• Galileo:一款开源Web应用审计框架


    转载自FreeBuf.COM

    Galileo是一款针对Web应用程序的开源渗透测试工具,可帮助开发和渗透测试人员识别并利用其Web应用程序中的漏洞。

    截图

    screen.png

    安装

    $ git clone https://github.com/m4ll0k/Galileo.git galileo
    $ cd galileo

    安装依赖

    $ pip install -r requirements.txt

    $ apt-get install python-pysocks

    windows

    $ python -m pip install pysocks

    运行

    $ python galileo.py

    使用

    设置全局选项:

    galileo #> set
      Set A Context-Specific Variable To A Value
      ------------------------------------------
      - Usage: set <option> <value>
      - Usage: set COOKIE phpsess=hacker_test
    
    
      Name        Current Value                            Required  Description
      ----------  -------------                            --------  -----------
      PAUTH                                                no        Proxy auth credentials (user:pass)
      PROXY                                                no        Set proxy (host:port)
      REDIRECT    True                                     no        Set redirect
      THREADS     5                                        no        Number of threads
      TIMEOUT     5                                        no        Set timeout
      USER-AGENT  Mozilla/5.0 (X11; Ubuntu; Linux x86_64)  yes       Set user-agent
      VERBOSITY   1                                        yes       Verbosity level (0 = minimal,1 = verbose)

    搜索模块:

    galileo #> search disclosure
    [+] Searching for 'disclosure'...
    
      Disclosure
      ----------
        disclosure/code
        disclosure/creditcard
        disclosure/email
        disclosure/privateip
    

    显示模块:

    galileo #> show modules
    
      Bruteforce
      ----------
        bruteforce/auth_brute
        bruteforce/backup_brute
        bruteforce/file_dir_brute
    
      Disclosure
      ----------
        disclosure/code
        disclosure/creditcard
        disclosure/email
        disclosure/privateip
    
      Exploits
      --------
        exploits/shellshock
    
      Fingerprint
      -----------
        fingerprint/cms
        fingerprint/framework
        fingerprint/server
    
      Injection
      ---------
        injection/os_command_injection
        injection/sql_injection
    
      Scanner
      -------
        scanner/asp_trace
    
      Tools
      -----
        tools/socket

    使用模块:

    galileo #> use bruteforce/backup_brute
    galileo bruteforce(backup_brute) #> 

    设置模块选项

    galileo bruteforce(backup_brute) #> show options
    
      Name      Current Value  Required  Description
      --------  -------------  --------  -----------
      EXTS                     no        Set backup extensions
      HOST                     yes       The target address
      METHOD    GET            no        HTTP method
      PORT      80             no        The target port
      URL_PATH  /              no        The target URL path
      WORDLIST                 yes       Common directory wordlist
    
    galileo bruteforce(backup_brute) #> set HOST www.xxxxxxx.com
    HOST => www.xxxxxxx.com
    galileo bruteforce(backup_brute) #> set WORDLIST /home/m4ll0k/Desktop/all.txt
    WORDLIST => /home/m4ll0k/Desktop/all.txt

    运行:

    galileo bruteforce(backup_brute) #> run

    screen2.png

    *参考来源:github,FB小编 secist 编译,转载自FreeBuf.COM

  • 相关阅读:
    Android Studio:xxx is not an enclosing class 错误的解决方法
    SpringMVC验证框架Validation特殊用法
    在Spring MVC中使用注解的方式校验RequestParams
    Spring4新特性——集成Bean Validation 1.1(JSR-349)到SpringMVC
    Bean Validation 技术规范特性概述
    JSR 303
    SpringMVC学习
    javax.validation.UnexpectedTypeException: No validator could be found for constraint 'org.hibernate.validator.constraints.Length' validating type
    SpringAOP拦截Controller,Service实现日志管理(自定义注解的方式)
    Spring AspectJ切入点语法详解
  • 原文地址:https://www.cnblogs.com/cmt110/p/9272354.html
Copyright © 2020-2023  润新知