, find the first login or password to abort the break-T The number of concurrently running threads, default to 16-W Set the maximum time to timeout, in seconds, by default is 30s-V/-VShow detailed proceduresServerDestination IPServiceSpecify service name, supported services and protocols: Telnet FTP POP3[-NTLM] IMAP[-NTLM] SMB smbnt http[s]-{head|get} http-{get|post}-form http-proxy Cisco CIS Co-enable VNC
is a new term)
Currently, this tool supports the following attacks:Telnet, FTP, HTTP, https, HTTP-PROXY, LDAP, SMB, smbnt, MS-SQL, MySQL, rexec,SOCKS5, VNC, POP3, IMAP, nntp, pcnfs, ICQ, SAP/R3, Cisco auth, Cisco enable,SMTP-AUTH, SSH2, SNMP, CVS, Cisco AAA.
In any case, it is very easy to write module engines for new services, and it will not take too much time to support more services in the future.We pl
level (F)--libcurl Dump libcurl Equivalent code of this command line--limit-rate limit transfer speedLimit transfer rate, in bytes per unit (B) -l/--list-Only List names of an FTP directory (F)--local-port Num] Force use of these local port numbers-l/--locationfollow location:hints (H) --location-trusted follow location: and Send auth to other hosts (H)Access to the redirected URL, such as Access www.google.com, will return 302 redirect to www.goo
, specifying the password dictionary.-e NSOptional options,N: null password Temptation,S: Use the specified user and password heuristics.-C FILEUse colon split format, such as "Login: Password" instead of-L/-PParameters.-M FILESpecifies one line for the target list file.-o FILESpecifies the result output file.-FIn use-Mparameter, the first login or password is found to abort the hack.-T TASKSThe number of concurrently running threads, which defaults to16。-W TimeSets the maximum time-out, in seco
/sendusername"]. Value= "username"; ofields["Http://schemas.microsoft.com/cdo/configuration/sendpassword"]. value= "Password"; ofields["Http://schemas.microsoft.com/cdo/configuration/smtpauthenticate"]. value=1;
Value=0 represents anonymous Authentication mode (no validation required)
The value=1 represents the Basic authentication method (using Basic (Clear-text) authentication.
The configuration Sendusername/sendpassword or Postusername/postpassword fields are used to specify.)
VALUE=2 represe
use 127.0.0.1: 80 as a proxy for part of the traffic on the local machine (excluding wpad_exclude) all are redirected through servers running on 127.0.0.1 through Potato. This is what the local machine accesses. The data will be immediately thrown to port 127.0.0.1: 80.
Originally: 10.0.0.122> Internet
Now it is: 10.0.0.122> 127.0.0.1: 80> Internet
Potato itself has no permissions and cannot sniff data. However, after the second stage of Potato is completed, the data is directly thrown to P
default value is 3.
Loginscript: displays the path of the logon script on the Telnet server. The default location is "% SystemRoot %/system32/login. cmd". You can change the script content so that the welcome screen for logon to telnet is different.
NTLM: NTLM authentication option. The default value is 2. You can have the following values:
0: NTLM authenticatio
Accept-encoding: gzip,deflate X-A: A Accept: */* User-agent: sqlmap/1.1.10#stable (http://sqlmap.org) Connection: closeThe parameter "-V 5" is for the HTTP request packet sent by the Sqlamp output, so we could observe it.9. Identity VerificationParameters:--auth-type and--auth-credThese parameters are used for identity authentication. "--auth-type" is used
commands and codes are not suitable for use. Therefore, RFC performs. You can use the extended MTA (for example, the email server we use as an example)Execute EHLO to display the expanded command list.] Ehlo250-smtp.microsoft.com Hello [10.0.0.5]250-TURN250-ATRNDecember 250-SIZE250-ETRN250-PIPELINING250-DSN250-ENHANCEDSTATUSCODES250-8bitmime250-BINARYMIME250-CHUNKING250-VRFY250-X-EXPS GSSAPI NTLM LOGIN250-X-EXPS = LOGIN250-
Google first, found a lot of questions related to the question but there is no relevant answer, in the phpclasses also found no related classes and then he looked at the stmp of the relevant protocol side began to try Curl
SMTP protocol
This can be found on the Internet more relevant examples, you can experiment with the use of Telnet to connect to the mail server
Copy CodeThe code is as follows:
$ Telnet Mailbox SMTP Service address 25
Trying Mailbox Service IP Address ...
Connected to mailbox
-atrn250-size250-etrn250-pipelining250-dsn250-enhancedstatuscodes250-8bitmime250-binarymime250-chunking250-vrfy250-x-exps GSSAPI NTLM LOGIN250-x-exps=login250-auth GSSAPI NTLM LOGIN250-auth=login250-x-link2state250-xexch50OKAs you can see, many of the extended commands are listed in the 250 response to the EHLO command
Authentication type (base, digest, or NTLM) (Basic, Digest or NTLM)
–auth-cred=acred HTTP Authentication credentials (user name: password)
–auth-cert=acert HTTP Authentication certificate (key_file,cert_file)
–proxy=proxy using an HTTP proxy to connect to the destination URL
–proxy-cred=pcred HTTP prox
-cookie Ignore Set-cookie header information for response--user-agent=agent specifying the HTTP user-agent header--random-agent using a randomly selected HTTP User-agent header--referer=referer specifying the HTTP referer header--headers=headers line break, add other HTTP headers--auth-type=atype HTTP Authentication type (base, digest, or NTLM) (Basic, Digest or NTLM
using a randomly selected HTTP User-agent header--referer=referer specifying the HTTP referer header--headers=headers line break, add other HTTP headers--auth-type=atype HTTP Authentication type (base, digest, or NTLM) (Basic, Digest or NTLM)--auth-cred=acred HTTP Authentication credentials (user name: password)--
)————————————————————————– Bypass the WAF firewall:Sqlmap-u url-v 3–dbs–batch–tamper "space2morehash.py"1.space2hash.py 2.base64encode.py 3.charencode.py————————————————————————– Google Batch Detection injection:Sqlmap-g keywords Request::These options can be used to specify how to connect to the destination URL. –data=data data strings sent via post–cookie=cookie HTTP Cookie Header–cookie-urlencode URL encoding generated by cookie injection–drop-set-cookie Ignore Set–cookie header information
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.