Busqueda Vulnerabilidades 1.9 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374
  1. Lista:
  2. https://www.exploit-db.com/papers : Relacionado con las vulnerabilidades y como son explotadas por los ciberatacantes.
  3. Detectando un Movimiento lateral en SPLUNK: https://medium.com/threatpunter/detecting-lateral-movement-using-sysmon-and-splunk-318d3be141bc
  4. Burp Suite - Framework.
  5. 2. ZAP Proxy - Framework.
  6. 3. Dirsearch - HTTP bruteforcing.
  7. 4. Nmap - Port scanning.
  8. 5. Sublist3r - Subdomain discover
  9. 6. Amass - Subdomain discovery.
  10. 7. SQLmap - SQLi exploitation.
  11. 8. Metasploit - Framework.
  12. 9. WPscan - WordPress exploitation.
  13. 10. Nikto - Webserver scanning.
  14. 11. HTTPX - HTTP probing.
  15. 3. FFUF - HTTP probing.
  16. 14. Subfinder - Subdomain discovery.
  17. 15. Masscan - Mass IP and port scanner.
  18. 16. Lazy Recon - Subdomain discovery.
  19. 18. XSS Hunter - Blind XSS discovery.
  20. 19. Aquatone - HTTP based recon.
  21. 20. LinkFinder - Endpoint discovery through JS files
  22. 21. JS-Scan - Endpoint discovery through JS files
  23. 22 GAU - Historical attack surface mapping
  24. 23 Parameth - Bruteforce GET and POST parameters
  25. 24 truffleHog - Find credentials in GitHub commits
  26. Herameintas: uclei - YAML based template scanning.
  27. Feed de vulnerabilidades: https://inthewild.io/feed
  28. Identificación de brechas sobre Malawre o ransomware: https://www.binalyze.com/air --- Busqueda proactiva: https://cybermeisam.medium.com/blue-team-system-live-analysis-part-1-a-proactive-hunt-8258feb7cb14
  29. Detectar vulnerabilidades en Linux: https://betterprogramming.pub/3-tools-to-detect-linux-vulnerabilities-ec42122cc41b
  30. Catalogo de Vulnerabilidades Explotadas: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
  31. Validación en el sistema: ((https://medium.com/@wondersome/reconnaissance-tools-for-hacking-d8404399d1f5))
  32. -----https://github.com/projectdiscovery/chaos-client
  33. -----https://github.com/aboul3la/Sublist3r : Enlistar servicios para explotar
  34. Tacticas blueTeam:
  35. ----https://www.kitploit.com/search/label/PowerShell