当前位置:网站首页>captcha-killer验证码识别插件
captcha-killer验证码识别插件
2022-07-06 09:23:00 【又懒有菜】
目录
环境的配置
插件下载地址GitHub - broken5/captcha-killer-java8
https://github.com/broken5/captcha-killer-java8
0x01 作用
在目前实战挖掘src或者渗透测试中 大部分验证码是不可以啊绕过的 。想要通过爆破来进入后台页面 。 repeat模块测试后,验证码不可绕过,用captcha-killer能够识别验证码。 之后再进行弱口令爆破。
0x02 安装插件
jar的安装跳过了 安装成功效果如下


实战第一步 抓包方式
0x01 截取验证码包
这里截取之后不会再porxy中显示 但是history可以查看数据包

0x02 发送包
将验证码包发送到captcha-killer 如上图右键没有扩展插件
先将包发送到repeat中 再在repeat发送到capcha-killer模块

发送成功点击获取

实战第二步 接口配置
0x01 接口的配置
这里接口选用云打码平台(错误率大概5%):
图片识别-打码平台-打码网站-识别验证码-图鉴网络科技有限公司
http://www.ttshitu.com/
POST /predict HTTP/1.1
Host: api.ttshitu.com
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36
Accept: application/json;
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: Hm_lvt_d92eb5418ecf5150abbfe0e505020254=1585994993,1586144399; SESSION=5ebf9c31-a424-44f8-8188-62ca56de7bdf; Hm_lpvt_d92eb5418ecf5150abbfe0e505020254=1586144399
Connection: close
Content-Type: application/json;charset=UTF-8
Content-Length: 109
{"username":"账号","password":"密码","typeid":"3","image":"<@BASE64><@IMG_RAW></@IMG_RAW></@BASE64>"}
识别率如上图
实战第三步 爆破模块的设置
0x01 为验证码设置变量

边栏推荐
猜你喜欢

Relationship between hashcode() and equals()

canvas基础2 - arc - 画弧线

Renforcer les dossiers de base de l'apprentissage

Only 40% of the articles are original? Here comes the modification method

Ucos-iii learning records (11) - task management

7-7 7003 组合锁(PTA程序设计)

Callback function ----------- callback

HackMyvm靶机系列(6)-videoclub

Interpretation of iterator related "itertools" module usage

搭建域环境(win)
随机推荐
[MySQL database learning]
The United States has repeatedly revealed that the yield of interest rate hiked treasury bonds continued to rise
Experiment 9 input and output stream (excerpt)
[three paradigms of database] you can understand it at a glance
[experiment index of educator database]
QT meta object qmetaobject indexofslot and other functions to obtain class methods attention
Tencent map circle
Implementation of count (*) in MySQL
7-3 构造散列表(PTA程序设计)
撲克牌遊戲程序——人機對抗
Analysis of penetration test learning and actual combat stage
How to understand the difference between technical thinking and business thinking in Bi?
7-6 矩阵的局部极小值(PTA程序设计)
Ucos-iii learning records (11) - task management
中间件漏洞复现—apache
[dark horse morning post] Shanghai Municipal Bureau of supervision responded that Zhong Xue had a high fever and did not melt; Michael admitted that two batches of pure milk were unqualified; Wechat i
2022 Teddy cup data mining challenge question C idea and post game summary
Canvas foundation 2 - arc - draw arc
Meituan dynamic thread pool practice ideas, open source
sqqyw(淡然点图标系统)漏洞复现和74cms漏洞复现