1.证书透明工具
攻法:2016年开始的ssl证书透明工具
(1)crtsh:https://crt.sh/
(2)censys:https://censys.io/certificates
(3)spyse:https://spyse.com/search/certificate
(4)certspotter:https://sslmate.com/certspotter/api/
(5)entrust:https://www.entrust.com/ct-search/
(6)facebook:https://developers.facebook.com/tools/ct
(7)google:https://developers.facebook.com/tools/ct
解法:签发泛域名证书,从2018年开始,免费的lets证书也能签发泛域名证书了。
2.DNS记录公开数据收集
攻法:一些公开的查询网站会记录公开历史
(1)ip138:https://site.ip138.com/
(2)百度云观测:http://ce.baidu.com/index/getRelatedSites?site_address=baidu.com
(3)circl:https://www.circl.lu/services/passive-dns/#passive-dns
(4)hackertarget:https://hackertarget.com/find-dns-host-records/
(5)riddler:https://riddler.io/search?q=pld:baidu.com
(6)bufferover:https://dns.bufferover.run/dns?q=.baidu.com
(7)dnsdb:https://dnsdb.io/zh-cn/search?q=baidu.com
(8)ipv4info:http://ipv4info.com/
(9)robtex:https://www.robtex.com/dns-lookup/
(10)chinaz:https://alexa.chinaz.com/
(11)netcraft:https://searchdns.netcraft.com/
(12)securitytrails:https://docs.securitytrails.com/v1.0/reference#get-domain
(13)dnsdumpster:https://dnsdumpster.com/
(14)sitedossier:http://www.sitedossier.com/
(15)threatcrowd:https://www.threatcrowd.org/
(16)siterankdata:https://siterankdata.com/
(17)findsubdomains:https://findsubdomains.com/
解法:不公开查询,使用nslookup dig命令查询记录
3.威胁情报数据
攻法:
(1)微步:https://x.threatbook.cn/
(2)alienvault:https://otx.alienvault.com/
(3)riskiq:https://www.riskiq.com/
(4)threatminer:https://www.threatminer.org/
(5)virustotal:https://www.virustotal.com/gui/home/search
解法:跟进威胁情报分析结果,找出泄露源
4.安全类搜索引擎
攻法:
(1)https://fofa.so/
(2)https://www.shodan.io/
(3)https://www.zoomeye.org/
(4)binaryedge:https://app.binaryedge.io/services/domains
解法:网页请求头混淆,最小暴露攻击面
5.常规搜索引擎
攻法:
(1)baidu
(2)bing
(3)google
(4)sougou
解法:roobots协议,爬虫ip黑名单
6.代码仓库
攻法:
(1)gayhub:giithub
(2)阿里云代码托管:https://code.aliyun.com/
(3)码云:https://gitee.com/
解法:能用内网仓库用内网仓库,如果需要外网访问,域名都写到配置里注意不要写生产配置。
7.dns暴力破解工具
攻法:
(1)subDomainsBrute:https://github.com/lijiejie/subDomainsBrute
(2)teemo:https://github.com/bit4woo/teemo
(3)Sublist3r:https://github.com/aboul3la/Sublist3r
(4)gobuster:https://github.com/OJ/gobuster
(5)assetfinder:https://github.com/tomnomnom/assetfinder
(6)Sudomy:https://github.com/Screetsec/Sudomy
解法:域名长度加长或者使用子域名的子域名,目前子域名为2个字母的极易被穷举,建议至少4个字母+特殊字符
8.请求头相关
攻法:
(1)网站的crossdomain.xml文件和返回包中的Access-Control-Allow-Origin头
(2)返回包中的CSP(Content-Security-Policy)头
(3)网站robots文件
(4)网站sitemap文件
解法:敏感配置需要小心配置。如cros refer wordpress的sitemap xmlrpc
9.漏洞相关
攻法:
(1)域传送漏洞
(2)js敏感信息泄露
解法:定期漏洞扫描