一、御剑后台扫描
1、御剑后台扫描珍藏版

2、御剑无字典大小限制1937版

二、dirsearch
1、从物理机复制dirsearch到kali中

2、查看帮助文档
┌──(steven?kali)-[~/penetra_test/dirsearch]
└─$ python3 dirsearch.py --help

3、扫描
-u 指定网址
-e 指定网站语言
* 扫描所有类型
steven?kali)-[~/penetra_test/dirsearch]
└─$ python3 dirsearch.py -u https://f.mnvip66.net/ -e *

参考连接:https://www.feilongwl.cn/index.php?m=home&c=article&a=index&id=483
三、gobuster
1、安装gobuster
┌──(steven?kali)-[~/penetra_test]
└─$ sudo apt-get install gobuster

2、查看常用参数
┌──(steven?kali)-[~/penetra_test]
└─$ gobuster

3、扫描
dir模式:
-u string:目标URL或域
-w string:暴力猜解的单词列表的路径
-x string:要搜索的文件扩展(仅限于DIR模式)
-t int:并发线程数(默认值10)
-o: 输出结果
--wildcard: Force continued operation when wildcard found
┌──(steven?kali)-[~/penetra_test]
└─$ gobuster dir -u https://f.mnvip66.net/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 5
参考连接:
https://blog.csdn.net/nzjdsds/article/details/86756828
http://www.52bug.cn/hacktool/6166.html

┌──(steven?kali)-[~/penetra_test]
└─$ gobuster dir -u https://f.mnvip66.net/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 5 --wildcard -x "php,html,asp,zip,rar" -o ~/penetra_test/tmp/test1.log
 
dir模式:
| grep ^"416":排除指定内容
┌──(steven?kali)-[~/penetra_test]
└─$ gobuster dir -u https://f.mnvip66.net/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 5 --wildcard -x "php,html,asp,zip,rar" -o ~/penetra_test/tmp/test2.log | grep ^"416"

|