/16
s
masscan
to identify hosts first, passing these into Nessuswget https://www.tenable.com/downloads/api/v2/pages/nessus/files/Nessus-latest-debian10_amd64.deb
sudo dpkg -i Nessus-latest-debian10_amd64.deb
sudo systemctl enable nessusd.service
sudo systemctl start nessusd
sudo masscan -iL scope.txt --rate 1000 -oX masscan-sweep.xml -p <ports>
80,23,443,21,22,25,3389,110,445,139,143,53,135,3306,8080,1723,111,995,993,5900,1025,587,8888,199,1720,6379,1433,5432,9200,2049
sort -r -k3 /usr/share/nmap/nmap-services | grep tcp | head -n {num_ports} | awk '{split($2, a, "/"); print a[1]}' | paste -sd ',' -
gowitness scan cidr --write-db --cidr {IP_range} --write-db
gowitness scan file --write-db -f {file_with_ips}
gowitness scan cidr --write-db --cidr-file {file_with_cidrs}
gowitness report server
in the same directory (with gowitness.sqlite3
)Common Passowrds
test.local
ffuf
can serve us nicelytest.local
in /etc/hosts
, and then run ffuf -u http://{IP} -H "Host: FUZZ.test.local" -w /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt
gobuster vhost -u http://test.local -w /usr/share/wordlists/seclists/Discovery/DNS/bitquark-subdomains-top100000.txt -t 200 --append-domain > vhost
and then grep vhost
for "Status: 200"
or grep -v {data_to_exclude}