3377ÌåÓýÍø¹ÙÍøÈë¿Ú

֤ȯ¼ò³Æ£º3377ÌåÓýÍø¹ÙÍøÈë¿Ú ֤ȯ´úÂ룺002212
7x24Сʱ·þÎñ£º 400-777-0777

¹¤¾ß·ÖÏí| ÐÅÏ¢ËѼ¯ÓëÎó²îʹÓà -- Polaris

Ò»¸öÑŹÛÌñ¾²ºÃÓõÄÉøÍ¸²âÊÔ¹¤¾ß£¬£¬£¬ £¬£¬£¬ £¬£¬¿É´îÅäAuxToolsͼÐλ¯¹¤¾ßÒ»ÆðʹÓᣠ¡£¡£¡£¡£

¹¤¾ß·ÖÏí| ÐÅÏ¢ËѼ¯ÓëÎó²îʹÓà -- Polaris

Ðû²¼Ê±¼ä£º2022-11-03
ä¯ÀÀ´ÎÊý£º5610
·ÖÏí£º

0x01 ¹¤¾ßÏÈÈÝ

Ò»¸öÑŹÛÌñ¾²ºÃÓõÄÉøÍ¸²âÊÔ¹¤¾ß£¬£¬£¬ £¬£¬£¬ £¬£¬¿É´îÅäAuxToolsͼÐλ¯¹¤¾ßÒ»ÆðʹÓᣠ¡£¡£¡£¡£

0x02 ×°ÖÃÓëʹÓÃ

1¡¢ÍøÂç×ÓÓòÃû

python Cli.py --input domain:example.com collect

python Cli.py --input domain:example.com collect --plugin chinaz

python Cli.py --input domain:example.com collect --plugin chinaz --plugin ip138

python Cli.py --input domain:example.com collect --plugin !ksubdomain

python Cli.py --input dork:184.173.106.60 collect --plugin zoomeye --consol

2¡¢Îó²îʹÓÃ

python Cli.py --input url:http://example.com exploit

python Cli.py --input url:http://example.com exploit --plugin CVE-2021-22205

python Cli.py --input url:http://example.com exploit --plugin CVE-2021-22205 --console

0x03 ÏîÄ¿Á´½ÓÏÂÔØ

ºǫ́»Ø¸´Òªº¦´Ê¡°Polaris¡±»ñÈ¡ÏÂÔØÁ´½Ó

ÉùÃ÷£º?ÖÐËùÉæ¼°µÄÊÖÒÕ¡¢Ë¼Ð÷ºÍ?¾ß½ö¹©ÒÔÇ徲Ϊ?µÄµÄѧϰ½»Á÷ʹ?£¬£¬£¬ £¬£¬£¬ £¬£¬ÈκÎ?²»µÃ½«Æä?ÓÚ?·¨?;ÒÔ¼°Ó¯ÀûµÈ?µÄ£¬£¬£¬ £¬£¬£¬ £¬£¬ÇÒ??¼ç¸º¹¤¾ßʹÓÃЧ¹û¡£ ¡£¡£¡£¡£

Òªº¦´Ê±êÇ©£º
¹¤¾ß·ÖÏí Ï¢ËѼ¯ÓëÎó²îʹÓà Polaris
¿Í»§·þÎñÈÈÏß

400-777-0777
7*24Сʱ·þÎñ

ÁªÏµÓÊÏä

servicing@topsec.com.cn

ɨÂë¹Ø×¢
¡¾ÍøÕ¾µØÍ¼¡¿¡¾sitemap¡¿