当前位置:网站首页>Burpsuite -- brute force cracking of intruder
Burpsuite -- brute force cracking of intruder
2022-07-01 08:17:00 【Wake up time of test】
Fate whispers to the warrior , You can't resist the storm ; The warrior whispered back , I am the storm !
It is mainly understood from the perspective of testing , Required functionality , This passage intruder Brute force cracking of modules , Realize the attack of verification code . The principle of intrusion module is based on the parameters existing in the access link / Variable , Call local dictionary 、 Attack load , Perform a penetration test on the parameters ; This article completes the company's mobile phone number + The verification code login module has been successfully cracked , Verification times of verification code are not verified , Provides blasting opportunities
intruder Main function module introduction
| Target | Details for configuring the target server to attack |
| Positions | Set up Payloads The insertion point and the type of attack |
| Payloads | Set up payload, Configuration Dictionary |
| Options | This tab contains request headers,request engine,attack results The content such as . |
burpsuite intruder Pre invasion preparations
① burpsuite Set up the proxy and get the target domain name
② Visit the target website
③ Set target domain
④ Close the agent
burpsuite intruder Set intrusion options
The interface diagram is attached below , There is basically no need to modify the options , If the test machine is configured properly, you can , Modify the number of threads in the request engine , Speed up cracking



burpsuite intruder Execute intrusion
One 、 stay proxy Open the target of the intercepted attack in the agent

Two 、 Click on action Send the target of the attack to intruder

3、 ... and 、 Get into intruder Interface
① Check target Is the goal right , Generally normal
② Set it up positions page ,【 In this test , Just keep smscode add add$ Parameters 】

Explain the four options of attack type
sniper【 The sniper 】 Crack the variables in turn , One shot, one bullet Battering ram【 Siege hammer 】 Crack the variables at the same time , Pitch fork【 A pitchfork is like a nine tooth harrow 】 Each variable corresponds to a dictionary Cluster bomb【 cluster bomb 】 Each variable corresponds to a dictionary and performs intersection cracking
③ payload Page setup

payload Type settings 【 This verification code can be selected numbers】
Commonly used payload Type introduction
simple list Simple list numbers A list of numbers dates Date list bruce forcer Brute force
payload option Set up

payload processing Set up Default not set 【 This test does not need to be set 】
You can process strings 、 for example MD5 encryption 、 Character interception 、 Add prefixes, suffixes, etc
Four 、 perform attack

After execution , Click on length Length value , Generally speaking, the response length of a successful crack is different from that of an unsuccessful crack
边栏推荐
- Access report realizes subtotal function
- Serial port oscilloscope software ns-scope
- Leetcode T39: 组合总和
- Uni hot update
- Anddroid text to speech TTS implementation
- Precautions and skills in using regular expressions in golang
- [untitled]
- ContentType所有类型对比
- 0 basic introduction to single chip microcomputer: how to use digital multimeter and precautions
- P4 installation bmv2 detailed tutorial
猜你喜欢

Differential: definition of total differential, partial derivative, gradient

凸印的印刷原理及工艺介绍

源代码加密的意义和措施

shardingSphere
![[batch DOS CMD summary] extension variables - delay variables CMD /v:on, CMD /v:off, SETLOCAL enabledelayedexpansion, disabledelayedexpansion](/img/ce/6c9e4f2c54710610e8b1f68d6d8088.png)
[batch DOS CMD summary] extension variables - delay variables CMD /v:on, CMD /v:off, SETLOCAL enabledelayedexpansion, disabledelayedexpansion

Utiliser Beef pour détourner le navigateur utilisateur

一套十万级TPS的IM综合消息系统的架构实践与思考

OJ input and output exercise

How to troubleshoot SharePoint online map network drive failure?

Conception et mise en service du processeur - chapitre 4 tâches pratiques
随机推荐
Erreur de hauteur du clavier souple
web254
Conception et mise en service du processeur - chapitre 4 tâches pratiques
Aardio - Method of self constructed geticonhandle
【入门】取近似值
Set up file server Minio for quick use
window c盘满了
軟鍵盤高度報錯
使用beef劫持用戶瀏覽器
String coordinates of number to excel
防“活化”照片蒙混过关,数据宝“活体检测+人脸识别”让刷脸更安全
CPU设计实战-第四章实践任务一简单CPU参考设计调试
Implementation and encapsulation of go universal dynamic retry mechanism
[untitled]
Book of quantitative trading - reading notes of the man who conquers the market
SQL number injection and character injection
Five combination boxing, solving six difficult problems on campus and escorting the construction of educational informatization
Latex formula code
When using charts to display data, the time field in the database is repeated. How to display the value at this time?
On June 30, 2022, the record of provincial competition + national competition of Bluebridge