seth,

On Tue, May 26, 2009 at 10:28 PM, se th <[email protected]> wrote:
> 2009/5/23 Andres Riancho <andres.rianchogmail.com>:
>> Seth,
>>
>> On Fri, May 22, 2009 at 10:07 PM, se th <xd.sethgmail.com> wrote:
>>> I made a little cms to exploit it in localhost. It can be downlaoded from:
>>> http://asapload.com/222129
>>> http://www.mediafire.com/download.php?mfjntztejme
>>>
>>> MD5: 1722e37f69a919 fc60c151177c2b a99d  cms.tar.gz
>>>
>>> I used pipper to find a login zone an then I used it again to brute
>>> force the password:
>>> ------------------------------
>>> s...@debian:~/pipper/pipper$ perl pipper
>>> "http://localhost/cms/whoami/[file]"; -v file=logins.txt -hc 404
>>> ==[Options]============================================================================
>>>   Url            : http://localhost/cms/whoami/[file]
>>>   Vars           : file=logins.txt
>>>   Payloads Path  : /home/xxxxxxxx/pipper/pipper
>>>   Hide Codes     : 404
>>>   Download Page  : no (using HEADs)
>>>   Threads        : 20  - Payload : file - Aprox Requests : 12220
>>>   Response Codes : 200 OK 204 Empty 301 Mved 401 Unauth. 404 NotFound
>>> 500 SrvError
>>> ==[Begin 
>>> 17:00]========================================================================
>>>   Server         : Apache/???
>>> =======================================================================================
>>>   #00001 200 6   24 cms/whoami/
>>>   #06000 301 6=  26 cms/whoami/idiomas
>>> ==[End]================================================================================
>>> s...@debian:~/pipper/pipper$ perl pipper
>>> "http://localhost/cms/whoami/[file].php"; -v file=logins.txt -hc 404
>>> ==[Options]============================================================================
>>>   Url            : http://localhost/cms/whoami/[file].php
>>>   Vars           : file=logins.txt
>>>   Payloads Path  : /home/xxxxxxxxx/pipper/pipper
>>>   Hide Codes     : 404
>>>   Download Page  : no (using HEADs)
>>>   Threads        : 20  - Payload : file - Aprox Requests : 12220
>>>   Response Codes : 200 OK 204 Empty 301 Mved 401 Unauth. 404 NotFound
>>> 500 SrvError
>>> ==[Begin 
>>> 17:08]========================================================================
>>>   Server         : Apache/???
>>> =======================================================================================
>>>   #00310 200 6   24 cms/whoami/admin.php
>>>   #06069 200 6   24 cms/whoami/index.php
>>> ==[End]================================================================================
>>> s...@debian:~/pipper/pipper$ perl pipper
>>> "http://localhost/cms/whoami/admin.php"; pass=[file] -v file=big.txt
>>> -hw 63 -t 50
>>> ==[Options]============================================================================
>>>   Url            : http://localhost/cms/whoami/admin.php
>>>   Post Data      : pass=[file]
>>>   Vars           : file=big.txt
>>>   Payloads Path  : /home/xxxxxxxx/pipper/pipper
>>>   Hide Words     : 63
>>>   Download Page  : yes
>>>   Threads        : 50  - Payload : file - Aprox Requests : 3046
>>>   Response Codes : 200 OK 204 Empty 301 Mved 401 Unauth. 404 NotFound
>>> 500 SrvError
>>> ==[Begin 
>>> 18:37]========================================================================
>>>   Server         : Apache/???
>>> =======================================================================================
>>>   #02033 200 18  68 cms/whoami/admin.php pass=pass
>>> ==[End]================================================================================
>>> ------------------------
>>>
>>> It was very easy, of course, but I thinked it can be easiest with
>>> w3af. First I runed a scan with the two brute force plugins and some
>>> of discovery, but it never found /cms/whoami/admin.php
>>
>> The bruteforce plugins bruteforce logins, not URLs.
>>
>> The discovery plugins should be held responsible for not finding
>> /cms/whoami/admin.php . Some questions to get a general idea:
>>
>> - What target URL did you entered in w3af?
>> - Is the /cms/whoami/ directory linked from the main site?
>> - admin.php should be found with the pykto plugin, but only if you
>> enable "mutateTests", which is disabled by default because it
>> generates a lot of requests. This is the description of that
>> parameter: "Test all files with all root directories"
>>
> /cms/whoami is where I have the cms, and the URL I entered in w3af
> I didn't see mutateTests before, when I enabled it, admin.php was
> found. I stopped the scan because it takes to long with these tests,
> but works.

hmmm, ok.

This is why mutateTests is disabled by default. But it's needed... I
don't know, sometimes it's hard to decide which default is a good
default.

>>> I tried with all the plugins and it didn't worked:
>>> ----------
>>> [vie 22 may 2009 21:37:00 ART] Server uses 204 instead of HTTP 404 error 
>>> code.
>>> [vie 22 may 2009 21:37:28 ART] Your ISP has no transparent proxy.
>>> [vie 22 may 2009 21:37:28 ART] The remote HTTP Server ommited the
>>> "server" header in it's response. This information was found in the
>>> request with id 26685.
>>> [vie 22 may 2009 21:37:28 ART] webDiff plugin: You have to configure
>>> the local and remote directory to compare.
>>> [vie 22 may 2009 21:37:28 ART]
>>> [vie 22 may 2009 21:37:28 ART] **IMPORTANT** The following error was
>>> detected by w3af and couldn't be resolved: The xUrllib found too much
>>> consecutive errors. The remote webserver doesn't seem to be reachable
>>> anymore; please verify manually.
>>
>> This is another completely different problem. Are you sure that you
>> specified the target correctly?
>>
>>> [vie 22 may 2009 21:37:28 ART]
>>> [vie 22 may 2009 21:37:28 ART] Could not determine the language of the site.
>>> -----------
>>> I'm using XAMPP for linux 1.7.1
>>>
>>>
>>> has w3af a plugin to find url's bruteforcing?
>>
>> discovery.pykto
>>
>>> how can I fix the xUrllib error?
>>
>> specify the correct URL in the target =)
> I don't remember what happened with this, some day with time I will see it 
> again
>
>>
>>> was this email easy to understand?
>>
>> Completely understandable
>
> great!
>
>>
>>> I can write it in spanish if not
>>
>> Not neccesary
>>
>> Cheers,
>>
>>>
>>> ------------------------------------------------------------------------------
>>> Register Now for Creativity and Technology (CaT), June 3rd, NYC. CaT
>>> is a gathering of tech-side developers & brand creativity professionals. 
>>> Meet
>>> the minds behind Google Creative Lab, Visual Complexity, Processing, &
>>> iPhoneDevCamp asthey present alongside digital heavyweights like Barbarian
>>> Group, R/GA, & Big Spaceship. http://www.creativitycat.com
>>> _______________________________________________
>>> W3af-users mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/w3af-users
>>>
>>
>>
>>
>> --
>> Andrés Riancho
>> Founder, Bonsai - Information Security
>> http://www.bonsai-sec.com/
>> http://w3af.sf.net/
>>
>
>
> thanks for the help
>



-- 
Andrés Riancho
Founder, Bonsai - Information Security
http://www.bonsai-sec.com/
http://w3af.sf.net/

------------------------------------------------------------------------------
Register Now for Creativity and Technology (CaT), June 3rd, NYC. CaT 
is a gathering of tech-side developers & brand creativity professionals. Meet
the minds behind Google Creative Lab, Visual Complexity, Processing, & 
iPhoneDevCamp as they present alongside digital heavyweights like Barbarian 
Group, R/GA, & Big Spaceship. http://p.sf.net/sfu/creativitycat-com 
_______________________________________________
W3af-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to