Difference between revisions of "Siege: test DVWA"
Jump to navigation
Jump to search
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
Line 20: | Line 20: | ||
siege --content-type='application/x-www-form-urlencoded' --header='Cookie: security=low; PHPSESSID=cu6ai52hnttq3s4fpvotkos3a0' -d1 -r10 -c25 'http://192.168.88.240/DVWA-1.9/vulnerabilities/exec/ POST ip=192.168.88.82&Submit=Submit' | siege --content-type='application/x-www-form-urlencoded' --header='Cookie: security=low; PHPSESSID=cu6ai52hnttq3s4fpvotkos3a0' -d1 -r10 -c25 'http://192.168.88.240/DVWA-1.9/vulnerabilities/exec/ POST ip=192.168.88.82&Submit=Submit' | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Pranala Menarik== | ==Pranala Menarik== | ||
* [[siege]] | * [[siege]] |
Latest revision as of 16:37, 7 December 2018
Buka web DVWA, login, capture Cookie menggunakan Wireshark tambahan di siege --header=
siege -u http://192.168.88.240/DVWA-1.9/vulnerabilities/exec/ --header='Cookie: security=low; PHPSESSID=n4rbm0nva5qatce4c3jp8b8pk1' -d1 -r10 -c25
siege -u http://192.168.88.240/DVWA-1.9/vulnerabilities/sqli/ --header='Cookie: security=low; PHPSESSID=n4rbm0nva5qatce4c3jp8b8pk1' -d1 -r10 -c25
siege -u http://192.168.88.240/DVWA-1.9/vulnerabilities/upload/ --header='Cookie: security=low; PHPSESSID=n4rbm0nva5qatce4c3jp8b8pk1' -d1 -r10 -c25
siege -u http://192.168.88.240/DVWA-1.9/vulnerabilities/sqli/?id=1 --header='Cookie: security=low; PHPSESSID=n4rbm0nva5qatce4c3jp8b8pk1' -d1 -r10 -c25
siege -u http://192.168.88.240/DVWA-1.9/vulnerabilities/sqli/?id=%'+or+'0'='0 --header='Cookie: security=low; PHPSESSID=n4rbm0nva5qatce4c3jp8b8pk1' -d1 -r10 -c25
siege -u http://192.168.88.240/DVWA-1.9/vulnerabilities/exec/ --header='Cookie: security=low; PHPSESSID=n4rbm0nva5qatce4c3jp8b8pk1' -d1 -r10 -c25
test attack
siege --content-type='application/x-www-form-urlencoded' --header='Cookie: security=low; PHPSESSID=cu6ai52hnttq3s4fpvotkos3a0' -d1 -r10 -c25 'http://192.168.88.240/DVWA-1.9/vulnerabilities/exec/ POST ip=192.168.88.82&Submit=Submit'