Pikachu exercise platform (brute force)

Pikachu exercise platform (brute force)

As used below to burp suite, here briefly explain things intruder module

Target Options : setting targets, can be sent by proxy

Pasitions options : Specifies the brute force of arguments and set variables, and select attack mode

 Sniper (sniper):

A payload, the first variable using a dictionary first test, then the second test variables dictionary

Battering ram (car crash):

May be provided a plurality of payload, all variables are replaced together with the contents of the dictionary, and then try with

Pitchfork (pitchfork type) :

Dictionary contents of each payload set corresponding to crack

Cluster bomb (bomb-focus beam) :

Setting a payload for each variable, respectively, using the contents of the dictionary composition variables replace

 

Payloads options : Set the dictionary, and the dictionary unified policy processing

Options Options : scanning threads, failure retry like configuration;

Matching the results set flag: identifier by a discrimination result, and the flag in the results column

 

Based on brute form

 

 

 

 First, we casually enter the account and password tt ttt

 

 

 

 

We open burp suite carried out capture, sent to the intruder module;

 

 

 

 Sinper: a variable set to attack a payload

 

Battering ram: You can set two variables, the payload at the same time to the two variables

 

Pitchfork: two variables are set payload, then one correspondence in order to crack

 

Cluster bomb: two variables are provided payload, then the list of all cases cross crack (common)

 

 

 positions Attack Location:

 

 

 

 

 payloads attack payload:

 

 

 

 

 

 

 

 Start blasting:

 

 

 使用admin 123456 进行登录,

 

 

 

登陆成功,爆破成功。

 

 

 

 

 

 

 

 

 

 

 

 验证码绕过(on client)在客户端

 

 

 

 查看页面源码,可以看到,输入的验证码是通过前端的js进行验证,很轻松就可以绕过;

 

 

 

 

 输入数据后,进行抓包,并发送到 Reperter;

 

 

 

 

 

 

 我们可以对验证码进行修改,发现不输入验证码,或者输入错误的验证码,代码都没有对验证码进行验证;

 

 

 

 

 在前端检测验证码,可以轻松绕过,然后发送到intruder模块进行暴力破解,步骤和上面相同。

 

 

验证码绕过(on server)在服务器端

 

 

 

 输入之后进行抓包,发送到reperter,

 

 

 

 

 在前端刷新页面,得到新的验证码在reperter修改;

 

 

 

 

 

 

 

 

 

修改验证码后,我们再次输入用户名和密码,验证码也不再被校检,说明此验证码可以重复使用;

我们可以利用此漏洞,将数据包发送到intruder进行暴力破解;

 

 

 

 

 

 

 

 

 

 

 

 

 爆破成功;

 

 

 

 

 

 

 

token不能防爆破

 

 

 

 

 

 

 查看源代码,可以发现会有一个防爆破的的隐藏表单token值(每次你打开前端页面,后端收到请求后,就会生成一个token值,每次刷新token值都不一样);

 

 

 

 

 

 

查看php文件,知道只有token先判断完了之后再判断账号密码,如果token值验证不通关  是不会再验证用户名和密码的

 

 

 

所以利用token值防爆破是不可以的,因为在认证之前这个可以以字符串铭文获取到表单里面,攻击者写一个工具在认证前获取这个值填到字典里面就可以进行连续性的重放

在csrf里会用到

 

Guess you like

Origin www.cnblogs.com/199904-04/p/12362453.html