nmap
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
| 1. nmap -sT 192.168.96.4
2. nmap -sS 192.168.96.4
7. nmap 192.168.96.4 -p <portnumber>
8. nmap 192.168.96.1/24
11. nmap -sV 192.168.96.4
12. nmap -O 192.168.96.4
14. nmap -A 192.168.96.4
18. nmap -D <假ip> 192.168.96.4
21. nmap -v 192.168.96.4
|
sqlmap
1 2 3 4 5 6 7 8 9 10 11 12 13 14
| sqlmap.py -u "url"
sqlmap.py -u "url" --dbs
sqlmap.py -u "url" -D "security" --table
sqlmap.py -u "url" -D "security" -T "email,users" --column
sqlmap.py -u "url" -D "security" -T "users" -C "id,username,password" --dump
sqlmap.py -u "url" --dump-all
sqlmap.py -u "url" -r 1.txt -p "参数名"
|
post注入:先burp抓包,保存为txt,然后在sqlmap里面-r txt -dbms
burp
wireshark
评论系统未开启,无法评论!