Skip to content

Commit 5e3fb79

Browse files
author
rawidN
committed
update subdomain 配置
1 parent 7db8c6f commit 5e3fb79

File tree

3 files changed

+63
-81
lines changed

3 files changed

+63
-81
lines changed

docs/configration/config.md

Lines changed: 16 additions & 80 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@
1111

1212
version: 2.1
1313
plugins:
14+
max_parallel: 10
1415
xss:
1516
enabled: true
1617
ie_feature: false
@@ -58,86 +59,7 @@ plugins:
5859
phantasm:
5960
enabled: true
6061
depth: 1
61-
poc:
62-
- poc-yaml-activemq-cve-2016-3088
63-
- poc-yaml-bash-cve-2014-6271
64-
- poc-yaml-cacti-weathermap-file-write
65-
- poc-yaml-coldfusion-cve-2010-2861-lfi
66-
- poc-yaml-confluence-cve-2015-8399
67-
- poc-yaml-confluence-cve-2019-3396-lfi
68-
- poc-yaml-coremail-cnvd-2019-16798
69-
- poc-yaml-couchdb-cve-2017-12635
70-
- poc-yaml-couchdb-unauth
71-
- poc-yaml-dedecms-url-redirection
72-
- poc-yaml-discuz-wooyun-2010-080723
73-
- poc-yaml-discuz-v72-sqli
74-
- poc-yaml-discuz-wechat-plugins-unauth
75-
- poc-yaml-dlink-850l-info-leak
76-
- poc-yaml-dlink-cve-2019-16920-rce
77-
- poc-yaml-docker-api-unauthorized-rce
78-
- poc-yaml-docker-registry-api-unauth
79-
- poc-yaml-drupal-drupalgeddon2-rce
80-
- poc-yaml-drupalgeddon-cve-2014-3704-sqli
81-
- poc-yaml-ecology-javabeanshell-rce
82-
- poc-yaml-ecology-workflowcentertreedata-sqli
83-
- poc-yaml-ecshop-360-rce
84-
- poc-yaml-elasticsearch-cve-2015-1427
85-
- poc-yaml-elasticsearch-unauth
86-
- poc-yaml-etouch-v2-sqli
87-
- poc-yaml-finereport-directory-traversal
88-
- poc-yaml-glassfish-cve-2010-2861-lfi
89-
- poc-yaml-hadoop-yarn-unauth
90-
- poc-yaml-ifw8-router-cve-2019-16313
91-
- poc-yaml-influxdb-unauth
92-
- poc-yaml-jboss-unauth
93-
- poc-yaml-jenkins-cve-2018-1000861-rce
94-
- poc-yaml-joomla-cve-2015-7297-sqli
95-
- poc-yaml-joomla-cve-2017-8917-sqli
96-
- poc-yaml-joomla-ext-zhbaidumap-cve-2018-6605-sqli
97-
- poc-yaml-maccmsv10-backdoor
98-
- poc-yaml-metinfo-cve-2019-16996-sqli
99-
- poc-yaml-metinfo-cve-2019-16997-sqli
100-
- poc-yaml-metinfo-cve-2019-17418-sqli
101-
- poc-yaml-metinfo-lfi-cnvd-2018-13393
102-
- poc-yaml-nextjs-cve-2017-16877
103-
- poc-yaml-nhttpd-cve-2019-16278
104-
- poc-yaml-nuuo-file-inclusion
105-
- poc-yaml-php-cgi-cve-2012-1823
106-
- poc-yaml-phpmyadmin-cve-2018-12613-file-inclusion
107-
- poc-yaml-phpmyadmin-setup-deserialization
108-
- poc-yaml-phpstudy-backdoor-rce
109-
- poc-yaml-phpunit-cve-2017-9841-rce
110-
- poc-yaml-joomla-cnvd-2019-34135-rce
111-
- poc-yaml-springcloud-cve-2019-3799
112-
- poc-yaml-tomcat-cve-2018-11759
113-
- poc-yaml-pulse-cve-2019-11510
114-
- poc-yaml-rails-cve-2018-3760-rce
115-
- poc-yaml-resin-cnnvd-200705-315
116-
- poc-yaml-resin-inputfile-fileread-or-ssrf
117-
- poc-yaml-resin-viewfile-fileread
118-
- poc-yaml-seacms-v654-rce
119-
- poc-yaml-apache-solr-cve-2017-12629-xxe
120-
- poc-yaml-solr-cve-2019-0193
121-
- poc-yaml-supervisord-cve-2017-11610
122-
- poc-yaml-tensorboard-unauth
123-
- poc-yaml-thinkphp5-controller-rce
124-
- poc-yaml-thinkphp5023-method-rce
125-
- poc-yaml-tomcat-cve-2017-12615-rce
126-
- poc-yaml-uwsgi-cve-2018-7490
127-
- poc-yaml-vbulletin-cve-2019-16759
128-
- poc-yaml-weblogic-cve-2017-10271-reverse
129-
- poc-yaml-weblogic-cve-2019-2729-1
130-
- poc-yaml-weblogic-cve-2019-2729-2
131-
- poc-yaml-weblogic-ssrf
132-
- poc-yaml-weblogic-cve-2017-10271
133-
- poc-yaml-weblogic-cve-2019-2725
134-
- poc-yaml-webmin-cve-2019-15107-rce
135-
- poc-yaml-wuzhicms-v410-sqli
136-
- poc-yaml-yungoucms-sqli
137-
- poc-yaml-zabbix-authentication-bypass
138-
- poc-yaml-zabbix-cve-2016-10134-sqli
139-
- poc-yaml-zimbra-cve-2019-9670-xxe
140-
- poc-go-tomcat-put
62+
poc: []
14163

14264
log:
14365
level: info # 支持 debug, info, warn, error, fatal
@@ -221,4 +143,18 @@ http:
221143
- PROPFIND
222144
- MOVE
223145
tls_skip_verify: true # 是否验证目标网站的 https 证书。
146+
147+
subdomain:
148+
modes: # 使用哪些方式获取子域名
149+
- brute # 字典爆破模式
150+
- api # 使用各大 api 获取
151+
- zone_transfer # 尝试使用域传送漏洞获取
152+
worker_count: 100 # 决定同时允许多少个 DNS 查询
153+
dns_servers: # 查询使用的 DNS server
154+
- 1.1.1.1
155+
- 8.8.8.8
156+
allow_recursive: false # 是否允许递归扫描,开了后如果发现 a.example.com 将继续扫描 a.example.com 的子域名
157+
max_depth: 5 # 最大允许的子域名深度
158+
main_dictionary: "" # 一级子域名字典, 绝对路径
159+
sub_dictionary: "" # 其它层级子域名字典, 绝对路径
224160
```

docs/configration/plugins.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,20 @@
1+
在具体插件配置之前,plugins 部分有个顶级配置项为 `max_parallel`, 表示插件的并发度。举个例子,如果需要处理 3 个请求,此时启用了三个插件 sqldet, xss, cmd_injection, 当设置 `max_parallel` 为 1 时,处理过程为:
12

2-
配置文件中的 `plugins` 部分对应于插件的配置项,一个插件是一个配置单元,每个单元的基本格式为:
3+
```
4+
sqldet, xss, cmd_injection 同时处理 request1
5+
sqldet, xss, cmd_injection 同时处理 request2
6+
sqldet, xss, cmd_injection 同时处理 request3
7+
```
8+
9+
`max_parallel` 设置为 3 时,处理过程为:
10+
11+
```
12+
sql,xss,cmd_injection 同时并发(3并发)处理 request1, request2, request3
13+
```
14+
理论上时间会算缩短3倍,但这个值并非越大越好,高并发意味着同一时间发包数量大幅增加,这可能会影响远程 server 的运行和xray 对漏洞的判断,需要按需设置。默认值为 `max_parallel`
15+
16+
17+
对于其他配置项,一个插件是一个配置单元,每个单元的基本格式为:
318

419
```yaml
520
pluginName:

docs/configration/subdomain.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
```yaml
2+
subdomain:
3+
modes: # 使用哪些方式获取子域名
4+
- brute # 字典爆破模式
5+
- api # 使用各大 api 获取
6+
- zone_transfer # 尝试使用域传送漏洞获取
7+
worker_count: 100 # 决定同时允许多少个 DNS 查询
8+
dns_servers: # 查询使用的 DNS server
9+
- 1.1.1.1
10+
- 8.8.8.8
11+
allow_recursive: false # 是否允许递归扫描,开了后如果发现 a.example.com 将继续扫描 a.example.com 的子域名
12+
max_depth: 5 # 最大允许的子域名深度
13+
main_dictionary: "" # 一级子域名字典, 绝对路径
14+
sub_dictionary: "" # 其它层级子域名字典, 绝对路径
15+
```
16+
17+
子域名的配置项相对比较简洁,对照注释大都可以理解。
18+
19+
## worker_count
20+
21+
这个 worker_count 对应于 goroutine, 如果没写过 go,可以理解为其他语言的协程、线程。如果设置为 100,指的是同时可能有 100 个 DNS 查询请求发出。这和 http 配置中的 `max_qps` 不一样,`max_qps` 指的是 1s 内最大运行的请求数。
22+
23+
## `allow_recursive` 和 `max_depth`
24+
25+
假设子域名扫描的目标为 `example.com`, 发现有子域名 `a.example.com`。
26+
当开启 `allow_recurisive` 后,将自动把 `a.example.com` 视为新的扫描目标,进而可能获得 `b.a.example.com` 等二级子域。 而最大的子域深度由 `max_depth` 控制。
27+
28+
## `main_dictionary` 和 `sub_dictionary`
29+
30+
与 `dirscan` 插件类似,当没有配置这两项时将使用内置字典,默认 main 字典为 Top3000, 默认 sub 字典为 top200。
31+
当配置了自定义字典时,将使用用户配置的字典而禁用内直字典,两个配置项可以单独配置。

0 commit comments

Comments
 (0)