一個檢查系統的絕大部分地方的過程,以便發現安全缺陷的這樣一個程序。最早和電腦相關的掃描器,例如,是戰爭撥號器這個程序,它會撥一長串的電話號碼,并且記錄下和調制解調器相匹配的號碼。

    工具安裝

    當然了,Python環境是必須要提前搭建好的。在使用uDork之前,你還需要安裝好goop:

    pip3 install goop
    

    下載和安裝:

    $ git clone https://github.com/m3n0sd0n4ld/uDork    $ cd uDork
    

    接下來,打開配置文件,并將下列代碼寫入:

    cookie = 'YOUR FACEBOOK COOKIES HERE'
    

    完成后,我們就可以直接在命令行終端中切換到項目目錄,并運行下列命令查看工具幫助信息了:

    $ python3 uDork.py -h
    

    注意事項

    1、為了保證工具能夠正常運行,你必須使用自己的Facebook Cookie來配置uDork的cookie.py文件;

    2、你必須在使用uDork的設備上保持Facebook的登錄狀態;

    獲取和配置Cookie

    1、登錄至facebook.com;

    2、在瀏覽器中同時按下Ctrl+Shift+K(火狐瀏覽器)或Ctrl+Shift+J(Chrome瀏覽器),打開瀏覽器命令行終端;

    3、在命令行中寫入document.cookie,并將”c_user = content”和”xs = content”寫入到cookie.py文件中的“cookie”變量中;

    cookie = 'c_user=XXXXXX; xs=XXXXXX'
    

    最后,別忘了保存文件。

    工具使用

    工具菜單:

    $ python3 uDork.py -h           _____             _              |  __ \           | |        _   _| |  | | ___  _ __| | __    | | | | |  | |/ _ \| '__| |/ /    | |_| | |__| | (_) | |  |   <      \__,_|_____/ \___/|_|  |_|\_\ v.2020.03.13    by M3n0sD0n4ld - (@David_Uton)    ----------------------------------------------------------------------------------------------------    usage: uDork.py [-h] [-d DOMAIN] [-e EXTENSION] [-t TEXT] [-s STRING]                    [-m MASSIVE] [-l LIST] [-f FILE] [-k DORK] [-p PAGES]                    [-o OUTPUT]    optional arguments:      -h, --help            show this help message and exit      -d DOMAIN, --domain DOMAIN                            Domain or IP address.      -e EXTENSION, --extension EXTENSION                            Search files by extension. Use 'all' to find the list                            extension.      -t TEXT, --text TEXT  Find text in website content.      -s STRING, --string STRING                            Locate text strings within the URL.      -m MASSIVE, --massive MASSIVE                            Attack a site with a predefined list of dorks. Review                            list <-l / - list>      -l LIST, --list LIST  Shows the list of predefined dorks (Exploit-DB).      -f FILE, --file FILE  Use your own personalized list of dorks.      -k DORK, --dork DORK  Specifies the type of dork <filetype | intext | inurl>                            (Required for '<-f / - file'>).      -p PAGES, --pages PAGES                            Number of pages to search in Google. (By default 5                            pages).      -o OUTPUT, --output OUTPUT                            Export results to a file.
    

    搜索PDF文件樣例:

    $ python3 uDork.py -d nasa.gov -e pdf           _____             _              |  __ \           | |        _   _| |  | | ___  _ __| | __    | | | | |  | |/ _ \| '__| |/ /    | |_| | |__| | (_) | |  |   <      \__,_|_____/ \___/|_|  |_|\_\ v.2020.03.13    by M3n0sD0n4ld - (@David_Uton)    ----------------------------------------------------------------------------------------------------    [!] The results will appear below. This may take several minutes, please wait ...    ----------------------------------------------------------------------------------------------------    Domain/IP: nasa.gov    Find links with: pdf    ----------------------------------------------------------------------------------------------------    https://www.sti.nasa.gov/thesvol2.pdf    https://www.sti.nasa.gov/thesvol1.pdf    https://www.nasa.gov/pdf/220260main_Workforce_Transition_Strategy_briefing.pdf    https://oig.nasa.gov/docs/SAR0318.pdf    https://oig.nasa.gov/docs/FinalWrittenStatement_03_13_2013.pdf    https://oig.nasa.gov/docs/MC-2018.pdf    https://www.nasa.gov/centers/dryden/pdf/88798main_srfcs.pdf    https://www.nasa.gov/specials/apollo50th/pdf/A10_PressKit.pdf    https://www.nasa.gov/specials/apollo50th/pdf/A14_PressKit.pdf    https://www.nasa.gov/specials/apollo50th/pdf/A07_PressKit.pdf    https://www.nasa.gov/specials/apollo50th/pdf/A15_PressKit.pdf    https://www.nasa.gov/specials/apollo50th/pdf/A09_PressKit.pdf    https://www.nasa.gov/specials/apollo50th/pdf/A08_PressKit.pdf    https://www.nasa.gov/centers/dryden/pdf/88790main_Dryden.pdf    https://oig.nasa.gov/docs/MC-2017.pdf    ....
    

    搜索單詞“password”的搜索路徑樣例:

    $ python3 uDork.py -d nasa.gov -s password           _____             _              |  __ \           | |        _   _| |  | | ___  _ __| | __    | | | | |  | |/ _ \| '__| |/ /    | |_| | |__| | (_) | |  |   <      \__,_|_____/ \___/|_|  |_|\_\ v.2020.03.13    by M3n0sD0n4ld - (@David_Uton)    ----------------------------------------------------------------------------------------------------    [!] The results will appear below. This may take several minutes, please wait ...    ----------------------------------------------------------------------------------------------------    Domain/IP: nasa.gov    Find links with: password    ----------------------------------------------------------------------------------------------------    https://www.grc.nasa.gov/its-training/best-practices/password-tips/    https://www.grc.nasa.gov/its-training/best-practices/password-rules/    https://www.nas.nasa.gov/hecc/support/kb/password-creation-rules_270.html    https://www.nas.nasa.gov/hecc/support/kb/index.php%3FView%3Dentry%26EntryID%3D270%26EntryTitle%3Dpassword-creation-rules%26mobile%3D0    https://open.nasa.gov/datanaut-accounts/password/reset/%3Fnext%3D/explore/datanauts/app/profile    https://www.nas.nasa.gov/hecc/support/kb/i-cant-log-inmy-password-is-not-workingmy-account-is-locked_5.html    https://www.nas.nasa.gov/hecc/support/kb/index.php%3FView%3Dentry%26EntryID%3D53%26EntryTitle%3Dtwo-step-connection-using-rsa-securid-passcode-and-nas-password%26mobile%3D0    https://www.nas.nasa.gov/hecc/support/kb/index.php%3FView%3Dentry%26EntryID%3D8%26EntryTitle%3Dwhat-are-the-requirements-for-creating-a-password%26mobile%3D0    https://oltaris.nasa.gov/password/new    https://ghrc.nsstc.nasa.gov/data-publication/user/password    https://answers.nssc.nasa.gov/app/answers/detail/a_id/6173/~/change-launchpad-%2528idmax%2529-password    https://answers.nssc.nasa.gov/app/answers/list/search/1/kw/Password/search/1    https://answers.nssc.nasa.gov/app/answers/list/search/1/kw/CHANGE%2520NDC%2520PASSWORD/suggested/1    https://answers.nssc.nasa.gov/app/answers/detail/a_id/6174/~/reset-ndc-password    .....
    

    Dork列表:

    $ python3 uDork.py -l list           _____             _              |  __ \           | |        _   _| |  | | ___  _ __| | __    | | | | |  | |/ _ \| '__| |/ /    | |_| | |__| | (_) | |  |   <      \__,_|_____/ \___/|_|  |_|\_\ v.2020.03.13    by M3n0sD0n4ld - (@David_Uton)    ----------------------------------------------------------------------------------------------------     ======================== DORKS LISTING ========================     admin : Access panels of all kinds (administration, login, CMS, ...)     directories : Sensitive directories (drupal, wordpress, phpmyadmin ...)     usernames : Find files containing user names.     passwords : Find files that contain passwords.     webservers: Find web servers.     vulnerable_files : Find vulnerable files.      vulnerable_servers : Find vulnerable servers.     error_messages : Show error messages.     vulnerable_networks : Find software data on vulnerable networks.     portal_logins : List portal logins.     devices :  Find connected devices (printers, webcams, thermostats, ...)
    

    Dorks Massive使用樣例:

    $ python3 uDork.py -d nasa.gov -m admin -p 3 -o report.txt           _____             _              |  __ \           | |        _   _| |  | | ___  _ __| | __    | | | | |  | |/ _ \| '__| |/ /    | |_| | |__| | (_) | |  |   <      \__,_|_____/ \___/|_|  |_|\_\ v.2020.03.13    by M3n0sD0n4ld - (@David_Uton)    ----------------------------------------------------------------------------------------------------    [!] The results will appear below. This may take several minutes, please wait ...    ----------------------------------------------------------------------------------------------------    Domain/IP: nasa.gov    Find links with: ADMIN/    https://asd.gsfc.nasa.gov/blueshift/index.php/author/admin/    https://lists.hq.nasa.gov/mailman/admin    https://lists.hq.nasa.gov/mailman/admin/LISTNAME    https://rosetta.jpl.nasa.gov/blogs/admin    https://dartslab.jpl.nasa.gov/qa/user/admin    https://landsat.gsfc.nasa.gov/author/admin/page/8/    https://rosetta.jpl.nasa.gov/blogs/admin%3Fpage%3D1    https://www.nasa.gov/news/speeches/admin/mg_speech_collection_archive_4.html    https://dartslab.jpl.nasa.gov/qa/user/admin/answers    https://dartslab.jpl.nasa.gov/qa/user/admin/wall    https://landsat.gsfc.nasa.gov/author/admin/page/14/    ....    ----------------------------------------------------------------------------------------------------    Domain/IP: nasa.gov    Find links with: AdminTools/    https://kscddms.ksc.nasa.gov/adminTools.html    ----------------------------------------------------------------------------------------------------    Domain/IP: nasa.gov    Find links with: Server.html    https://image.msfc.nasa.gov/ChrisDocs/udfLib/Server.html    https://www.nasa.gov/privacy/PIA-ODIN-server.html    MORE RESULTS...
    
    httpscookie
    本作品采用《CC 協議》,轉載必須注明作者和本文鏈接
    Ceye DNS:DNS oob平臺 http://ceye.io/. TLS證書信息查詢Censys:https://censys.io. 網絡空間搜索Fofa:https://fofa.info/
    Ceye DNS:DNS oob平臺 http://ceye.io/. TLS證書信息查詢Censys:https://censys.io. 網絡空間搜索Fofa:https://fofa.info/
    Yearning MYSQL 是一個SQL語句審核平臺。提供查詢審計,SQL審核等多種功能,支持Mysql,可以在一定程度上解決運維與開發之間的那一環,功能豐富,代碼開源,安裝部署容易!
    此外,該工具還支持對不同操作人員進行權限劃分,獨立搭配任務。網站的整體操作體驗也非常舒適,前端基于 Vue.js 構建,另提供 SQL 語法高亮、智能補全、可視化等基礎功能。總而言之,這款工具可謂極大解放了 DBA 人員的生產力,免去了很多繁瑣的人工審核流程,讓他們可以更加專注于產品業務的細節實現。
    前陣子做了一下 Dice CTF 2021,做出了幾個 XSS ,本次就寫一下包括復現題在內的所有學習筆記。
    風險通告 近日,奇安信CERT監測到微軟修復了Microsoft Exchange多個高危漏洞。通過組合利用這些漏洞能夠在未經身份驗證的情況下遠程獲取目標服務器權限。其中包括CVE-2021-26855:服務端請求偽造漏洞;CVE-2021-2685...
    ?上整理的?試問題?全,有些 HW ?試的題,已經收集好了,提供給?家。
    本文將介紹不依靠DPAPI的方式獲取Chromium內核瀏覽器Cookie
    如何使用ChromeCookieStealer通過開發者工具收集和注入Chrome Cookie
    它最初于2002年在Microsoft Internet Explorer 6 SP1中實現,以防止敏感信息被盜。所有現代的后端語言和環境都支持設置HttpOnly標志。該標志防止通過中間人攻擊盜竊cookie 。請注意,只能在HTTPS連接期間設置此標志。此標志用于幫助防止跨站點請求偽造攻擊。例如,在2019年,Google Chrome瀏覽器更改了SameSite cookie的默認行為。即使cookie標志對于許多攻擊有效,也不能用作跨站點腳本的補救措施。攻擊者可能想出辦法來規避限制。
    安全小白成長記
    暫無描述
      亚洲 欧美 自拍 唯美 另类