This is a simple guide to perform javascript recon in the bugbounty
- The first step is to collect possibly several javascript files (
more files
=more paths,parameters
->more vulns
)
Shodan | |
—— | |
product:MySQL | |
product:apache | |
country:"CN" | |
port:”21,23” ssh ssh的端口21或23 | |
-port:”21” ssh非常规端口 | |
—— | |
#! /bin/bash | |
## This script fetch js files from a domain name and make a wordlist by words in js files | |
## Credit: https://gist.github.com/aufzayed/6cabed910c081cc2f2186cd27b80f687 | |
##### Install requirements ##### | |
##### Before running this script you should install Go ##### | |
## Install subjs (https://github.com/lc/subjs) | |
GO111MODULE=on go get -u -v github.com/lc/subjs |
Python备忘录-基于Python3
=================