Open dongfangyuxiao opened 6 years ago
运行 python run.py 8899后,出现 root@localhost:~/pentest/exp/OCIFT# python run.py 8899 ##########################################################
##########################################################
Named From: OCIFT(OS Command Injection Fuzzy Tool) Referer: https://github.com/commixproject/commix https://www.owasp.org/index.php/Command_Injection Instructions: 1、python osift.py 8081 (开启8081作为代理端口) 2、浏览器设置通过代理地址: http://127.0.0.1:8081进行访问 3、测试结果会记录在日志文件里,默认: rce_success_results.txt
[+] Load configuration file... [+] Initialize Payloads... [+] we have 360 payloads [+] Start Fuzzing Threads... [+] Everything is ready. [*] Starting HTTP proxy at: http://127.0.0.1:8899 已终止
自动终止,求解答!!!感谢。
@dongfangyuxiao 没有错误信息吗?8899端口是不是被占用了?Tornado安装了么?
我也是自动终止,Tornado安装了。没有报错,不知道什么情况
运行 python run.py 8899后,出现 root@localhost:~/pentest/exp/OCIFT# python run.py 8899 ##########################################################
____ ___ __
/ \ / ____/ | | | _ | |___|
/ / \ \ / / | | | |_ | |
| _ / / | \ __ | | | _| | |
\ / \ _ / || |_| |___| v1.0
##########################################################
一个半自动化命令注入漏洞Fuzz工具
Named From: OCIFT(OS Command Injection Fuzzy Tool) Referer: https://github.com/commixproject/commix https://www.owasp.org/index.php/Command_Injection Instructions: 1、python osift.py 8081 (开启8081作为代理端口) 2、浏览器设置通过代理地址: http://127.0.0.1:8081进行访问 3、测试结果会记录在日志文件里,默认: rce_success_results.txt
[+] Load configuration file... [+] Initialize Payloads... [+] we have 360 payloads [+] Start Fuzzing Threads... [+] Everything is ready. [*] Starting HTTP proxy at: http://127.0.0.1:8899 已终止
自动终止,求解答!!!感谢。