BackTrack 4.0 系统菜单中Backtrack目录详解:
1.Information Gathering //踩点,信息收集//
2.Network Mapping //网络映射//
3.Vulnerability ldentification //确定可利用漏洞//
4.Web Application Analysis //Web应用程序分析//
5.Radio Network Analysis //无线网络分析//
6.Penetration //渗透//
7.Privilge Escalation //提权//
8.Maintaining Access //后门//
9.Covering Tracks //清除痕迹//
10.Digital Forensics //数字取证//
11.Reverse Engineering //反编译//
12.Voice Over IP //网络电话//
13.Miscellaneous //其他//
1.Information Gathering //踩点,信息收集// 子目录
1.1.All //全部//
1.2.Archive //文档//
1.3.DNS //DNS//
1.4.Route //路由//
1.5.Searchengine //搜索工具//
1.1.All //全部//
1.1.1 0trace 使用方法及参数说明 -粗解
----------------------------------------------
]#/usr/local/sbin/0trace.sh -h
/usr/local/sbin/0trace.sh iface target_ip [ target_port ]
----------------------------------------------
0trace(开头的乃是数字0不是字母O)
-h 帮助
/usr/local/sbin/0trace.sh iface target_ip [ target_port ]
iface 路由接口,target_ip 目标IP,target_port[目标端口]
实例-命令行
]#/usr/local/sbin/0trace.sh eth0 192.168.1.1 80
//详细的我也不会用,就简单的说明一下,如果有人会用就回复下哦//
1.1.2 DMitry 使用方法及参数说明 -详解
----------------------------------------------
]#dmitry -h
Deepmagic Information Gathering Tool
"There be some deep magic going on"
dmitry: invalid option -- 'h'
Usage: dmitry [-winsepfb] [-t 0-9] [-o %host.txt] host
-o Save output to %host.txt or to file specified by -o file
-i Perform a whois lookup on the IP address of a host
-w Perform a whois lookup on the domain name of a host
-n Retrieve Netcraft.com information on a host
-s Perform a search for possible subdomains
-e Perform a search for possible email addresses
-p Perform a TCP port scan on a host
* -f Perform a TCP port scan on a host showing output reporting filtered ports
* -b Read in the banner received from the scanned port
* -t 0-9 Set the TTL in seconds when scanning a TCP port ( Default 2 )
*Requires the -p flagged to be passed
----------------------------------------------
-h 帮助
-o 保存扫描结果到指定文件中。默认生成格式是txt
-i 对主机IP地址WHOIS查询
-w 对主机域名WHOIS查询
-n 信息检索Netcraft.com主机
-s 搜寻子网
-e 邮件地址搜索
-p TCP端口扫描
-f 显示-p参数扫描时端口被过滤的主机
-b 在横幅阅读收到扫描端口
-t 0-9 设置时间,在几秒钟内扫描TCP端口(默认2)
实例-命令行
]#dmitry -p 127.0.0.1 -o /home/lnnchinese/1
//扫描127.0.0.1 所开放端口,保存扫描报道到/home/lnnchinese/1 文件中//
]#dmitry -p -f 127.0.0.1
//扫描127.0.0.1 所开放端口,并显示被防火墙过滤的端口//
]#dmitry -i 119.75.213.61
//扫描119.75.213.61的WHOIS信息//
]#dmitry -w www.baidu.com
//扫描www.baidu.com的WHOIS信息//
1.1.3 DNS-Walk使用方法及参数说明 -待解
1.1.4 DNSTracer 使用方法及参数说明 -待解
----------------------------------------------
]#dnstracer -h
dnstracer: invalid option -- 'h'
DNSTRACER version 1.9 - (c) Edwin Groothuis - http://www.mavetju.org
Usage: dnstracer [options] [host]
-c: disable local caching, default enabled
-C: enable negative caching, default disabled
-o: enable overview of received answers, default disabled
-q <querytype>: query-type to use for the DNS requests, default A
-r <retries>: amount of retries for DNS requests, default 3
-s <server>: use this server for the initial request, default localhost
If . is specified, A.ROOT-SERVERS.NET will be used.
-t <maximum timeout>: Limit time to wait per try
-v: verbose
-S <ip address>: use this source address.
-4: don't query IPv6 servers
----------------------------------------------
1.1.13 Gooscan 使用方法及参数说明 -粗解
----------------------------------------------
]#/pentest/enumeration/google/gooscan/gooscan -h
gooscan <-q query | -i query_file> <-t target>
[-o output_file] [-p proxy:port] [-v] [-d]
[-s site] [-x xtra_appliance_fields]
----------------------------------------------------------------
(query) is a standard google query (EX: "intitle:index.of")
(query_file) is a list of google queries (see README)
(target) is the Google appliance/server
(output_file) is where the HTML-formatted list of results goes
(proxy:port) address:port of a valid HTTP proxy for bouncing
(site) estricrts search to one domain, like microsoft.com。
(xtra_appliance_fields) are required for appliance scans
-v turns on verbose mode
-d hex-encodes all non-alpha characters
Friendly example:
gooscan -t google.fda.gov -q food
-x "&client=FDA&site=FDA&output=xml_no_dtd&oe=&lr=&proxystylesheet=FDA"
Google terms-of-service violations:
gooscan -t www.google.com -q "linux"
gooscan -t www.google.com -q "linux" -s microsoft.com
gooscan -t www.google.com -f gdork.gs
Gooscan google scanner by j0hnny http://johnny.ihackstuff.com
----------------------------------------------
实例-命令行
]#/pentest/enumeration/google/gooscan/gooscan -t www.google.com -q "welcome" -s linux.com
执行结果 "welcome" returned 2820 results.
//www.google.com上搜域名linux.com的结果中包含"welcome“的字段//
]#/pentest/enumeration/google/gooscan/gooscan -t baidu.com -q lnnchinese -x "s?wd="
//百度搜索lnnchinese关键字//
说明中已经有例子参考就不详解了。
1.1.14 itrace 使用方法及参数说明 -粗解
----------------------------------------------
]#itrace -h
itrace: invalid option -- 'h'
Usage: itrace [-vn] [-pX] [-mX] [-tX] -i<dev> -d<destination>
-v verbose
-n reverse lookup IPs
-pX send X probes (default=3)
-mX maximum TTL (default=30)
-tX timeout X sec (default=3)
-i<dev> use this device
-d<des> trace to this destination
----------------------------------------------
实例-命令行
]#itrace -v -d 222.190.98.249 -i eth0
//-i 就是要用到的网络设配,,-d 呢就是对这个目标进行追踪,-v呢就是详细的意思//
执行结果
共有10项,我就列最后几项了。
8(1) [222.190.29.6]
9(1) [61.155.117.114]
10(1) [222.190.98.249] (reply)
1.1.18 Metagoofil 使用方法及参数说明 -粗解
----------------------------------------------
]#/pentest/enumeration/google/metagoofil/metagoofil.py
usage: metagoofil options
-d: domain to search
-f: filetype to download (all,pdf,doc,xls,ppt,odp,ods, etc)
-l: limit of results to work with (default 100)
-o: output file, html format.
-t: target directory to download files.
Example: metagoofil.py -d microsoft.com -l 20 -f all -o micro.html -t micro-files
----------------------------------------------
实例-命令行
]#/pentest/enumeration/google/metagoofil/metagoofil.py -d linux520.com -l 20 -f mdb -o /home/linux520.html -t forumdisplay.php?fid=7
//下载linux520.com中forumdisplay.php?fid=7页面下的所有.mdb格式文件到指定文件/home/linux520.html//
1.1.25 theharvester 使用方法及参数说明 -粗解
----------------------------------------------
]#/pentest/enumeration/google/theharvester/theHarvester.py
Usage: theharvester options
-d: domain to search or company name
-l: limit the number of results to work with(msn goes from 50 to 50 results,
google 100 to 100, and pgp does'nt use this option)
-b: data source (google,msn,pgp,linkedin)
Examples:./theharvester.py -d microsoft.com -l 500 -b google
./theharvester.py -d microsoft.com -b pgp
./theharvester.py -d microsoft -l 200 -b linkedin
----------------------------------------------
实例-命令行
]#/pentest/enumeration/google/theharvester/theHarvester.py -d ms08_067 -b google
//-d参数 后面添加要搜索的内容,-b在帮助中有详细说明 -b: data source (google,msn,pgp,linkedin)//
http://backtrack.offensive-security.com/index.php/Tools