感谢 代码描绘人生 的指点
burpsuite的intruder模块可以用于暴力破解
示例一

burpsuite_intruder_caught.png

burpsuite_intruder_attack_type1.png

burpsuite_intruder_attack_type2.png

burpsuite_intruder_payload_set.png

burpsuite_intruder_payload_set_variable1.png

burpsuite_intruder_payload_set_variable2.png

burpsuite_intruder_payload_processing_rule.png

burpsuite_intruder_start_attack.png

burpsuite_intruder_attack_interface.png

burpsuite_intruder_screening_attack_results.png

burpsuite_intruder_attack_results.png
示例二

burpsuite_intruder1.png

burpsuite_intruder2.png

2461408-edf13700ea8c3632.png

burpsuite_intruder4.png

burpsuite_intruder5.png

2461408-d3516344e60fa252.png

burpsuite_intruder7.png

burpsuite_intruder8.png