BackTrac 目录详解 BT4

BackTrack 4.0 系统菜单中Backtrack目录详解:
1.Information Gathering //踩点,信息收集//
2.Network Mapping //网络映射//
3.Vulnerability ldentification //确定可利用漏洞//
4.Web Application Analysis //Web应用程序分析//
5.Radio Network Analysis //无线网络分析//
6.Penetration //渗透//
7.Privilge Escalation //提权//
8.Maintaining Access //后门//
9.Covering Tracks //清除痕迹//
10.Digital Forensics //数字取证//
11.Reverse Engineering //反编译//
12.Voice Over IP //网络电话//
13.Miscellaneous //其他//

1.Information Gathering //踩点,信息收集// 子目录
1.1.All //全部//
1.2.Archive //文档//
1.3.DNS //DNS//
1.4.Route //路由//
1.5.Searchengine //搜索工具//

1.1.All //全部//
1.1.1 0trace 使用方法及参数说明 -粗解
----------------------------------------------

]#/usr/local/sbin/0trace.sh -h
/usr/local/sbin/0trace.sh iface target_ip [ target_port ]
----------------------------------------------
0trace(开头的乃是数字0不是字母O)
-h 帮助
/usr/local/sbin/0trace.sh iface target_ip [ target_port ]
iface 路由接口,target_ip 目标IP,target_port[目标端口]
实例-命令
]#/usr/local/sbin/0trace.sh eth0 192.168.1.1 80
//详细的我也不会用,就简单的说明一下,如果有人会用就回复下哦//

1.1.2 DMitry 使用方法及参数说明 -详解
----------------------------------------------
]#dmitry -h
Deepmagic Information Gathering Tool
"There be some deep magic going on"

dmitry: invalid option -- 'h'
Usage: dmitry [-winsepfb] [-t 0-9] [-o %host.txt] host
   -o     Save output to %host.txt or to file specified by -o file
   -i     Perform a whois lookup on the IP address of a host
   -w     Perform a whois lookup on the domain name of a host
   -n     Retrieve Netcraft.com information on a host
   -s     Perform a search for possible subdomains
   -e     Perform a search for possible email addresses
   -p     Perform a TCP port scan on a host
* -f     Perform a TCP port scan on a host showing output reporting filtered ports
* -b     Read in the banner received from the scanned port
* -t 0-9 Set the TTL in seconds when scanning a TCP port ( Default 2 )
*Requires the -p flagged to be passed
----------------------------------------------
-h 帮助
-o 保存扫描结果到指定文件中。默认生成格式是txt
-i 对主机IP地址WHOIS查询
-w 对主机域名WHOIS查询
-n 信息检索Netcraft.com主机
-s 搜寻子网
-e 邮件地址搜索
-p TCP端口扫描
-f 显示-p参数扫描时端口被过滤的主机
-b 在横幅阅读收到扫描端口
-t 0-9 设置时间,在几秒钟内扫描TCP端口(默认2)
实例-命令行
]#dmitry -p 127.0.0.1 -o /home/lnnchinese/1
//扫描127.0.0.1 所开放端口,保存扫描报道到/home/lnnchinese/1 文件中//

]#dmitry -p -f 127.0.0.1
//扫描127.0.0.1 所开放端口,并显示被防火墙过滤的端口//

]#dmitry -i 119.75.213.61
//扫描119.75.213.61的WHOIS信息//

]#dmitry -w
www.baidu.com

//扫描www.baidu.com的WHOIS信息//

1.1.3 DNS-Walk使用方法及参数说明 -待解

1.1.4 DNSTracer 使用方法及参数说明 -待解
----------------------------------------------
]#dnstracer -h
dnstracer: invalid option -- 'h'
DNSTRACER version 1.9 - (c) Edwin Groothuis -
http://www.mavetju.org

Usage: dnstracer [options] [host]
       -c: disable local caching, default enabled
       -C: enable negative caching, default disabled
       -o: enable overview of received answers, default disabled
       -q <querytype>: query-type to use for the DNS requests, default A
       -r <retries>: amount of retries for DNS requests, default 3
       -s <server>: use this server for the initial request, default localhost
                  If . is specified, A.ROOT-SERVERS.NET will be used.
       -t <maximum timeout>: Limit time to wait per try
       -v: verbose
       -S <ip address>: use this source address.
       -4: don't query IPv6 servers
----------------------------------------------

1.1.13 Gooscan 使用方法及参数说明 -粗解
----------------------------------------------

]#/pentest/enumeration/google/gooscan/gooscan -h
gooscan <-q query | -i query_file> <-t target>
       [-o output_file] [-p proxy:port] [-v] [-d]
       [-s site] [-x xtra_appliance_fields]
       ----------------------------------------------------------------
       (query)    is a standard google query (EX: "intitle:index.of")
       (query_file)   is a list of google queries (see README)
       (target)    is the Google appliance/server
       (output_file) is where the HTML-formatted list of results goes
       (proxy:port)   address:port of a valid HTTP proxy for bouncing
       (site)        estricrts search to one domain, like microsoft.com。
       (xtra_appliance_fields)   are required for appliance scans
       -v turns on verbose mode
       -d hex-encodes all non-alpha characters
Friendly example:
gooscan -t google.fda.gov -q food
       -x "&client=FDA&site=FDA&output=xml_no_dtd&oe=&lr=&proxystylesheet=FDA"
Google terms-of-service violations:
gooscan -t
www.google.com -q "linux"
gooscan -t
www.google.com -q "linux" -s microsoft.com
gooscan -t
www.google.com -f gdork.gs

Gooscan google scanner by j0hnny
http://johnny.ihackstuff.com

----------------------------------------------
实例-命令行
]#/pentest/enumeration/google/gooscan/gooscan -t
www.google.com -q "welcome" -s linux.com
执行结果 "welcome" returned 2820 results.
//www.google.com上搜域名linux.com的结果中包含"welcome“的字段//

]#/pentest/enumeration/google/gooscan/gooscan -t baidu.com -q lnnchinese -x "s?wd="
//百度搜索lnnchinese关键字//

说明中已经有例子参考就不详解了。

1.1.14 itrace 使用方法及参数说明 -粗解
----------------------------------------------

]#itrace -h
itrace: invalid option -- 'h'
Usage: itrace [-vn] [-pX] [-mX] [-tX] -i<dev> -d<destination>

-v    verbose
-n    reverse lookup IPs
-pX     send X probes (default=3)
-mX     maximum TTL (default=30)
-tX     timeout X sec (default=3)
-i<dev> use this device
-d<des> trace to this destination
----------------------------------------------

实例-命令行
]#itrace -v -d 222.190.98.249 -i eth0
//-i 就是要用到的网络设配,,-d 呢就是对这个目标进行追踪,-v呢就是详细的意思//
执行结果
共有10项,我就列最后几项了。
8(1)   [222.190.29.6]
9(1)   [61.155.117.114]
10(1) [222.190.98.249] (reply)


1.1.18 Metagoofil 使用方法及参数说明 -粗解
----------------------------------------------

]#/pentest/enumeration/google/metagoofil/metagoofil.py
usage: metagoofil options

       -d: domain to search
       -f: filetype to download (all,pdf,doc,xls,ppt,odp,ods, etc)
       -l: limit of results to work with (default 100)
       -o: output file, html format.
       -t: target directory to download files.

       Example: metagoofil.py -d microsoft.com -l 20 -f all -o micro.html -t micro-files
----------------------------------------------

实例-命令行
]#/pentest/enumeration/google/metagoofil/metagoofil.py -d linux520.com -l 20 -f mdb -o /home/linux520.html -t forumdisplay.php?fid=7
//下载linux520.com中forumdisplay.php?fid=7页面下的所有.mdb格式文件到指定文件/home/linux520.html//


1.1.25 theharvester 使用方法及参数说明 -粗解
----------------------------------------------
]#/pentest/enumeration/google/theharvester/theHarvester.py
Usage: theharvester options

   -d: domain to search or company name

   -l: limit the number of results to work with(msn goes from 50 to 50 results,
         google 100 to 100, and pgp does'nt use this option)

   -b: data source (google,msn,pgp,linkedin)


Examples:./theharvester.py -d microsoft.com -l 500 -b google

      ./theharvester.py -d microsoft.com -b pgp

      ./theharvester.py -d microsoft -l 200 -b linkedin
----------------------------------------------

实例-命令行
]#/pentest/enumeration/google/theharvester/theHarvester.py -d ms08_067 -b google
//-d参数 后面添加要搜索的内容,-b在帮助中有详细说明 -b: data source (google,msn,pgp,linkedin)//




 
http://backtrack.offensive-security.com/index.php/Tools
 

原文地址:https://www.cnblogs.com/zpino/p/1982305.html