当前位置:网站首页>Simple use of Xray
Simple use of Xray
2022-07-07 08:52:00 【Colorful @ star】
xray Simple use
summary
Xray Is a powerful security assessment tool , Support Take the initiative 、 passive Multi scan mode , Support common web Loopholes automated testing , Flexible definition of POC, Rich in functions , Easy to call , Support multiple operating systems
characteristic
- Fast detection speed
- Support a wide range of
- High quality can be customized
- There is no threat to safety
- Fast update speed
Supported vulnerability detection types
- XSS Vulnerability detection (key: xss)
- SQL Injection detection (key: sqldet)
- command / Code injection detection (key: cmd-injection)
- Directory enumeration (key: dirscan)
- Path crossing detection (key: path-traversal)
- XML Solid injection detection (key: xxe)
- File upload detection (key: upload)
- Weak password detection (key: brute-force)
- jsonp testing (key: jsonp)
- ssrf testing (key: ssrf)
- Baseline check (key: baseline)
- Arbitrary jump detection (key: redirect)
- CRLF Inject (key: crlf-injection)
- Struts2 Serial vulnerability detection ( premium ,key: struts)
- Thinkphp Serial vulnerability detection ( premium ,key: thinkphp)
- POC frame (key: phantasm)
among POC The frame is built-in by default Github On the contribution of poc, Users can also build on demand poc And run
Download and install
Download address
GitHub Address :https://github.com/chaitin/xray/releases
Document address :https://docs.xray.cool/
Support installation and download of various operating systems
install
1、 Because the blogger is Windows64 Bit operating system , So choose 64 Bit installation file
2、 unpack , Just one exe file
3、 Use cmd The command line navigates to the current xray.exe Path
Run the file
meanwhile xray_windows_386.exe Under the same directory of the file config.yaml The configuration file
see xray Version number of version
see Help document --help
Configuration is introduced
Xray In the catalog config.yaml The file contains all the configuration information , Configuration mainly includes five categories :http、plugins、 reverse、mitm、basic_crawle
Set the domain name that allows scanning
hostname_allowed: Is the domain name that allows scanning ,hostname_disallowed: Is a domain name that is not allowed to be scanned , You can use asterisks ( Express all ) matching
Scan plug-in configuration
The plug-in configuration modification is mainly on and off , The default is all on , Detect all types of vulnerabilities during scanning , The type of vulnerability that does not need to be detected is modified to false; You can also specify plug-ins during scanning , Such as :–plugins xss,xxe,cmd_injection
Contracting rate limit
Prevent requests from being too quickly waf Intercept , You can reduce the number of requests per second , Default per second 500
Scan agent configuration
Setting up a proxy can work with burp suite And other software
The proxy pattern
1、 Generate ca certificate
xray_windows_386.exe genca
- 1
2、 Import to browser ca certificate
choice ca The path of the certificate
Certificate of trust
end
3、 Set up proxy for browser
4、 function xray, monitor
xray_windows_386.exe webscan --listen 127.0.0.1:7777 --html-output test.html
webscan web Page vulnerability detection
–listen monitor
–html-output Output html Format
- 1
- 2
- 3
- 4
- 5
visit dvwa Of sql Injection module
xray change
end CTRL+c
3、 open test.html, View generated reports
Reptile mode
xray Bugs can be checked with the help of crawlers
xray_windows_386.exe webscan --basic-crawler http://127.0.0.1/bc/DVWA/vulnerabilities/sqli/?id=2&Submit=Submit# --html-output 111.html
webscan web Page scan
–basic-crawler Basic reptiles
- 1
- 2
- 3
- 4
Xray + BurpSuite
burpsuite As Xray The upstream agent of ( Grab Xray Contract awarding )
namely : browser -> Xray -> burpsuite -> Server side
This method is convenient to view Xray Scan the packets sent by the website , And it can also be tested poc Whether it is right
Xray As burpsuite The upstream agent of ( Assist in testing )
namely : browser -> burpsuite -> Xray -> Server side
This method is convenient to test wherever you want , If you want to test, send it to Xray, Don't want to throw away the data packet
</article>
边栏推荐
- Redis fault handling "can't save in background: fork: cannot allocate memory“
- Sign and authenticate API interface or H5 interface
- String operation
- Problems encountered in the use of go micro
- Required String parameter ‘XXX‘ is not present
- Mock.js用法详解
- Analysis of abnormal channel number information before and after AGC re signature service
- [kuangbin] topic 15 digit DP
- [Chongqing Guangdong education] organic electronics (Bilingual) reference materials of Nanjing University of Posts and Telecommunications
- 【MySQL】数据库进阶之触发器内容详解
猜你喜欢
Greenplum6.x-版本变化记录-常用手册
Explain Huawei's application market in detail, and gradually reduce 32-bit package applications and strategies in 2022
[MySQL] detailed explanation of trigger content of database advanced
idea里使用module项目的一个bug
[Yugong series] February 2022 U3D full stack class 007 - production and setting skybox resources
23 Chengdu instrument customization undertaking_ Discussion on automatic wiring method of PCB in Protel DXP
NCS Chengdu New Electric interview Experience
为什么要选择云原生数据库
Arm GIC (IV) GIC V3 register class analysis notes.
路由信息协议——RIP
随机推荐
redis故障处理 “Can‘t save in background: fork: Cannot allocate memory“
xray的简单使用
[Chongqing Guangdong education] organic electronics (Bilingual) reference materials of Nanjing University of Posts and Telecommunications
Data analysis methodology and previous experience summary 2 [notes dry goods]
LeetCode 736. Lisp 语法解析
About using CDN based on Kangle and EP panel
快速集成认证服务-HarmonyOS平台
Required String parameter ‘XXX‘ is not present
Greenplum 6.x reinitialization
Explain Huawei's application market in detail, and gradually reduce 32-bit package applications and strategies in 2022
为什么要选择云原生数据库
Introduction to data fragmentation
关于基于kangle和EP面板使用CDN
How to realize sliding operation component in fast application
MySQL partition explanation and operation statement
Calling the creation engine interface of Huawei game multimedia service returns error code 1002, error message: the params is error
Arm GIC (IV) GIC V3 register class analysis notes.
Redis summary
How to add a mask of a target in a picture
JS的操作