黑帽百科目錄
黑帽百科(骨灰版)子夜飄雪1976/5/23 10:48:19 @qq.com本書(shū)只作為技術(shù)交流使用,代碼均具備攻擊性,內(nèi)容來(lái)源于互聯(lián)網(wǎng),請(qǐng)勿用于非法途徑 ,黑帽百科(骨灰
黑帽百科(骨灰版)
子夜飄雪1976/5/23 10:48:19 @qq.com
本書(shū)只作為技術(shù)交流使用,代碼均具備攻擊性,內(nèi)容來(lái)源于互聯(lián)網(wǎng),請(qǐng)勿用于非法途徑
,黑帽百科(骨灰版)
目 錄
序言..................................................................................................................................................9
第一章 黑帽優(yōu)化...........................................................................................................................10
1.1、搜索優(yōu)化誤區(qū)...............................................................................................................10
1.3、網(wǎng)站的權(quán)重快速提升...................................................................................................13
1.4、K 站方法.........................................................................................................................16
1.5、刷搜索引擎搜索下來(lái)(移動(dòng)端和PC 端)....................................................................16
1.6、如何刷ALEXA 排名.........................................................................................................18
1.7、刷高權(quán)重外鏈...............................................................................................................21
1.8、關(guān)鍵詞指數(shù)建立和提高...............................................................................................21
1.9、鏈輪選擇和權(quán)重順延...................................................................................................22
1.9.1、鏈輪模型............................................................................................................22
1.10、蜘蛛池制作方式.........................................................................................................23
1.10.1、IIS 建泛站群蜘蛛池教程...................................................................................23
1.11、DNS 劫持......................................................................................................................30
1.11.1、內(nèi)網(wǎng)dns 劫持.....................................................................................................32
1.11.2、通過(guò)瀏覽器漏洞進(jìn)行dns 劫持.........................................................................40
1.11.2.1、 win95 ie3-win10 ie11全版本執(zhí)行漏洞..............................................40
1.11.2.2、IE7-IE8 0day...........................................................................................46
1.11.2.3、IE11漏洞代碼........................................................................................71
1.11.2.4、Flash 0day..............................................................................................73
1.12、域名劫持和網(wǎng)站跳轉(zhuǎn).................................................................................................82
第二章 網(wǎng)站漏洞...........................................................................................................................85
2.1、常見(jiàn)漏洞類(lèi)型...............................................................................................................85
2.1.1、SQL 注入原理......................................................................................................92
2.1.2、SQL 注入語(yǔ)句....................................................................................................104
2.1.3、語(yǔ)句大全..........................................................................................................125
2.1.4、推薦學(xué)習(xí)..........................................................................................................147
2.1.5、利用IIS 解析漏洞上傳圖片木馬.......................................................................150
2.2、常見(jiàn)0day/exp/poc.......................................................................................................151
2.2.1、FCKeditor-Exp 通殺0day....................................................................................151
2.2.2、ecshop SQL注入通殺漏洞以及后臺(tái)拿SHELL...................................................153
2.2.3、phpcms-exp 0day..............................................................................................155
2.2.4、BLDCMS(白老大小說(shuō)) Getshell 0day EXP.........................................................159
2.2.5、IE/6/7/8 0day EXP.............................................................................................160
2.2.6、Discuz! X2.5 遠(yuǎn)程代碼執(zhí)行漏洞及EXP 0day...................................................161
2.2.7、南方數(shù)據(jù)企業(yè)0day 漏洞爆后臺(tái)密碼...............................................................162
2.3、提權(quán).............................................................................................................................162
2.3.1、1433映像劫持后門(mén)提權(quán)..................................................................................167
2.3.2、通過(guò)IFEO 劫持提權(quán)...........................................................................................168
2.3.3、windows 提權(quán)技巧總結(jié)....................................................................................183
2.4、漏洞檢測(cè)工具.............................................................................................................219
2.5、安全事件.....................................................................................................................219
本書(shū)只作為技術(shù)交流使用,代碼均具備攻擊性,內(nèi)容來(lái)源于互聯(lián)網(wǎng),請(qǐng)勿用于非法途徑
,黑帽百科(骨灰版)
2.5.1、Github 代碼泄露...............................................................................................219
2.6、入侵資料.....................................................................................................................227
2.6.1、oldjun 入侵經(jīng)驗(yàn)................................................................................................228
2.6.2、Tsingx 經(jīng)驗(yàn)總結(jié)...............................................................................................229
2.6.3、入侵指定網(wǎng)站思路..........................................................................................232
2.6.4、webshell 獲取....................................................................................................237
2.6.4.1、后臺(tái)拿webshell 的常用方法.................................................................237
2.6.5、入侵筆記總結(jié)..................................................................................................241
2.7、入侵資料輔助.............................................................................................................276
第三章 黑帽工具.........................................................................................................................280
3.1、翻墻.............................................................................................................................280
3.1.1、sqsx V0.4 beta9.................................................................................................280
3.1.2、Danger...............................................................................................................281
3.1.3、TOR 洋蔥頭........................................................................................................282
3.1.4、自由門(mén)..............................................................................................................282
3.2、webshell 獲取...............................................................................................................283
3.2.1、椰樹(shù)..................................................................................................................283
3.2.2、M7lrv.................................................................................................................285
3.2.3、鬼哥dedecms 9090...........................................................................................286
3.2.4、Discuz 升級(jí)利用工具........................................................................................290
3.2.5、WDCP 漏洞利用工具........................................................................................291
3.2.6、Struts2命令執(zhí)行...............................................................................................292
3.2.7、FCK 利用工具....................................................................................................296
3.2.8、綜合getshell 工具..............................................................................................298
3.2.8.1、alihack 綜合滲透工具............................................................................298
3.2.8.2、輕量級(jí)getshell 工具...............................................................................300
3.2.8.3、FCK getshell工具....................................................................................301
3.2.9、小龍cms 識(shí)別....................................................................................................301
3.3、webshell 管理工具.......................................................................................................302
3.3.1、中國(guó)菜刀..........................................................................................................302
3.3.1.1、附菜刀箱子制作...................................................................................303
3.3.1.2、菜刀導(dǎo)入和導(dǎo)出工具............................................................................306
3.3.1.3、自己打造一把“菜刀“........................................................................307
3.3.2、XISE webshell綜合管理工具............................................................................316
3.3.3、web 版shell 管理工具........................................................................................316
3.4、爆破工具.....................................................................................................................319
3.4.1、木馬爆破工具..................................................................................................319
3.4.2、端口入侵工具..................................................................................................324
3.4.2.1、1433入侵工具.......................................................................................324
3.4.2.2、8080爆破(主抓linux )........................................................................325
3.4.2.3、3389爆破...............................................................................................325
3.4.2.4、自定義端口爆破工具............................................................................332
3.4.2.5、批量爆3389的SHIFT 后門(mén)......................................................................333
3.4.2.6、9200抓linux 神器....................................................................................335
本書(shū)只作為技術(shù)交流使用,代碼均具備攻擊性,內(nèi)容來(lái)源于互聯(lián)網(wǎng),請(qǐng)勿用于非法途徑
,黑帽百科(骨灰版)
3.4.2.7、SSH 爆破傳馬.........................................................................................336
3.4.2.8、3306端口爆破.......................................................................................337
3.4.2.9、445端口爆破.........................................................................................340
3.4.2.10、shift 后門(mén)(去密碼版)......................................................................340
3.4.2.11、23端口爆破.........................................................................................341
3.4.2.12、135端口爆破.......................................................................................342
3.4.2.13、4899端口爆破.....................................................................................342
3.4.2.14、21端口(ftp 爆破).............................................................................343
3.4.3、webshell 存活檢測(cè)/批量掛連接工具...............................................................345
3.4.3.1、屌絲軟件...............................................................................................345
3.4.3.2、麥灰軟件...............................................................................................348
3.4.3.3、一句話掛鏈接工具................................................................................350
3.4.3.4、XISE WEBSHELL管理..............................................................................350
3.4.3.5、webshell 批量掛鏈.................................................................................352
3.4.3.6、波斯特軟件...........................................................................................352
3.5、C 段/B段工具...............................................................................................................354
3.5.1、御劍..................................................................................................................354
3.5.2、C 段信息查詢....................................................................................................355
3.5.3、b0y C段查詢工具.............................................................................................355
3.5.4、安全盒子C 段....................................................................................................357
3.5.5、椰樹(shù)C 段............................................................................................................357
3.5.6、K8 C段工具.......................................................................................................358
3.5.7、M7lrv C段查詢..................................................................................................359
3.6、目錄掃描.....................................................................................................................359
3.6.1、御劍目錄掃描..................................................................................................360
3.6.2、webroot............................................................................................................361
3.6.3、wwwscan ..........................................................................................................361
3.6.4、Dotnet...............................................................................................................362
3.6.5、Pker...................................................................................................................362
3.6.6、WVS...................................................................................................................363
3.6.7、M7lrv 自定義目錄探測(cè)....................................................................................363
3.6.8、菜刀目錄爬行..................................................................................................364
3.6.9、目錄偵測(cè)小結(jié)..................................................................................................364
3.6.10、敏感文件嗅探................................................................................................365
3.6.11、多線程網(wǎng)站目錄窮舉掃描腳本.....................................................................371
3.7、域名挖掘.....................................................................................................................373
3.7.1、Layer 子域名挖掘機(jī)3.1....................................................................................373
3.7.2、t00ts 子域名查詢..............................................................................................374
3.7.3、wydomain 目標(biāo)子域名信息收集組件.............................................................375
3.7.4、其他子域名查詢工具......................................................................................380
3.8、服務(wù)器端口查詢工具.................................................................................................380
3.8.1、端口爆破工具..................................................................................................381
3.8.2、wyportmap 目標(biāo)端口 系統(tǒng)服務(wù)指紋識(shí)別組件..............................................384
3.8.3、Nscan 端口掃描.................................................................................................386本書(shū)只作為技術(shù)交流使用,代碼均具備攻擊性,內(nèi)容來(lái)源于互聯(lián)網(wǎng),請(qǐng)勿用于非法途徑
,黑帽百科(骨灰版)
3.9、編碼工具.....................................................................................................................392
3.9.1、編碼轉(zhuǎn)換工具..................................................................................................392
3.9.2、js 加密/解密......................................................................................................395
3.9.3、特殊加密..........................................................................................................397
3.9.3.1、木馬加密...............................................................................................397
3.9.3.2、一句話加密相關(guān)...................................................................................399
3.9.3.3、PHP EXP的漏洞利用方法......................................................................403
3.10、網(wǎng)站權(quán)重、收錄批量查詢.......................................................................................412
3.10.1、b0y 批量網(wǎng)站權(quán)重查詢...................................................................................413
3.10.2、外鏈助手批量查詢........................................................................................413
3.11、關(guān)鍵詞挖掘...............................................................................................................414
3.11.1、戰(zhàn)神長(zhǎng)尾詞挖掘............................................................................................414
3.11.2、長(zhǎng)尾詞挖掘....................................................................................................415
3.11.3、web 版關(guān)鍵詞查詢工具.........................................................................................416
3.12、URL-keywords............................................................................................................416
3.12.1、b0y URL采集...................................................................................................416
3.12.2、simon 頁(yè)面URL 一鍵提取器............................................................................417
3.12.3、法克URL 采集..................................................................................................417
3.12.4、暗月URL 采集..................................................................................................418
3.12.5、承影URL 采集器..............................................................................................418
3.12.6、t00ts URL采集專版.........................................................................................419
3.12.7、百谷URl 采集工具...........................................................................................420
3.13、數(shù)據(jù)整理...................................................................................................................420
3.13.1、TXT 合并/切割工具.........................................................................................420
3.13.2、EXCEL 函數(shù)運(yùn)算...............................................................................................421
3.13.3、大數(shù)據(jù)查看工具............................................................................................422
3.13.4、MDB 查看工具................................................................................................427
3.13.5、菜刀導(dǎo)入導(dǎo)出................................................................................................428
3.14、DDOS 工具..................................................................................................................429
3.14.1、血腥ddos........................................................................................................429
3.14.2、Asp 后臺(tái)服務(wù)控制的 DDOS 木馬................................................................430
3.15、CC 攻擊.......................................................................................................................435
3.16、XSS.............................................................................................................................435
3.16.1、xss 輔助工具...................................................................................................435
3.16.1.1、xss 輔助................................................................................................435
3.16.1.3、XSS 字符編碼神器................................................................................440
3.16.1.4、BEEF.....................................................................................................443
3.16.2、xss 測(cè)試語(yǔ)句...................................................................................................444
3.16.3、XSS 平臺(tái)..................................................................................................................448
3.17、自動(dòng)化工具...............................................................................................................448
3.17.1、貼吧自動(dòng)注冊(cè)和頂貼....................................................................................448
3.17.2、身份證號(hào)生成器............................................................................................449
3.17.3、郵箱自動(dòng)注冊(cè)................................................................................................449
3.17.4、QQ 群發(fā)...........................................................................................................449本書(shū)只作為技術(shù)交流使用,代碼均具備攻擊性,內(nèi)容來(lái)源于互聯(lián)網(wǎng),請(qǐng)勿用于非法途徑
,黑帽百科(骨灰版)
3.17.5、自動(dòng)偽原創(chuàng)和偽原創(chuàng)辨別.............................................................................449
3.17.6、采集工具........................................................................................................450
3.17.6.1、火車(chē)頭采集.........................................................................................450
3.17.6.2、蟲(chóng)蟲(chóng)軟件.............................................................................................451
3.17.6.3、八爪魚(yú).................................................................................................452
3.17.6.4、網(wǎng)絡(luò)神采.............................................................................................453
3.17.7、驗(yàn)證碼識(shí)別....................................................................................................454
3.17.8、身份證復(fù)印件制作工具.................................................................................454
3.18、數(shù)據(jù)嗅探...................................................................................................................456
3.18.1、fiddler..............................................................................................................456
3.18.2、burpsuite.........................................................................................................468
3.19、注入工具...................................................................................................................469
3.19.1、sqlmap ............................................................................................................469
3.19.2、Acunetix Web Vulnerability Scanner..............................................................473
3.19.3、AutoScan-Network..........................................................................................474
3.19.5、WebCruiser.....................................................................................................478
3.19.6、其他注入工具................................................................................................478
3.20、提權(quán)工具...................................................................................................................479
3.21、SVN 利用工具.............................................................................................................479
3.22、心臟出血利用工具...................................................................................................480
3.23、mongODB 泄露檢測(cè)..................................................................................................492
3.23.1、Mongodb 注入攻擊.........................................................................................494
3.23.2、MongoDB phpMoAdmin遠(yuǎn)程代碼執(zhí)行漏洞分析.........................................505
3.23.3、MongoDB 檢測(cè)工具........................................................................................507
3.24、過(guò)安全狗和D 盾、過(guò)墻.............................................................................................507
3.24.1、防火墻繞過(guò)技巧總結(jié),IPS 、IDS 繞過(guò)技術(shù)...................................................507
3.25、短信/電話轟炸機(jī)......................................................................................................509
3.26、IIS put工具.................................................................................................................510
3.26.1、iis 讀寫(xiě)權(quán)限掃描工具.....................................................................................510
3.26.2、IIS put增強(qiáng)版..................................................................................................511
3.26.3、其他寫(xiě)入工具................................................................................................512
3.27、MD5解密工具...........................................................................................................512
3.27.1、b0y 多接口解密..............................................................................................513
3.27.2、Crack md5.......................................................................................................514
3.28、輔助管理工具...........................................................................................................520
3.28.1、音速啟動(dòng)........................................................................................................520
第四章 滲透系統(tǒng).........................................................................................................................523
4.1、Kali 系統(tǒng).......................................................................................................................523
4.2、Dualx............................................................................................................................527
4.3、海馬模擬器.................................................................................................................540
4.4、虛擬機(jī).........................................................................................................................541
4.5、魔方MagicBox .............................................................................................................542
4.6、BackBox Linux 4.1........................................................................................................545
4.7、PwnPi v3.0...................................................................................................................547
本書(shū)只作為技術(shù)交流使用,代碼均具備攻擊性,內(nèi)容來(lái)源于互聯(lián)網(wǎng),請(qǐng)勿用于非法途徑
,黑帽百科(骨灰版)
4.8、其他滲透系統(tǒng).............................................................................................................552
第五章 劫持.................................................................................................................................553
5.1、wifi 熱點(diǎn)釣魚(yú)...............................................................................................................553
5.1.1、Kali-Linux 下創(chuàng)建一個(gè)釣魚(yú)WiFi 熱點(diǎn)................................................................553
5.1.2、HostAPd 創(chuàng)建wifi 熱點(diǎn)(AP )..........................................................................557
5.2、wifi 攻擊滲透...............................................................................................................559
5.2.1、MDK3................................................................................................................559
5.2.2、藍(lán)牙滲透..........................................................................................................563
5.2.2.1、通過(guò)低版本藍(lán)牙滲透功能手機(jī)............................................................563
5.2.2.2、通過(guò)藍(lán)牙滲透智能手機(jī)........................................................................566
5.2.3、bully..................................................................................................................571
5.2.4、圖形化工具 fern-wifi-cracker...........................................................................574
5.2.5、WiFite v2...........................................................................................................575
5.2.6、Aircrack-ng........................................................................................................578
5.2.7、利用wps 漏洞窮舉PIN 碼破解wifi 密碼.............................................................579
5.2.8、通過(guò)字典(暴力) 破解WIFI 密碼.........................................................................582
5.2.9、破解'pptp' 加密類(lèi)型的VPN..............................................................................588
第六章 站群系統(tǒng).........................................................................................................................599
6.1、站群軟件.....................................................................................................................603
6.1.1、極佳站群..........................................................................................................603
6.1.2、織夢(mèng)采集俠......................................................................................................604
6.1.3、芭奇反戰(zhàn)群軟件..............................................................................................605
6.1.4、狂人站群..........................................................................................................606
6.1.5、泊君站群(陳默站群)...................................................................................610
6.1.6、龍少泛站群/千百度站群/逆天者站群............................................................611
6.1.7、俠客站群..........................................................................................................614
6.1.8、新一代站群......................................................................................................615
6.1.9、殺破狼站群......................................................................................................617
6.1.10、黑俠站群........................................................................................................620
6.1.11、黑豹站群........................................................................................................623
6.1.12、易淘站群........................................................................................................624
6.1.13、微站長(zhǎng)站群....................................................................................................625
6.1.14、IP 變異站群程序/IP進(jìn)制程序.........................................................................626
6.1.15、狗小云站群....................................................................................................628
6.1.16、365站群..........................................................................................................629
6.1.17、刀鋒站群........................................................................................................632
6.1.18、多多站群........................................................................................................634
6.1.19、黑金目錄站群................................................................................................636
6.1.20、提莫站群........................................................................................................637
6.1.21、逆天者站群....................................................................................................654
6.1.22、百萬(wàn)淘客站群4.0商業(yè)破解版........................................................................657
6.2、寄生蟲(chóng).........................................................................................................................658
6.3、新聞源劫持.................................................................................................................658
第七章 劫持-作弊方式................................................................................................................659
本書(shū)只作為技術(shù)交流使用,代碼均具備攻擊性,內(nèi)容來(lái)源于互聯(lián)網(wǎng),請(qǐng)勿用于非法途徑
,黑帽百科(骨灰版)
7.1、百度權(quán)重劫持.............................................................................................................659
7.2、webshell 隱藏、創(chuàng)建畸形目錄...................................................................................660
7.3、301快照劫持(asp版)..............................................................................................