前言
这篇文章主要记录一些被动搜集的套路,公众号前面写过的设置,注册等功能如何进行测试,可以结合本篇文章一起食用;
正文
这里以注册功能为例,下面来看看:
使用Shodan或者Fofa来进行搜索
shodan:
ssl.cert.subject.cn:"company.com" http.title:"sign up" ssl:"company.com" http.title:"sign up" ssl.cert.subject.cn:"company.com" "sign up" ssl:"company.com" "sign up" asn:ASNumber http.title:"sign up" asn:ASN Number e.g. AS19551+"sign up" hostname:company.com http.title:"sign up" hostname:company.com "sign up" net:"I.P.v.4/CIDR" http.title:"sign up" net:"I.P.v.4/CIDR" "sign up" org:"Company Inc" http.title:"sign up" org:"Company Inc" "sign up"
fofa:
cert="company.com" && title="sign up" cert.subject="company" && title="sign up" cert="company.com" && body="sign up" cert.subject="company" && body"sign up" asn="Number e.g. 19551" && title="sign up" asn="Number e.g. 19551" && body="sign up" domain="company.com" && title="sign up" domain="company.com" && body="sign up" ip="I.P.v.4/CIDR" && title="sign up" ip="I.P.v.4/CIDR" && body="sign up" org="Company Name Inc." && title="sign up" org="Company Name Inc." && body="sign up"
使用Zoomeye 和 Censys
Zoomeye:
ssl:company.com +title:"sign up" ssl:company.com +"sign up" asn:Number e.g. 19551 +title:"sign up" asn:Number e.g. 19551 +"sign up" hostname:company.com +title:"sign up" hostname:company.com +"sign up" cidr:I.P.v.4/CIDR +title:"sign up" cidr:I.P.v.4/CIDR +"sign up" organization:"Company" +title:"sign up" organization:"Company" +"sign up"
Censys:
(443.https.tls.certificate.parsed.names:company.com) AND 443.https.get.title:"sign up" (443.https.tls.certificate.parsed.names:company.com) AND 443.https.get.body:"sign up" (autonomous_system.asn:Number e.g. 19551) AND 443.https.get.title:"sign up" (autonomous_system.asn:Number e.g. 19551) AND 443.https.get.body:"sign up" company.com AND 443.https.get.title:"sign up" company.com AND 443.https.get.body:"sign up" I.P.v.4/CIDR AND 443.https.get.title:"sign up" I.P.v.4/CIDR AND 443.https.get.body:"sign up" 443.https.tls.certificate.parsed.subject.organization:"Company Inc" AND 443.https.get.title:"sign up" 443.https.tls.certificate.parsed.subject.organization:"Company Inc" AND 443.https.get.body:"sign up"
使用google
site:*.company.com intitle:"sign up"
收录于合集 #信息搜集
8个
上一篇通过自动化工具找到漏洞下一篇漏洞猎人赏金笔记-如何编写Bug Bounty自动化脚本