update readme

This commit is contained in:
影舞者 2021-12-03 10:58:47 +08:00
parent dc634f9184
commit b93df1ab20

View File

@ -51,6 +51,7 @@ fscan.exe -h 192.168.1.1/24 -m smb -pwd password (smb密码碰撞)
fscan.exe -h 192.168.1.1/24 -m ms17010 (指定模块) fscan.exe -h 192.168.1.1/24 -m ms17010 (指定模块)
fscan.exe -hf ip.txt (以文件导入) fscan.exe -hf ip.txt (以文件导入)
fscan.exe -u http://baidu.com -proxy 8080 (扫描单个url,并设置http代理 http://127.0.0.1:8080) fscan.exe -u http://baidu.com -proxy 8080 (扫描单个url,并设置http代理 http://127.0.0.1:8080)
fscan.exe -h 192.168.1.1/24 -nobr -nopoc (不进行爆破,不扫Web poc,以减少流量)
``` ```
编译命令 编译命令
``` ```
@ -59,60 +60,72 @@ go build -ldflags="-s -w " -trimpath
完整参数 完整参数
``` ```
-Num int
poc rate (default 20)
-c string -c string
exec command (ssh) ssh命令执行
-cookie string -cookie string
set poc cookie 设置cookie
-debug -debug int
debug mode will print more error info 多久没响应,就打印当前进度(default 60)
-domain string -domain string
smb domain smb爆破模块时,设置域名
-h string -h string
IP address of the host you want to scan,for example: 192.168.11.11 | 192.168.11.11-255 | 192.168.11.11,192.168.11.12 目标ip: 192.168.11.11 | 192.168.11.11-255 | 192.168.11.11,192.168.11.12
-hf string -hf string
host file, -hf ip.txt 读取文件中的目标
-hn string
扫描时,要跳过的ip: -hn 192.168.1.1/24
-m string -m string
Select scan type ,as: -m ssh (default "all") 设置扫描模式: -m ssh (default "all")
-no -no
not to save output log 扫描结果不保存到文件中
-nobr
跳过sql、ftp、ssh等的密码爆破
-nopoc -nopoc
not to scan web vul 跳过web poc扫描
-np -np
not to ping 跳过存活探测
-num int
web poc 发包速率 (default 20)
-o string -o string
Outputfile (default "result.txt") 扫描结果保存到哪 (default "result.txt")
-p string -p string
Select a port,for example: 22 | 1-65535 | 22,80,3306 (default "21,22,80,81,135,443,445,1433,3306,5432,6379,7001,8000,8080,8089,9200,11211,270179098,9448,8888,82,8858,1081,8879,21502,9097,8088,8090,8200,91,1080,889,8834,8011,9986,9043,9988,7080,10000,9089,8028,9999,8001,89,8086,8244,9000,2008,8080,7000,8030,8983,8096,8288,18080,8020,8848,808,8099,6868,18088,10004,8443,8042,7008,8161,7001,1082,8095,8087,8880,9096,7074,8044,8048,9087,10008,2020,8003,8069,20000,7688,1010,8092,8484,6648,9100,21501,8009,8360,9060,85,99,8000,9085,9998,8172,8899,9084,9010,9082,10010,7005,12018,87,7004,18004,8098,18098,8002,3505,8018,3000,9094,83,8108,1118,8016,20720,90,8046,9443,8091,7002,8868,8010,18082,8222,7088,8448,18090,3008,12443,9001,9093,7003,8101,14000,7687,8094,9002,8082,9081,8300,9086,8081,8089,8006,443,7007,7777,1888,9090,9095,81,1000,18002,8800,84,9088,7071,7070,8038,9091,8258,9008,9083,16080,88,8085,801,5555,7680,800,8180,9800,10002,18000,18008,98,28018,86,9092,8881,8100,8012,8084,8989,6080,7078,18001,8093,8053,8070,8280,880,92,9099,8181,9981,8060,8004,8083,10001,8097,21000,80,7200,888,7890,3128,8838,8008,8118,9080,2100,7180,9200") 设置扫描的端口: 22 | 1-65535 | 22,80,3306 (default "21,22,80,81,135,139,443,445,1433,3306,5432,6379,7001,8000,8080,8089,9000,9200,11211,27017")
-path string
fcgi、smb romote file path
-ping -ping
using ping replace icmp 使用ping代替icmp进行存活探测
-pn string
扫描时要跳过的端口,as: -pn 445
-pocname string -pocname string
use the pocs these contain pocname, -pocname weblogic 指定web poc的模糊名字, -pocname weblogic
-proxy string -proxy string
set poc proxy, -proxy http://127.0.0.1:8080 设置代理, -proxy http://127.0.0.1:8080
-pwd string
password
-pwdf string
password file
-rf string
redis file to write sshkey file (as: -rf id_rsa.pub)
-rs string
redis shell to write cron file (as: -rs 192.168.1.1:6666)
-t int
Thread nums (default 600)
-time int
Set timeout (default 3)
-u string
url
-uf string
urlfile
-user string -user string
username 指定爆破时的用户名
-userf string -userf string
username file 指定爆破时的用户名文件
-pwd string
指定爆破时的密码
-pwdf string
指定爆破时的密码文件
-rf string
指定redis写公钥用模块的文件 (as: -rf id_rsa.pub)
-rs string
redis计划任务反弹shell的ip端口 (as: -rs 192.168.1.1:6666)
-silent
静默扫描,适合cs扫描时不回显
-sshkey string
ssh连接时,指定ssh私钥
-t int
扫描线程 (default 600)
-time int
端口扫描超时时间 (default 3)
-u string
指定Url扫描
-uf string
指定Url文件扫描
-wt int -wt int
Set web timeout (default 5) web访问超时时间 (default 5)
``` ```
## 运行截图 ## 运行截图