当前位置:网站首页>Practical | how to use burp suite for password blasting!
Practical | how to use burp suite for password blasting!
2022-06-10 21:16:00 【AirPython】

Hello everyone , I'm Ango !
The last article explained the use of Burp Suite Tools to grab bags 、 Complete steps of data interception modification
Recommend a great packet capture analysis tool - Burp Suite
In this article, we continue to talk about BP A practical function module in the tool 「 Intruder 」
Use BP The tool Intruder Module height configurable , You can blast the password of the target website , It is generally used in the security penetration test scenarios of websites
It works by , In the original network packet , Use different variable values to replace the request parameters , Then simulate the request to get different response results , So as to achieve the purpose of blasting
1、Intruder Function label

BP The tool Intruder The module contains 5 A feature tag
Namely :
Target
Used to specify the target server to be attacked Host、 Port number and SSL Connect
Positions
Set the parameters and attack types in the request
Payloads
Set the data set for the above parameters 、 Parameter code 、 Encryption and other functions
Resource Pool
Specify the request thread and delay time
Options
Request header 、 The result of the attack 、 Redirection and other related configurations
2、 Attack types
Intruder When performing password explosion , There can be 4 There are four attack types to choose from
Namely :Sniper( Sniper mode )、Battering ram( Broken city hammer mode )、Pitchfork( Tuning fork mode )、Cluster bomb( Cluster bomb mode )

Here, the login interface contains 「 user name 、 password 」2 Take two parameters as an example
Sniper Use a set of data sets , In turn $ Marked variables are exploded , namely : For a parameter variable , Use a data set
Use scenarios : Single goal , Known user name , The password is unknown
Battering ram Use a set of data sets , At the same time $ All variables marked are exploded , namely : For multiple parameter variables , Use a data set
Use scenarios : Two single goals , Mutual indifference
Pitchfork Use multiple sets of data , Simultaneous blasting is $ Tagged variables , namely : For multiple parameter variables , Use multiple data sets
Use scenarios : Unknown user name and password , Each user name only uses one password to attack
Cluster bomb Use multiple sets of data to combine ( The cartesian product ) after , Blast several blasting point variables in turn , namely : For multiple variables , Use a combination of multiple data sets
Practical scenarios : Two goals , Each user name uses all passwords to carry out an attack
3、 Let's fight
Suppose we need to blast the password of the target website
First , We need to perform packet capture analysis on the developer toolbar , stay BP In the tools Proxy Option to configure interception rules
such as , The login interface contains keywords 「 login 」, We can configure it as follows

next , Turn on the interception function , Enter any user name in the browser 、 password , Perform login operation , In this way BP This request can be intercepted in the tool interception module
Click on 「 Action 」 Button , Select to send the packet to Intruder modular

then , stay Intruder Module configuration 5 A feature tag
PS: Generally speaking ,Target Just leave the label as default , No additional configuration is required
stay Positions Under the label , We need to click on the... On the right first 「 Clear § 」 Button to clear the default parameter label
Then the mouse selects the value that needs to be set as a variable , Click on the right 「 Add § 」 Button to set it as a variable
notes : For the convenience of demonstration , Only the user name 、 The password is set to variable

Here we choose the attack type 「 Cluster bomb 」, Let all user names and passwords randomly combine to attack
next , We are Payloads Under the label , The user name is indexed according to the parameter 、 Configure different data sets for passwords
It's important to point out that , Datasets can be imported from local files , You can also add it manually or paste it from the clipboard
here Resource Pool and Options The configuration page remains the default

Last , Click on the 「 Start attack 」 Button to blast the password of the target website , The results will be displayed in the form of a pop-up box

such , We can intuitively judge the available account portfolio data of the target website through the response results
4、 Add up
Face some simple websites , In the user name 、 On the premise that the password dictionary data is perfect , The probability of using the above steps for password blasting is very high
But for some websites that contain verification codes , We need to do more to identify the verification code , And then in Payloads Under the function tab, set the picture recognition result to the parameter

Here's a recommended one BP plug-in unit 「 captcha-killer 」, Limited by length , You can expand this part by yourself
https://github.com/c0ny1/captcha-killer
If you think the article is good , Please give the thumbs-up 、 Share 、 Leaving a message. Next , Because this will be the strongest driving force for me to continue to output more quality articles !
Recommended reading
Recommend a great packet capture analysis tool - Burp Suite
use Python Remote control Windows The server , It's great to use !
END
Haowen and his friends watch ~
边栏推荐
- Node (express) implements interfaces such as adding, deleting, modifying, and paging
- A small case with 666 times performance improvement illustrates the importance of using indexes correctly in tidb
- Mba-day21 linear programming problem
- LeetCode 进阶之路 - 136.只出现一次的数字
- Lengsuanling, a 30-year tortuous history of IPO of a domestic brand
- Full Permutation V3 recursion of brute force method /1~n
- ^29 event cycle model
- pdf.js-----js解析pdf文件實現預覽,並獲取pdf文件中的內容(數組形式)
- 轻便型FDW框架 for pb
- 【Educational Codeforces Round 120 (Rated for Div. 2)】C. Set or Decrease
猜你喜欢

RuntimeError: Attempting to deserialize object on CUDA device 1 but torch. cuda. device_ count() is 1.

PDF. JS - - - - JS analyse le fichier PDF pour réaliser l'aperçu et obtenir le contenu du fichier PDF (sous forme de tableau)

Talk about server performance optimization ~ (recommended Collection)

72. 编辑距离 ●●●

^29 event cycle model

Self attention and multi head attention

72. editing distance ●●

Construction of RT thread smart win10 64 bit compilation environment

微积分复习1

Niuke.com: numbers that appear more than half of the times in the array
随机推荐
冷酸灵,一个国产品牌IPO的30年曲折史
Serial Print() and serial The difference of write() function, and the problem of hexadecimal and string sending and receiving format in serial port communication and detailed explanation of the conver
Read the source code of micropyton - add the C extension class module (4)
Test APK exception control netlocation attacker development
mysql基础篇
魔塔类游戏实现源码及关卡生成
RuntimeError: Attempting to deserialize object on CUDA device 1 but torch. cuda. device_ count() is 1.
MySQL service startup failed
pdf. Js----- JS parse PDF file to realize preview, and obtain the contents in PDF file (in array form)
Redis cluster configuration
分布式服务理论基础
Fast Planner - detailed explanation of kinetic astar
LeetCode 进阶之路 - 69.X的平方根
[computer use] how to set software startup without auto startup
Pytorch deep learning -- neural network convolution layer conv2d
【Educational Codeforces Round 120 (Rated for Div. 2)】C. Set or Decrease
H5 van popup full screen pop-up window, simulates the page fallback effect, supports the return button in the upper left corner, and is suitable for physical return, side sliding and bottom return key
35岁被裁员,还能拥有美妙人生吗?
Redis缓存穿透
面试必备——synchronized底层原理的基础知识