A: sniper [sniper]
Such attacks on the original requested content, needs a dictionary, each with a value of the dictionary to be a value instead of the original attack.
= The number of elements times the number of parameters X dictionary attack
For example: the original request
name=aa , password=bb,
dictionary:
{ 1 ,2 };
It will have four requests:
name=1 , password=bb
name=2 , password=bb
name=aa , password=1
name=aa , password=2
This mode is mainly applied to: competitive conditions tested (select Null payloads), password, authentication code brute force, replay attacks and other scenes .
Two, battering ram] [impactors
Also need a dictionary, this dictionary will be assigned to each of the values of all parameters simultaneously. Result of the example is:
name=1 , password=1
name=2, password=2
The number of attacks = the number of elements in the dictionary
This model provides for: hit trousers .
Three, pitchfork [intersect]
= The number of the dictionary required number of parameters.
Each request is taken in turn by each parameter set in the respective load to be worth.
If it is not the quantity of each element of the dictionary, then the minimum number of requests that prevail.
Example:
The original request
name=aa , password=bb,payload1={ 1 , 2 }, payload2={ 3 , 4 , 5 }
Generated two requests:
name=1 , password=3
name=2 , password=4
= Number of attacks within a minimum number of elements Dictionary
This model provides for: registered in bad faith .
Four, cluster bomb cluster [bombs] (most common)
= The number of the dictionary required number of parameters.
Finally, all requests are generated for all combinations of values of the parameters, the number of attacks is the set number of elements in the dictionary.
Example:
The original request
name=aa , password=bb,payload1={ 1 , 2 }, payload2={ 3 , 4 , 5 }
It will generate a request:
name=1 , password=3
name=1 , password=4
name=1 , password=5
name=2 , password=3
name=2 , password=4
name=2 , password=5
This mode is mainly applied to: account number, password brute force .
Modify part
Reprinted: https://blog.csdn.net/weixin_30788619/article/details/97975624