DETECT
最后更新于
这有帮助吗?
最后更新于
这有帮助吗?
这有帮助吗?
search
Search file(s) from target system (Support regular expression).
eg: search {pattern} {web_file_path="."}
Command Args:
-p,--pattern(*) [str] pattern
-w,--web_file_path [str] web_file_path (Default: '.')
fwpf
Search writable php files from target system.
eg: fwpf {web_file_path=webroot}
Command Args:
-fp,--web_file_path [str] web_file_path (Default: '') fc
Search config file from target system.
eg: fc {web_file_path=webroot}
Command Args:
-fp,--web_file_path [str] web_file_path (Default: '')
fl
Search log file (access.log,error.log) from target system.
eg: fl {web_file_path="/var"}
Command Args:
-fp,--web_file_path [str] web_file_path (Default: '/var')
priv
(Only for *unix) Find all files with suid belonging to root and try to get privilege escalation tips.
ps:use & to split find_path
eg: priv {find_path="/usr&/bin"}
Command Args:
-p,--find_path [str] find_path (Default: '/usr&/bin')
checkvm
Simply check whether the machine is a virtual machine. av
(Only for windows) Detect anti-virus software running on the target system.
ps: Need to run system commands
Origin: https://github.com/BrownFly/findAV