# Find more example scripts at https://github.com/PortSwigger/turbo-intruder/blob/master/resources/examples/default.py
def queueRequests(target, wordlists):
engine = RequestEngine(endpoint=target.endpoint,
concurrentConnections=5,
requestsPerConnection=100,
pipeline=False
)
for i in range(3, 8):
engine.queue(target.req, randstr(i), learn=1)
engine.queue(target.req, target.baseInput, learn=2)
for word in open('C:\Users\gud425\turbo.txt'):
engine.queue(target.req, word.rstrip())
def handleResponse(req, interesting):
table.add(req)
위의 스크립트를 실행하면 다음과 같은 사진 처럼 찾지 못하는 현상이 있다.
python으로 직접 실행 해보니 유니코드 관련 오류로
# Find more example scripts at https://github.com/PortSwigger/turbo-intruder/blob/master/resources/examples/default.py
def queueRequests(target, wordlists):
engine = RequestEngine(endpoint=target.endpoint,
concurrentConnections=5,
requestsPerConnection=100,
pipeline=False
)
for i in range(3, 8):
engine.queue(target.req, randstr(i), learn=1)
engine.queue(target.req, target.baseInput, learn=2)
for word in open(r'C:\Users\gud425\turbo.txt'):
engine.queue(target.req, word.rstrip())
def handleResponse(req, interesting):
table.add(req)
다음 처럼 '앞에 r을 추가해주면 정상적으로 작동이 된다.
'웹' 카테고리의 다른 글
python flask debugger pin취약점 문제 (0) | 2022.06.08 |
---|---|
Blind OS Command Injection (1) | 2022.05.27 |
SSRF localhost, 127.0.0.1 bypass (2) | 2022.05.25 |
MongoDB_Injection (0) | 2022.05.24 |
Python 쓰레드로 한번에 웹에 requests로 브루트포싱하기 (0) | 2021.11.08 |