Use of tools such as burpsuite

Use of tools such as burpsuite

Gadget list:
Insert image description here
Insert image description hereGo to view related commands

Insert image description here
Directly check whether the port is successful.
If you only use it to verify whether the port is successful,
Insert image description hereyou will find that only scanning 1-1000
Insert image description hereNmap is too slow! ! !
Insert image description here12 seconds
Insert image description hereis very fast, 65535 port 1 second

Hping3 scan port
Nc verify port open
nmap study port details
Insert image description hereInsert image description here-A is to use all 600 scripts with
Windows2001
Insert image description hereCurl: verify whether the web page is accessed successfully, you can also upload and download files, you can also get and post
out of the network: you can access the outside world Internet, but just a simple ping does not explain the problem. Curl is a tcp network that can be used.
Insert image description here
Insert image description here
Insert image description here
Personal tips:
Cloud assets, there will be ram/ This path has k8s credentials to get permissions and ak/sk
Insert image description here
python
Insert image description here
Insert image description here

//Try to use the pro version
//Must be turned off, it will automatically crawl
1. Passively crawl
2. Passively send attack payloads.
Insert image description here
Crawling can only be done when the customer is fully authorized.
Scanning can only be performed without waf.

//Describe the problem.
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Not necessary
Insert image description here
Insert image description here
Insert image description here
. Select the type of DOM.
Insert image description here
Proxy module: related to the package. Bring your own browser
Insert image description here
in the Google Store.
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here

Firefox tool:
Insert image description here
Insert image description here
Insert image description here
//Modify the package
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Sniper: hit it
/Note here that when blasting, conditional competition will occur under multi-threading, resulting in a 401 error
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here
Insert image description here
//Business logic vulnerability
Insert image description here
Insert image description here
Insert image description here
//You can configure the upper-layer agent
Insert image description here
Insert image description here
and you can dig out the highlighting of unauthorized vulnerabilities
Insert image description here
HAE
Insert image description here
Insert image description here
Operation
Insert image description here

Guess you like

Origin blog.csdn.net/m0_51553670/article/details/131276222