Location>code7788 >text

[Tool Sharing] Red Team Focus Asset Fingerprinting -- P1finger -0.02(Latest Version)

Popularity:263 ℃/2024-09-01 22:01:03

Introduction to the tool:
P1finger Focused Asset Fingerprinting tool under Operation Red Team.P1finger is a focused asset fingerprinting tool designed to identify target systems by HTTP request characteristics. Its key features include:

Language and implementation:

Language: Implemented using the Go language (Golang).
Purpose: To emphasize cross-platform capabilities and ease of integration.
Fingerprint libraries and detection strategies:

Fingerprint Library: Ensure high accuracy by manual filtering and collection. The fingerprint repository is mainly for focused systems such as CMS, OA, etc. rather than middleware (e.g. Nginx).
Detection strategy: based on HTTP request features such as request body, header, certificate, icon and icon hash.
Configuration and flexibility:

Configuration: The rules file is in YAML format for easy modification and adjustment.
Volume management: Optimized for both internal and external network environments, the intranet tool focuses on volume and flexible management of fingerprint rule files.

download address

Address: /s/a5e4915150dc

Updated Description:

1. Some fingerprints are updated
2.[Function added] Add the function of assigning a custom fingerprint directory

Instructions for use:
1. Individual target detection

P1finger -u [target]

2. Multi-target detection

P1finger -uf [target file]

3. Specify the fingerprint directory
By default, only files with the .yaml extension in the specified directory are read.

 -uf D:\tools_dev\Go\P1finger\ -fd D:/tools_dev/Go/P1finger

4.socks5 proxy

 -uf D:\tools_dev\Go\P1finger\ -socks 127.0.0.1:4781

act on behalf of sb. in a responsible position

 -uf D:\tools_dev\Go\P1finger\ -httpproxy 127.0.0.1:4781