In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly explains "how to quickly scan sub-domain name takeover with NtHiM". The content of the article is simple and clear, and it is easy to learn and understand. Please follow the editor's train of thought to study and learn "how to use NtHiM to quickly scan sub-domain name takeover".
About NtHiM
NtHiM is a fast sub-domain name takeover scanning and detection tool, with its help, the majority of researchers can easily achieve sub-domain name takeover vulnerability detection and scanning tasks.
NtHiM installation method 1: use precompiled code
In order to facilitate the installation and use of the majority of users, we provide precompiled code for different operating system platforms on the [https://github.com/TheBinitGhimire/NtHiM/releases] page of the project GitHub. You can choose the version suitable for each subsystem to download, and after decompressing the file, you can directly use NtHiM.
Method 2: use Crates.io
NtHiM can also be obtained through https://crates.io/crates/NtHiM. Therefore, if you have installed the Rust environment on your system, you can directly use the following command to install NtHiM:
Method 3 of cargo install NtHiM: build manually
Of course, you can also choose to build NtHiM manually, but you still need to install Cargo first. If you have installed Cargo, you can manually build the project in the following ways:
First, clone the project source code locally using the following command:
Git clone https://github.com/TheBinitGhimire/NtHiM
Switch to the project root in the command line window:
Cd NtHiM
Then, use the following command to build the code:
Cargo build
Next, change to the newly created target directory and open the debug directory in it:
Cd target/debug
At this point, you will see NtHiM.exe (for Windows systems) or NtHiM source code (for Linux systems).
To learn about the whole installation process of NtHiM, you can click to watch the installation instructions video, which will demonstrate the installation steps of the above three tools.
Video address: https://youtu.be/CUTbqFhRjwY
Tool use
Parameters.
Description
Demonstration exampl
-h
Display tool help information
NtHiM-h
-t
Scan a target
NtHiM-t https://example.example.com
-f
Scan multiple targets in the file list
NtHiM-f hostnames.txt
-c
Set the number of concurrent threads
NtHiM-c 100-f hostnames.txt
-V
Display tool version information
NtHiM-V
Tool use sample 1: scan a single target NtHiM-t https://example.example.com use sample 2: scan multiple targets NtHiM-f hostnames.txt tool usage demonstration
Tool running
Scan a single target:
Scan multiple targets using concurrent threads:
Project address
NtHiM: https://github.com/TheBinitGhimire/NtHiM
Thank you for your reading. the above is the content of "how to quickly scan sub-domain name takeover with NtHiM". After the study of this article, I believe you have a deeper understanding of how to quickly scan sub-domain name takeover with NtHiM, and the specific use needs to be verified in practice. Here is, the editor will push for you more related knowledge points of the article, welcome to follow!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.