burp suite of four kinds of intruder attack

A: sniper [sniper]

Such attacks on the original requested content, needs a dictionary, each with a value of the dictionary to be a value instead of the original attack.

= The number of elements times the number of parameters X dictionary attack

For example: the original request

 name=aa , password=bb,

dictionary:

{ 1 ,2 };

It will have four requests:

name=1 , password=bb

name=2 , password=bb

name=aa , password=1

name=aa , password=2

This mode is mainly applied to: competitive conditions tested (select Null payloads), password, authentication code brute force, replay attacks and other scenes .

Two, battering ram] [impactors

Also need a dictionary, this dictionary will be assigned to each of the values ​​of all parameters simultaneously. Result of the example is:

name=1 , password=1

name=2, password=2

The number of attacks = the number of elements in the dictionary

This model provides for: hit trousers .

Three, pitchfork [intersect]

= The number of the dictionary required number of parameters.

Each request is taken in turn by each parameter set in the respective load to be worth.

If it is not the quantity of each element of the dictionary, then the minimum number of requests that prevail.

Example:

The original request

 name=aa , password=bb,payload1={  1  , 2  }, payload2={  3  , 4 , 5 }

Generated two requests:

name=1 , password=3

name=2 , password=4

= Number of attacks within a minimum number of elements Dictionary

This model provides for: registered in bad faith .

Four, cluster bomb cluster [bombs] (most common)

= The number of the dictionary required number of parameters.

Finally, all requests are generated for all combinations of values ​​of the parameters, the number of attacks is the set number of elements in the dictionary.

Example:

The original request

 name=aa , password=bb,payload1={  1  , 2  }, payload2={  3  , 4 , 5 }

It will generate a request:

 name=1 , password=3

 name=1 , password=4

 name=1 , password=5

name=2 , password=3

name=2 , password=4

name=2 , password=5

This mode is mainly applied to: account number, password brute force .

 

Modify part

Reprinted: https://blog.csdn.net/weixin_30788619/article/details/97975624

Guess you like

Origin www.cnblogs.com/thespace/p/12464541.html