2020-03-22 19:49:44 +08:00
|
|
|
|
## burpFakeIP
|
|
|
|
|
|
|
2020-09-18 13:47:28 +08:00
|
|
|
|
** 2020/04/25 **
|
2020-03-22 19:49:44 +08:00
|
|
|
|
|
2020-04-26 01:51:57 +08:00
|
|
|
|
优化代码,新增9种请求头。
|
2019-06-05 15:33:28 +08:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
四个小功能
|
|
|
|
|
|
|
|
|
|
|
|
* 伪造指定ip
|
|
|
|
|
|
* 伪造本地ip
|
|
|
|
|
|
* 伪造随机ip
|
|
|
|
|
|
* 随机ip爆破
|
|
|
|
|
|
|
|
|
|
|
|
### 0x01 伪造指定ip
|
|
|
|
|
|
|
|
|
|
|
|
在`Repeater`模块右键选择`fakeIp`菜单,然后点击`inputIP`功能,然后输入指定的ip:
|
|
|
|
|
|
|
|
|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
程序会自动添加所有可伪造得字段到请求头中。
|
|
|
|
|
|
|
|
|
|
|
|
### 0x02 伪造本地ip
|
|
|
|
|
|
|
|
|
|
|
|
在`Repeater`模块右键选择`fakeIp`菜单,然后点击`127.0.0.1`功能:
|
|
|
|
|
|
|
|
|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
### 0x03 伪造随机ip
|
|
|
|
|
|
|
|
|
|
|
|
在`Repeater`模块右键选择`fakeIp`菜单,然后点击`randomIP`功能:
|
|
|
|
|
|
|
|
|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### 0x04 随机ip爆破
|
|
|
|
|
|
|
|
|
|
|
|
**伪造随机ip爆破是本插件最核心的功能。**
|
|
|
|
|
|
|
|
|
|
|
|
将数据包发送到`Intruder`模块,在`Positions`中切换`Attack type`为`Pitchfork`模式,选择好有效的伪造字段,以及需要爆破的字段:
|
|
|
|
|
|
|
|
|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
按照箭头顺序将Payload来源设置为`Extensin-generated`,并设置负载伪`fakeIpPayloads`,然后设置第二个变量。
|
|
|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
点击`Start attack`开始爆破.
|
|
|
|
|
|
|
2019-06-05 15:42:30 +08:00
|
|
|
|

|
2019-06-05 15:33:28 +08:00
|
|
|
|
|
|
|
|
|
|
如上图,实现每次爆破都使用不同的伪ip进行,避免被ban。
|
|
|
|
|
|
|
|
|
|
|
|
> PS:伪造随机ip爆破的先决条件可以伪造ip绕过服务器限制。
|
|
|
|
|
|
|