看过的不代表你会,收藏的不代表你会,只有用过的才能算会。
osint data source
navi
https://www.shentoushi.top
https://navisec.it
Recon
whois
ip
bufferover
https://dns.bufferover.run/
支持对域名的搜索,ip rdns,ip fdns,数据源基于rapid7 fdns和rdns库。
参考介绍资料:
https://blog.erbbysam.com/
company
crunchbase
ASN’s
- ASN = Autonomous System Number
-
- Enter your bug bounty target’s a main domain (e.g. tesla.com) to get anything related via reverse lookup
- Ed.: This site is down but there are alternatives: https://opendata.rapid7.com/sonar.rdns_v2/ & http://ipv4info.com/
Shodan Organization
reference
https://pentester.land/conference-notes/2018/08/02/levelup-2018-the-bug-hunters-methodology-v3.html
—-
tool
viewdns.info
who.is
desenmascara.me
net-square.com
netcraft.com
cvedetails.com
builtwith.com
explainshell.com 对于不理解的shell命令,可以辅助分析
Name | Link |
---|---|
LinkFinder | https://github.com/GerbenJavado/LinkFinder |
Vuln 环境搭建
windows:
http://vulnstack.qiyuanxuetang.net/vuln/
学习路径规划
https://www.pentesteracademy.com/redteamlab
https://www.pentesteracademy.com/topics
https://huntingday.github.io
recon 相关技术研究
https://pentester.land
recon技巧和资料
https://ired.team/
security blog
渗透测试
Red Teaming Experiments
ADsecurity
域安全知识学习,比较全面
https://micropoor.blogspot.com/
attackresearch.com
http://carnal0wnage.attackresearch.com
历史漏洞梳理jenkins\
sixdub
之前内网渗透参与较多,18年改做安全产品
harmj0y
域安全研究较多
pentestlab
学习内网渗透知识
klion
pentest.blog
web漏洞相关,与具体设备相关
3gstudent
内网渗透
specterops
https://posts.specterops.io/archive
内网渗透