跳转至

【dirsearch bypass 403 directory scanning + JS file extraction + 403 bypass + fingerprint recognition】

dirsearch bypass 403 directory scanning + JS file extraction + 403 bypass + fingerprint recognition


💻Collection search tools + analysis🔧

🔗【 ❤️ Download ❤️ 】


Directory navigation

Introduction to dirsearch_bypass403 Run process Video demonstration Instructions for use Use screenshots Reference excellent projects download link project address Introduction to dirsearch_bypass403 During security testing, security testers can use it to enumerate directories when collecting information, and fingerprint the directories. The enumerated 403 status directories can be tried to be bypassed. Bypassing 403, it is possible to obtain administrator rights. Does not affect the original function of dirsearch

Run process dirsearch performs directory scanning—>save all directories with 403 status—>whether to perform jsfind—>yes (perform js to crawl URLs and domain names, and identify the status code of the crawled URL if it is a 403 status, then save it)— > Perform 403 bypass –> Directory for fingerprinting

403bypass : -b yes

python dirsearch.py -u "XXXX" -b yes jsfind :-j yes

python dirsearch.py -u "XXXX" -j yes jsfind and 403bypass: -b yes -j yes

python dirsearch.py -u "XXXX" -j yes -b yes Bypass the specified directory individually

python single_403pass.py -u "XXXX" -p "/index.php" # -p 指定路径 Perform fingerprint recognition on the scanned directory (the results will be automatically saved in the .josn file in the reports directory)

python dirsearch.py -u "XXXX" -z yes Use screenshots