当前位置:网站首页>Burpsuite -- brute force cracking of intruder
Burpsuite -- brute force cracking of intruder
2022-07-01 08:17:00 【Wake up time of test】
Fate whispers to the warrior , You can't resist the storm ; The warrior whispered back , I am the storm !
It is mainly understood from the perspective of testing , Required functionality , This passage intruder Brute force cracking of modules , Realize the attack of verification code . The principle of intrusion module is based on the parameters existing in the access link / Variable , Call local dictionary 、 Attack load , Perform a penetration test on the parameters ; This article completes the company's mobile phone number + The verification code login module has been successfully cracked , Verification times of verification code are not verified , Provides blasting opportunities
intruder Main function module introduction
| Target | Details for configuring the target server to attack |
| Positions | Set up Payloads The insertion point and the type of attack |
| Payloads | Set up payload, Configuration Dictionary |
| Options | This tab contains request headers,request engine,attack results The content such as . |
burpsuite intruder Pre invasion preparations
① burpsuite Set up the proxy and get the target domain name
② Visit the target website
③ Set target domain
④ Close the agent
burpsuite intruder Set intrusion options
The interface diagram is attached below , There is basically no need to modify the options , If the test machine is configured properly, you can , Modify the number of threads in the request engine , Speed up cracking



burpsuite intruder Execute intrusion
One 、 stay proxy Open the target of the intercepted attack in the agent

Two 、 Click on action Send the target of the attack to intruder

3、 ... and 、 Get into intruder Interface
① Check target Is the goal right , Generally normal
② Set it up positions page ,【 In this test , Just keep smscode add add$ Parameters 】

Explain the four options of attack type
sniper【 The sniper 】 Crack the variables in turn , One shot, one bullet Battering ram【 Siege hammer 】 Crack the variables at the same time , Pitch fork【 A pitchfork is like a nine tooth harrow 】 Each variable corresponds to a dictionary Cluster bomb【 cluster bomb 】 Each variable corresponds to a dictionary and performs intersection cracking
③ payload Page setup

payload Type settings 【 This verification code can be selected numbers】
Commonly used payload Type introduction
simple list Simple list numbers A list of numbers dates Date list bruce forcer Brute force
payload option Set up

payload processing Set up Default not set 【 This test does not need to be set 】
You can process strings 、 for example MD5 encryption 、 Character interception 、 Add prefixes, suffixes, etc
Four 、 perform attack

After execution , Click on length Length value , Generally speaking, the response length of a successful crack is different from that of an unsuccessful crack
边栏推荐
- XX attack - reflective XSS attack hijacking user browser
- Contenttype comparison of all types
- 01 NumPy介绍
- Yolov5进阶之七目标追踪最新环境搭建
- 2022.6.30 省赛+蓝桥国赛记录
- Utiliser Beef pour détourner le navigateur utilisateur
- 源代码加密的意义和措施
- Aardio - Shadow Gradient Text
- Practice and Thinking on the architecture of a set of 100000 TPS im integrated message system
- How outlook puts together messages with the same discussion
猜你喜欢

OJ输入输出练习

如何使用layui将数据库中的数据以表格的形式展现出来
![[untitled]](/img/be/3523d0c14d555b293673af2b6fbcff.jpg)
[untitled]
![[getting started] intercepting strings](/img/16/363baa4982408f55493057200bcba5.png)
[getting started] intercepting strings

web254

P4 installation bmv2 detailed tutorial
![[staff] key number (key number identification position | key number marking list | a major key identification principle | F, C, G position marking ascending | F major key identification principle | B](/img/48/e98d01830867baa742574e1b6e1096.jpg)
[staff] key number (key number identification position | key number marking list | a major key identification principle | F, C, G position marking ascending | F major key identification principle | B

Aardio - Shadow Gradient Text

On several key issues of digital transformation

Gdip - hatchBrush图案表
随机推荐
Practice and Thinking on the architecture of a set of 100000 TPS im integrated message system
[untitled]
初学者如何正确理解google官方建议架构原则(疑问?)
Learn the knowledge you need to know about the communication protocol I2C bus
Teach you how to apply for domestic trademark online step by step
CPU设计实战-第四章实践任务一简单CPU参考设计调试
CPU design practice - Chapter 4 practical tasks - simple CPU reference design and debugging
一套十万级TPS的IM综合消息系统的架构实践与思考
How to prevent the other party from saying that he has no money after winning the lawsuit?
程序员养生宝典
Aardio - [problem] the problem of memory growth during the callback of bass Library
【力扣10天SQL入门】Day10 控制流
String coordinates of number to excel
Learn reptiles for a month and earn 6000 a month? Tell you the truth about the reptile, netizen: I wish I had known it earlier
[getting started] intercepting strings
On June 30, 2022, the record of provincial competition + national competition of Bluebridge
seaborn clustermap矩阵添加颜色块
5大组合拳,解决校园6大难题,护航教育信息化建设
AArdio - 【问题】bass库回调时内存增长的问题
SharePoint - how to quickly check whether SharePoint is standard or enterprise edition?