HTTP data packets & request methods & status code judgment & brute force encryption password & exploiting data packets

0 29
PrefaceI am a beginner in network security who has been studying for two years....

Preface

I am a beginner in network security who has been studying for two years. Thinking that I haven't studied systematically in the past two years, so I thought I would take a look at Xiao Di's course and combine my own understanding with Xiao Di's course, presenting it to everyone in the form of text + pictures. After watching Xiao Di's course, I really think that Xiao Di's course is the best! -- I watched the video from 2024

Learning Content

【Basic Entry】Day 10: HTTP Data Packets & Postman Construction & Request Methods & Request Header Modification & Status Code Judgment

HTTP data packets & request methods & status code judgment & brute force encryption password & exploiting data packets

Learning Address:【Xiao Di Security】Full Stack Network Security | Penetration Testing | Advanced Red-Blue Antagonism V2024 Latest Version (Complete) _ Bilibili

Learning Outline

1737982103_679780971230c0f144de6.png!small?1737982091015

1737982125_679780adcc0547c0b4978.png!small?1737982114274

Let's get started formally

Knowledge Point 1: HTTP Data Packets

The so-called man-in-the-middle attack we often talk about is actually a very simple thing. For example, the packet capture software we learned in our previous course, we can modify the data packet we captured, and thus complete an attack. For example: browser clicks on a feature point -> BP tool intercepts this data packet -> BP tool modifies this data packet -> sends it to our computer (server) -> our computer (server) sends it to BP tool -> BP tool sends it to the browser. This completes a man-in-the-middle attack~

1737982255_6797812fb1d9c8573ee60.png!small?1737982243768

Then the most common data packets we have are: GET data packets, POST data packets. What is the difference between these two data packets? The simplest difference is their location. GET data packets occur when we access the page, such as clicking on a feature point, clicking on different pages, etc., while POST data packets occur when we submit data, such as avatar upload, password modification, login, etc.

1737982283_6797814b57f48d3f250f2.png!small?17379822723431737982369_679781a1c96fa342691be.png!small?1737982357821

How to capture these data packets? 1. Use the built-in traffic capture of the browser 2. Use traffic interception tools for capture

The built-in traffic capture of the browser can be opened by clicking F12 in the browser.

1737983075_6797846316224e21d0807.png!small?1737983063118


If you want to set the console at the bottom, you can do so.

1737983306_6797854a5a782115286ae.png!small?1737983294327

When we search for python, we can see that there are various data packets here, which are the various data packets generated by this search function.

1737983135_6797849f2a4fceb67a580.png!small?1737983123179

1737983372_6797858c246b87e8ad6c3.png!small?1737983360268


As we can see, we are using the GET request for our search.

The second feature of the GET request also appeared, as we can see from our URL, there are many parameters: q=, qs=, etc., which is the second feature of the GET request, the parameters of the request are on the URL, that is, what specific parameters are used.

Some masters are puzzled, isn't it said on the internet that GET requests cannot pass parameters? This is a wrong statement, the most accurate statement should be that GET requests cannot pass large data parameters, that is, a large number of parameters, which means that it can pass parameters~

Of course, there may be newbies who ask how to know which data packet is GET and which is what. Don't worry, we will talk about it later. For now, just understand what a GET request is.

Here we use the BP tool for demonstration, if you don't understand how to use the BP tool, you can checkSixth day course

Example:

1737984360_6797896889e695a44dc59.png!small?1737984348744

1737984405_67978995f3829b6d1dff9.png!small?1737984394200

As you can see, simply accessing the domain name is a GET request without parameters

If we add parameters, they will also be reflected in the tool.

1737984447_679789bfc18408b77051b.png!small?1737984436704

1737984461_679789cd32ae8b7fdfbe9.png!small?1737984449464


POST request

1737983771_6797871b853dac930d709.png!small?1737983759739

Can you see the difference? The difference is very simple, you can tell whether it is a POST request by whether there are parameters in the body.

This is a summary of POST and GET requests, and other requests can be ignored for the time being

1737984123_6797887be8ffe5303eca5.png!small?1737984112223

What are the request header information? We can get to know the common ones

1737984684_67978aac652b17d6f0eec.png!small?1737984672602

Summary:

This knowledge point allows us to understand the basic structure of data packets, request header + body part. It also allows us to distinguish the most common GET requests and POST requests in our penetration testing. In terms of security, POST requests are relatively safer. Of course, through the study of this lesson, we can actually capture and modify the parameter part of the POST request with tools, so there is no difference in security. The difference between GET and POST requests is that the size of the transmitted data is different, and whether the parameters are in the URL is different. It is worth noting that POST requests and GET requests can coexist (of course, this is not very rigorous, but this understanding will be simpler), that is, there are parameters in the URL and parameters in the body, which is what we call the coexistence of POST requests and GET requests.

Knowledge point two: The difference between mobile data packets and computer data packets

We will not capture the emulator data packets and PC terminal data packets, please refer to the sixth dayArticle

The mobile Baidu page is obviously different from the PC page, so how do they judge? Answer: User-Agent header

1737984922_67978b9ac897eee3fd8b6.png!small?1737984917833

Mobile data packet, Android

1737987689_67979669b7d7362d2537c.png!small?1737987678102

Computer data packet, Windows

1737986603_6797922b791c601e60a34.png!small?1737986593386

You can see that the User-Agent header is the main difference

Can you see the mobile interface with the browser? Answer: Yes

Just change it to:1737988139_6797982ba71c299ce2a1a.png!small?1737988129536

The requested address is the same, we will replace the entire request packet with a mobile phone

你可能想看:

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

ExploitPack (cracked) is an offensive penetration tool that includes 0day and a large number of undetectable exploit programs.

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

Different SRC vulnerability discovery approach: Practical case of HTTP request splitting vulnerability

How to decrypt the encrypted data of the mini-program without conducting an audit

API Attack Analysis: Hackers exploit a large number of IPs for low-frequency crawling of sensitive data.

Detailed explanation of house of emma exploitation techniques (analysis of 21 Huxiang Cup instances)

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

最后修改时间:
admin
上一篇 2025年03月30日 01:04
下一篇 2025年03月30日 01:27

评论已关闭