当前位置:网站首页>Burpsuite -- brute force cracking of intruder
Burpsuite -- brute force cracking of intruder
2022-07-01 08:17:00 【Wake up time of test】
Fate whispers to the warrior , You can't resist the storm ; The warrior whispered back , I am the storm !
It is mainly understood from the perspective of testing , Required functionality , This passage intruder Brute force cracking of modules , Realize the attack of verification code . The principle of intrusion module is based on the parameters existing in the access link / Variable , Call local dictionary 、 Attack load , Perform a penetration test on the parameters ; This article completes the company's mobile phone number + The verification code login module has been successfully cracked , Verification times of verification code are not verified , Provides blasting opportunities
intruder Main function module introduction
| Target | Details for configuring the target server to attack |
| Positions | Set up Payloads The insertion point and the type of attack |
| Payloads | Set up payload, Configuration Dictionary |
| Options | This tab contains request headers,request engine,attack results The content such as . |
burpsuite intruder Pre invasion preparations
① burpsuite Set up the proxy and get the target domain name
② Visit the target website
③ Set target domain
④ Close the agent
burpsuite intruder Set intrusion options
The interface diagram is attached below , There is basically no need to modify the options , If the test machine is configured properly, you can , Modify the number of threads in the request engine , Speed up cracking



burpsuite intruder Execute intrusion
One 、 stay proxy Open the target of the intercepted attack in the agent

Two 、 Click on action Send the target of the attack to intruder

3、 ... and 、 Get into intruder Interface
① Check target Is the goal right , Generally normal
② Set it up positions page ,【 In this test , Just keep smscode add add$ Parameters 】

Explain the four options of attack type
sniper【 The sniper 】 Crack the variables in turn , One shot, one bullet Battering ram【 Siege hammer 】 Crack the variables at the same time , Pitch fork【 A pitchfork is like a nine tooth harrow 】 Each variable corresponds to a dictionary Cluster bomb【 cluster bomb 】 Each variable corresponds to a dictionary and performs intersection cracking
③ payload Page setup

payload Type settings 【 This verification code can be selected numbers】
Commonly used payload Type introduction
simple list Simple list numbers A list of numbers dates Date list bruce forcer Brute force
payload option Set up

payload processing Set up Default not set 【 This test does not need to be set 】
You can process strings 、 for example MD5 encryption 、 Character interception 、 Add prefixes, suffixes, etc
Four 、 perform attack

After execution , Click on length Length value , Generally speaking, the response length of a successful crack is different from that of an unsuccessful crack
边栏推荐
- Li Kou daily question - day 31 -202 Happy number
- Aardio - 阴影渐变文字
- Scala language learning-07-constructor
- Utiliser Beef pour détourner le navigateur utilisateur
- 2022.6.30 省赛+蓝桥国赛记录
- CPU設計實戰-第四章實踐任務一簡單CPU參考設計調試
- Gdip - hatchbrush pattern table
- String coordinates of number to excel
- window c盘满了
- 事务方法调用@Transactional
猜你喜欢

如何使用layui将数据库中的数据以表格的形式展现出来

Gdip - hatchbrush pattern table

使用 setoolkit 伪造站点窃取用户信息

Adding color blocks to Seaborn clustermap matrix

源代码加密的意义和措施
![[getting started] extract non repeating integers](/img/88/3e96df88e980bd98ac112b18a8678c.png)
[getting started] extract non repeating integers

Airsim雷达相机融合生成彩色点云

Office365 - how to use stream app to watch offline files at any time
![[question brushing] character statistics [0]](/img/cc/f5aaecd920c502180303d92447e54f.png)
[question brushing] character statistics [0]
![[introduction] approximate value](/img/6b/597178d848dd21110f36601fc31092.png)
[introduction] approximate value
随机推荐
[force deduction 10 days SQL introduction] Day10 control flow
[batch DOS CMD summary] extension variables - delay variables CMD /v:on, CMD /v:off, SETLOCAL enabledelayedexpansion, disabledelayedexpansion
Li Kou daily question - Day 32 -1822 Symbol of array element product
Php laraver Wechat payment
Set up file server Minio for quick use
Airsim radar camera fusion to generate color point cloud
Aardio - Shadow Gradient Text
[staff] key number (key number identification position | key number marking list | a major key identification principle | F, C, G position marking ascending | F major key identification principle | B
OJ输入输出练习
CPU設計實戰-第四章實踐任務一簡單CPU參考設計調試
Airsim雷达相机融合生成彩色点云
[batch dos-cmd command - summary and summary] - Common operators in the CMD window (<, < <, & <,>, > >, & >, & >, & &, ||, (),;, @)
Learn the knowledge you need to know about the communication protocol I2C bus
Android screen adaptation (using constraintlayout), kotlin array sorting
Erreur de hauteur du clavier souple
Provincial election + noi Part VII computational geometry
Keithley 2100 software 𞓜 Keithley2400 test software ns SourceMeter
How to check ad user information?
Find the nearest n-th power of 2
sqlalchemy创建MySQL_Table