burpsuite抓包数据分析

以抓到的pikachu的数据为例:

burpsuite抓包数据分析_第1张图片

POST /pikachu/vul/burteforce/bf_form.php HTTP/1.1

# POST请求  被抓包的文件  http协议是1.1
Host: www.xxx.com

#Host是主机
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:49.0) Gecko/20100101Firefox/49.0

#user-agent是浏览器的标识
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

#网页接收
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://www.xxx.com/pikachu/vul/burteforce/bf_form.php
Cookie: PHPSESSID=tofhfq9b18rl1mmbuvubcluvc0
DNT: 1
X-Forwarded-For: 8.8.8.8

#浏览器的IP地址
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 41

username=admin&password=1234&submit=Login

#POST数据的具体内容

你可能感兴趣的:(每日积累,渗透测试)