- 利用burp suite抓包(要選pitck fork)後發現token leak  - 開始攻擊 - 將該行send to intruder --> username, password, token設定為payload --> options --> grep-extract -->新增token - 搜尋hide   - 常見username ``` admin administrator root admin123 user master test testadmin tester guest siteadmin ``` - payload 2 - [top1000passwd](https://github.com/danielmiessler/SecLists/blob/master/Passwords/Common-Credentials/10-million-password-list-top-1000.txt) - payload 3 - 透過intruder的recursive grep來在每次發送request時自動提交正確的CSRF token,若token不符會被偵測到 - recursive grep能夠從攻擊前的response中提取payload,利用此功能提取出CSRF token放到下次的request  - 要將maximum concurrent request設成1 - resource pool --> create new resource pool  - 開始攻擊 
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up