Comments (3)
问题已解决:
01.必须使用python3
02.cheetah.py不能被修改,不能加入中文字符
03.可以运行,但是发现新问题如下
[11:54:08] [INFO] posting 343th group payload to http://192.168.36.202/xm.php
[11:54:08] [HINT] waiting for web server response
[11:54:08] [INFO] web server responds successfully
[11:54:08] [HINT] the password of http://192.168.36.202/xm.php not in 343 th group payload
Traceback (most recent call last):
File "E:\Tool\cheetah-webshell爆破\cheetah.py", line 545, in
main()
File "E:\Tool\cheetah-webshell爆破\cheetah.py", line 526, in main
attack_res = dict_attack(options)
File "E:\Tool\cheetah-webshell爆破\cheetah.py", line 356, in dict_attack
for pwd in pwd_file:
UnicodeDecodeError: 'gbk' codec can't decode byte 0xac in position 3481: illegal multibyte seq uence
from cheetah.
C:\Python34\python.exe E:\Tool\cheetah-webshell爆破\cheetah.py -u http://192.168.36.202/xm.ph
p
______ _____ ______
__________ /_ _____ _____ __ /_______ ____ /_
_ / __ _ _ _ _ _ / __ \ __ __
/ / _ / / // // // / / /_/ / _ / / /
_/ / / /_/ _/ _/ _/ _/ / / //
// //
a very fast brute force webshell password tool.
[12:29:11] [INFO] the cheetah start execution
[12:29:11] [HINT] using POST request mode
[12:29:11] [HINT] setting request interval seconds 0
[12:29:11] [HINT] using dictionary-based password attack
[12:29:11] [INFO] cracking password of http://192.168.36.202/xm.php
[12:29:11] [WARN] not specify the web server or shell type
[12:29:11] [INFO] detecting server info of http://192.168.36.202/xm.php
[12:29:11] [HINT] the shell type may be php
[12:29:12] [HINT] web server may be Apache/2.0.63 (Win32) PHP/5.2.14
[12:29:12] [HINT] web server may be x-powered-by PHP/5.2.14
[12:29:12] [WARN] you did not specify the maximum request parameter
[12:29:12] [INFO] setting the number of request parameters 1000
[12:29:12] [INFO] opening password file data/pwd.list
[12:29:12] [HINT] using password file data/pwd.list
[12:29:12] [INFO] cracking password of http://192.168.36.202/xm.php
Traceback (most recent call last):
File "E:\Tool\cheetah-webshell爆破\cheetah.py", line 545, in
main()
File "E:\Tool\cheetah-webshell爆破\cheetah.py", line 526, in main
attack_res = dict_attack(options)
File "E:\Tool\cheetah-webshell爆破\cheetah.py", line 356, in dict_attack
for pwd in pwd_file:
UnicodeDecodeError: 'gbk' codec can't decode byte 0xac in position 3481: illegal multibyte sequence
打算去试试别的:)
from cheetah.
kali下面使用非常流畅,完全没有报错,也许是我的windows下面缺少了什么东西 --!
from cheetah.
Related Issues (13)
- 加个代理功能 HOT 2
- 对于https的网站可以使用吗 HOT 2
- 当是https无法使用 HOT 1
- 可以运行,但是一运行就报错。 HOT 3
- 测试了php、asp的shell,但都无法发现密码 HOT 5
- 寻求一款自动扫描webshell软件 HOT 1
- 大马爆破
- 请求头中的值不能是int类型 HOT 1
- 闪退 HOT 1
- Invalid Syntax HOT 2
- 可以打开连接 却提示超时 HOT 1
- php 一句话问题
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from cheetah.