Kali Linux Web渗透测试手册(第二版) - 2.6 - 使用浏览器自带的开发工具来做基本的分析和修改...

翻译来自掣雷小组

成员信息:

thr0cyte,Gr33k,花花,MrTools,R1ght0us,7089bAt

这个公众号,一定要关注哦,慢慢会跟上面老哥们一起分享很多干货哦~~

第二章:侦察

介绍

2.1、被动信息收集

2.2、使用Recon-ng收集信息

2.3、使用Nmap扫描和识别应用服务

2.4、识别web应用防火墙

2.5、识别HTTPS加密参数

2.6、使用浏览器自带的开发工具来做基本的分析和修改

2.7、获取和修改cookie

2.8、利用robots.txt

 


 

2.6、使用浏览器自带的开发工具来做基本的分析和修改

Firebug是一个浏览器的插件,使用它可以分析网页的内部组件,比如<table>、CSS和<frame>,也可以用它查看当前网页的DOM对象,错误代码和浏览器与服务器之前的交互(请求和响应)信息。

在之前的章节中,我们通过查看HTML源代码的手段发现了隐藏在<input>标签中用来限制文本输入长短的值values,在这个章节中,我们将使用火狐浏览器的Firebug插件或者是OWASP的Mantra,来实现同样的功能。

 

怎么做…

确保vm_1正常工作的情况下,在你的Kali VM中打开浏览器访问

http://192.168.56.11/WackoPicko:

1.  在网页上右键-审查元素

Tips:还可以使用F12或者Ctrl+Shift+C来打来浏览器的开发者工具

2. 在<form>表单的第一个<input>上有一个type=”hidden”,双击选中hidden标签:

 

3. 将hidden更改为text或者删除type="hidden"并按下“Enter”;

4. 现在,双击value的参数3000;

5. 将3000改为500000:

 

 

6.  现在我们可以在页面上看到一个value为500000的全新的文本输入框,这是因为我们刚才的操作更改了限制文档大小的关键参数。

 

 

它是如何工作的…

当网页被浏览器加载后,那么针对它网页元素所做的所有修改都会被即时展现出来,但是一旦刷新当前页面,那么真对元素所做的所有修改都将不复存在,它只会展示服务器穿送过来的原有页面。

开发人员工具可以直接修改展现在浏览器中的任何元素,所以遇到需要修改控件的地方,就可以使用这个工具。

 

 

更多…

开发人员工具不仅能够操控标签或者是修改值,它还有很多其他的功能:

  • Inspector选项是我们刚才用过的,它能够将HTML源代码以层级的方式展现出来,从而方便我们直观地修改网页的内容。

  • Console选项可以展示当前网页的错误信息,警告信息和页面加载时产生的其他一些相关信息。

  • Debugger中可以看到当前页面的所有源代码信息,可以在某处设置断点,并且能在脚本运行的过程中查看变量的相关变化。

  • Style Editor选项可以查看和修改当前页面的CSS样式;

  • Performance选项可以查看当前页面静态资源和动态资源的加载时间以及其他的信息,对开发人员来说,这个功能对于检测客户端代码运行性能有着至关重要的作用。

  • Memory用来获取进程内存的快照,在快照中可以查看到存储在内存中的敏感信息。

  • Network将服务器的请求和响应的相关值,如类型、大小、响应时间和顺序以时间轴的方式展现出来。

  • Storage中存储了Cookie和其他的客户端相关凭证,并且它们很轻易地就可以被更改或者删除。

  • 还有其他可以使用的选项有:

                DOM

                Shader Editor

                Canvas

                Web Audio

                Scratchpad

 

转载于:https://www.cnblogs.com/7089fy/p/10035359.html

安全渗透测试 [Kali Linux Web Penetration Testing Cookbook 2nd - 2018.pdf](https://itbooks.pipipan.com/fs/18113597-314061726) Kali Linux Web Penetration Testing Cookbook 2nd Edition pdf Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security Key Features Familiarize yourself with the most common web vulnerabilities Conduct a preliminary assessment of attack surfaces and run exploits in your lab Explore new tools in the Kali Linux ecosystem for web penetration testing Book Description Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform that provides a broad array of testing tools, many of which can be used to execute web penetration testing. Kali Linux Web Penetration Testing Cookbook gives you the skills you need to cover every stage of a penetration test – from gathering information about the system and application, to identifying vulnerabilities through manual testing. You will also cover the use of vulnerability scanners and look at basic and advanced exploitation techniques that may lead to a full system compromise. You will start by setting up a testing laboratory, exploring the latest features of tools included in Kali Linux and performing a wide range of tasks with OWASP ZAP, Burp Suite and other web proxies and security testing tools. As you make your way through the book, you will learn how to use automated scanners to find security ?aws in web applications and understand how to bypass basic security controls. In the concluding chapters, you will look at what you have learned in the context of the Open Web Application Security Project (OWASP) and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of this book, you will have acquired the skills you need to identify, exploit, and prevent web application vulnerabilities. What you will learn Set up a secure penetration testing laboratory Use proxies, crawlers, and spiders to investigate an entire website Identify cross-site scripting and client-side vulnerabilities Exploit vulnerabilities that allow the insertion of code into web applications Exploit vulnerabilities that require complex setups Improve testing efficiency using automated vulnerability scanners Learn how to circumvent security controls put in place to prevent attacks Who this book is for Kali Linux Web Penetration Testing Cookbook is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. The basics of operating a Linux environment and prior exposure to security technologies and tools are necessary.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值