Introduction to the tool:
P1finger Focused Asset Fingerprinting tool under Operation Red Team.P1finger is a focused asset fingerprinting tool designed to identify target systems by HTTP request characteristics. Its key features include:
Language and implementation:
Language: Implemented using the Go language (Golang).
Purpose: To emphasize cross-platform capabilities and ease of integration.
Fingerprint libraries and detection strategies:
Fingerprint Library: Ensure high accuracy by manual filtering and collection. The fingerprint repository is mainly for focused systems such as CMS, OA, etc. rather than middleware (e.g. Nginx).
Detection strategy: based on HTTP request features such as request body, header, certificate, icon and icon hash.
Configuration and flexibility:
Configuration: The rules file is in YAML format for easy modification and adjustment.
Volume management: Optimized for both internal and external network environments, the intranet tool focuses on volume and flexible management of fingerprint rule files.
download address
Address: /s/a5e4915150dc
Updated Description:
1. Some fingerprints are updated
2.[Function added] Add the function of assigning a custom fingerprint directory
Instructions for use:
1. Individual target detection
P1finger -u [target]
2. Multi-target detection
P1finger -uf [target file]
3. Specify the fingerprint directory
By default, only files with the .yaml extension in the specified directory are read.
-uf D:\tools_dev\Go\P1finger\ -fd D:/tools_dev/Go/P1finger
4.socks5 proxy
-uf D:\tools_dev\Go\P1finger\ -socks 127.0.0.1:4781
act on behalf of sb. in a responsible position
-uf D:\tools_dev\Go\P1finger\ -httpproxy 127.0.0.1:4781