這篇文章給大家介紹Burpsuite插件burpFakeIP怎么用,內(nèi)容非常詳細(xì),感興趣的小伙伴們可以參考借鑒,希望對(duì)大家能有所幫助。
創(chuàng)新互聯(lián)公司是一家專(zhuān)注于成都網(wǎng)站制作、成都網(wǎng)站建設(shè)、外貿(mào)營(yíng)銷(xiāo)網(wǎng)站建設(shè)與策劃設(shè)計(jì),靜樂(lè)網(wǎng)站建設(shè)哪家好?創(chuàng)新互聯(lián)公司做網(wǎng)站,專(zhuān)注于網(wǎng)站建設(shè)10多年,網(wǎng)設(shè)計(jì)領(lǐng)域的專(zhuān)業(yè)建站公司;建站業(yè)務(wù)涵蓋:靜樂(lè)等地區(qū)。靜樂(lè)做網(wǎng)站價(jià)格咨詢(xún):18982081108
今天給大家介紹一款Burpsuite插件,burpFakeIP
一、下載地址
https://github.com/TheKingOfDuck/burpFakeIP
二、安裝插件
1、解壓到本地
2、打開(kāi)burpsuite,選擇Extender,Add
3、選擇下載好python插件,選擇下一步
4、安裝成功
三、使用方法
1、偽造指定ip,右擊抓到的數(shù)據(jù)包,選擇fakeip,inputIP,輸入想要用的ip地址,點(diǎn)擊確定,自動(dòng)添加
2、偽造本地ip,右擊數(shù)據(jù)包選擇127.0.0.1,自動(dòng)生成如下數(shù)據(jù)包
GET / HTTP/1.1Host: 192.168.1.135:8002User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3Accept-Encoding: gzip, deflateCookie: ASPSESSIONIDAACSRSQS=CJLFMKFBLOABHEPKPBEKLPOA; ASPSESSIONIDAACSRTRT=HOAFJLFBABBHLECCHJEGMIMODNT: 1Connection: closeUpgrade-Insecure-Requests: 1X-Forwarded-For:127.0.0.1X-Forwarded:127.0.0.1Forwarded-For:127.0.0.1Forwarded:127.0.0.1X-Forwarded-Host:127.0.0.1X-remote-IP:127.0.0.1X-remote-addr:127.0.0.1True-Client-IP:127.0.0.1X-Client-IP:127.0.0.1Client-IP:127.0.0.1X-Real-IP:127.0.0.1Ali-cdn-Real-IP:127.0.0.1Cdn-Src-Ip:127.0.0.1Cdn-Real-Ip:127.0.0.1CF-Connecting-IP:127.0.0.1X-Cluster-Client-IP:127.0.0.1WL-Proxy-Client-IP:127.0.0.1Proxy-Client-IP:127.0.0.1Fastly-Client-Ip:127.0.0.1True-Client-Ip:127.0.0.1
3、偽造隨機(jī)IP,右擊數(shù)據(jù)包選擇randomIP,生成如下數(shù)據(jù)包
GET / HTTP/1.1Host: 192.168.1.135:8002User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3Accept-Encoding: gzip, deflateCookie: ASPSESSIONIDAACSRSQS=CJLFMKFBLOABHEPKPBEKLPOA; ASPSESSIONIDAACSRTRT=HOAFJLFBABBHLECCHJEGMIMODNT: 1Connection: closeUpgrade-Insecure-Requests: 1X-Forwarded-For:37.120.247.234X-Forwarded:37.120.247.234Forwarded-For:37.120.247.234Forwarded:37.120.247.234X-Forwarded-Host:37.120.247.234X-remote-IP:37.120.247.234X-remote-addr:37.120.247.234True-Client-IP:37.120.247.234X-Client-IP:37.120.247.234Client-IP:37.120.247.234X-Real-IP:37.120.247.234Ali-CDN-Real-IP:37.120.247.234Cdn-Src-Ip:37.120.247.234Cdn-Real-Ip:37.120.247.234CF-Connecting-IP:37.120.247.234X-Cluster-Client-IP:37.120.247.234WL-Proxy-Client-IP:37.120.247.234Proxy-Client-IP:37.120.247.234Fastly-Client-Ip:37.120.247.234True-Client-Ip:37.120.247.234
4、隨機(jī)ip爆破,偽造隨機(jī)ip爆破是本插件最核心的功能。
將數(shù)據(jù)包發(fā)送到Intruder模塊,在Positions中切換Attack type為Pitchfork模式,選擇好有效的偽造字段,以及需要爆破的字段
將Payload來(lái)源設(shè)置為Extensin-generated,并設(shè)置負(fù)載偽fakeIpPayloads,然后設(shè)置第二個(gè)變量。
點(diǎn)擊Start attack開(kāi)始爆破.
關(guān)于Burpsuite插件burpFakeIP怎么用就分享到這里了,希望以上內(nèi)容可以對(duì)大家有一定的幫助,可以學(xué)到更多知識(shí)。如果覺(jué)得文章不錯(cuò),可以把它分享出去讓更多的人看到。