---
工具名稱: bing-ip2hosts
所屬分類: Information Gathering
標簽: [enumeration,osint,information gathering,bing-ip2hosts,kali linux]
創建時間: 2016-10-19 03:33:00
---
0x00 bing-ip2hosts介紹
-------------
Bing.com是微軟擁有的以前稱為MSN搜索和實時搜索的搜索引擎。它具有搜索在特定IP地址上的網站的獨特功能。 Bing-ip2hosts使用此功能枚舉Bing已為特定IP地址編入索引的所有主機名。這種技術被認為是在滲透測試的信息收集階段的最佳方法,以便可以發現更大的潛在攻擊面。 Bing-ip2hosts是用Linux上的Bash腳本語言編寫的,因為使用移動接口的緣故,所以不需要API密鑰。
工具來源:http://www.morningstarsecurity.com/research/bing-ip2hosts
[bing-ip2hosts主頁][1] | [Kali bing-ip2hosts Repo倉庫][2]
- 作者:Andrew Horton
- 證書:GPLv3
0x01 bing-ip2hosts功能
---------------
bing-ip2hosts - 使用bing.com枚舉給定IP的主機名
```shell
root@kali:~# bing-ip2hosts -h
bing-ip2hosts (o.4) by Andrew Horton aka urbanadventurer
Homepage: http://www.morningstarsecurity.com/research/bing-ip2hosts
在滲透測試中的Web情報收集和攻擊層面映射虛擬主機很有用
查找與目標共享IP地址的主機名,可以是主機名或IP地址
利用Microsoft Bing.com的能力通過IP地址搜索,例如:“IP:210.48.71.196”
用法: /usr/bin/bing-ip2hosts [選項] <IP地址|主機名>
選項:
-n 關閉進度指示動畫
-t <DIR> 使用指定目錄而不是/tmp目錄,該目錄必須存在
-i 可選CSV輸出,在每行上輸出IP和主機名,以逗號分隔
-p 可選http://前綴輸出,方便在shell中右鍵單擊打開
```
0x02 bing-ip2hosts用法示例
-----------------
```shell
root@kali:~# bing-ip2hosts -p -t /root/test microsoft.com
[ 65.55.58.201 | Scraping 1 | Found 0 | / ]
http://microsoft.com
http://research.microsoft.com
http://www.answers.microsoft.com
http://www.microsoft.com
http://www.msdn.microsoft.com
```
```shell
root@kali:~# bing-ip2hosts -p -t /root/test 173.194.33.80
[ 173.194.33.80 | Scraping 60-69 of 73 | Found 41 | | ]| / ]
http://asia.google.com
http://desktop.google.com
http://ejabat.google.com
http://google.netscape.com
http://partner-client.google.com
http://picasa.google.com
```
0x03 提示
-------
最新的Kali已經移除了bing-ip2hosts,如果要使用bing-ip2hosts可以使用以下命令獲取并安裝:
```shell
root@kali:~# wget https://raw.githubusercontent.com/Strubbl/dotfiles/master/bin/bing-ip2hosts
root@kali:~# chmod +x bing-ip2hosts
root@kali:~# mv bing-ip2hosts /usr/bin/
```
[1]: http://labs.portcullis.co.uk/application/acccheck
[2]: http://git.kali.org/gitweb/?p=packages/acccheck.git;a=summary
- Information Gathering
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
- Vulnerability Analysis
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- Doona
- Exploitation Tools
- Wireless Attacks
- Ghost-Phisher
- mfoc
- Forensics Tools
- Binwalk
- bulk-extractor
- Web Applications
- apache-users
- BurpSuite
- sqlmap
- w3af
- Sniffing-Spoofing
- Bettercap
- Burp Suite
- DNSChef
- Fiked
- hamster-sidejack
- HexInject
- Password Attacks
- crunch
- hashcat
- John the Ripper
- Johnny
- Hardware Hacking
- android-sdk
- apktool
- Arduino
- dex2jar
- Sakis3G
- Reverse Engineering
- apktool