关注本公众号,长期推送技术文章
免责声明:请勿利用文章内的相关技术从事非法测试,由于传播、利用此文所提供的信息或者工具而造成的任何直接或者间接的后果及损失,均由使用者本人负责,所产生的一切不良后果与文章作者无关。该文章仅供学习用途使用!!!
前言
感谢Pwn3rz对提供的破解文件。文末附下载连接
该文件来自于网络,安全性自测,建议虚拟机使用。
更新内容
v24.1.240111130版本更新内容:
改进了Elmah安全检查,以检查Elmah的变体。
OpenCms Chemistry Solr XML外部实体(XXE)漏洞(CVE-2023-42346)。
OwnCloud phpinfo信息泄露漏洞(CVE-2023-49103)。
TorchServe管理API服务器端请求伪造(SSRF)漏洞(CVE-2023-43654)。
更新了WordPress核心和WordPress插件的漏洞信息。Ofbiz未授权远程代码执行(RCE)漏洞(CVE-2023-49070)。
F5 BIG-IP请求走私漏洞(CVE-2023-46747)。
Sitecore XP TemplateParser远程代码执行(RCE)漏洞(CVE-2023-35813)。
增加了通过PDF生成检查SSRF/LFI的功能。增加了在响应显示在PDF内时,对文件包含/路径遍历的检查。
安装教程
先安装AWVS v2024
acunetix_24.1.240111130.exe
下载后直接运行
crack_Installer.bat
出现该提示,说明破解成功
接着打开网站“https://IP:3443”
这里注意要使用https而非http
登录后即可
破解脚本内容:
@echo off & setlocal
echo
############################################################################
echo
## Acunetix - 24.1.240111130 Windows t.me/Pwn3rzs CyberArsenal.org ##
echo
############################################################################
set /a _Debug=
0
cd /d %~dp
0
:: Admin check
fltmc >nul
2
>nul || set
_
=^
"set _ELEV=1^& cd /d "
""
%cd%"
""
^&
"%~f0"
%* ^
"&&((if "
%_ELEV%"==
""
(echo Requesting administrator privileges...&((powershell -nop -c start cmd -args
'/d/x/s/v:off/r'
,$env:
_
-verb runas >nul
2
>nul) || (mshta vbscript:execute^(
"createobject("
"shell.application"
").shellexecute("
"cmd"
","
"/d/x/s/v:off/r "
"&createobject("
"WScript.Shell"
").Environment("
"PROCESS"
")("
"_"
"),,"
"runas"
",1)(window.close)"
^) >nul
2
>nul)))
else
(echo This script requires administrator privileges.& pause))&
exit
/b)
echo.
for
%%i in (
"wvsc.exe"
"license_info.json"
"wa_data.dat"
)
do
if
not
exist
"%%i"
( echo [-] %%i missing! &
goto
:ending)
if
not
exist
"%programfiles(x86)%Acunetix24.1.240111130" (
echo /// Acunetix installation directory is not default or not installed!
echo. You will need to first install Acunetix, or if you already have, then
echo. manually copy the cracked exe to whereever your install dir is.
goto:ending
)
echo /// Checking and Stopping the Acunetix services
sc query "
Acunetix
" 2>nul|find /i "
1060
" &&(
echo x Acunetix service is not installed!
echo x you need to install acunetix before using this crack
echo x exiting..
goto ending
)||(
echo # service installed, let's stop it..
)
set b=0
:acunetixservice
set /a b=%b%+1
if %b% equ 3 (
goto end1
)
echo # Stopping Acunetix services so we can crack in peace..
net stop "
Acunetix
" >nul 2>&1
net stop "
Acunetix Database
" >nul 2>&1
taskkill /im "
wvsc.exe
" /f >nul 2>&1
taskkill /im "
opsrv.exe
" /f >nul 2>&1
taskkill /im "
wvs_supervisor.exe
" /f >nul 2>&1
echo # Checking the Acunetix service status.
sc query acunetix 2>nul|find /i "
STOPPED
" >nul 2>&1 &&(
echo # service is not running. good! let's continue..
)||(
echo x service still running, trying again to stop it..
goto acunetixservice
)
goto crackit
:end1
echo x Cannot install crack since "
Acunetix
" service failed to stop.
echo x Kill it manually (opsrv.exe / wvsc.exe) then run script again.
goto ending
:crackit
echo.
echo /// Entering cracking routine
echo # copying replacement wvsc.exe..
copy /v /y wvsc.exe "
%PROGRAMFILES(x86)%Acunetixcore
" >nul 2>&1
echo # copying license files..
attrib -h -s -r -o -i -x -p -u "
%ALLUSERSPROFILE%Acunetixsharedlicense*.*
"
del /f /q "
%ALLUSERSPROFILE%Acunetixsharedlicense*.*
"
copy /v /y wa_data.dat "
%ALLUSERSPROFILE%Acunetixsharedlicense
" >nul 2>&1
copy /v /y license_info.json "
%ALLUSERSPROFILE%Acunetixsharedlicense
" >nul 2>&1
echo # setting read-only attributes..
attrib +r "
%ALLUSERSPROFILE%Acunetixsharedlicenselicense_info.json
" >nul 2>&1
attrib +r "
%ALLUSERSPROFILE%Acunetixsharedlicensewa_data.dat
" >nul 2>&1
echo # adding host file DNS entries to block telemetry..
set "
hosts=%systemroot%system32driversetchosts
"
echo.
echo.
echo #Acunetix>> "
%SystemRoot%System32driversetchosts
"
set "
list=erp.acunetix.com=telemetry.invicti.com
"
SET "
NEWLINE1=
77.88
.
55.88
"
SET "
NEWLINE2=
2
a02:
6
b8:a::a
"
echo 127.0.0.1 erp.acunetix.com>> "
%SystemRoot%System32driversetchosts
"
echo 127.0.0.1 erp.acunetix.com.>> "
%SystemRoot%System32driversetchosts
"
echo ::1 erp.acunetix.com>> "
%SystemRoot%System32driversetchosts
"
echo ::1 erp.acunetix.com.>> "
%SystemRoot%System32driversetchosts
"
echo.>> "
%SystemRoot%System32driversetchosts
"
echo %NEWLINE1% telemetry.invicti.com>> "
%SystemRoot%System32driversetchosts
"
echo %NEWLINE1% telemetry.invicti.com.>> "
%SystemRoot%System32driversetchosts
"
echo %NEWLINE2% telemetry.invicti.com>> "
%SystemRoot%System32driversetchosts
"
echo %NEWLINE2% telemetry.invicti.com.>> "
%SystemRoot%System32driversetchosts
"
icacls "
%hosts%" /grant administrators:F >nul
2
>&
1
for
/f
"delims="
%%I in (
'attrib "%hosts%"'
)
do
set
"raw=%%~I"
setlocal enabledelayedexpansion
for
/L %%I in (
0
,
1
,
18
)
do
if
not
"!raw:~%%I,1!"
==
" "
set
"attrs=!attrs!+!raw:~%%I,1! "
endlocal & set
"attrs=%attrs%"
attrib -h -s -r -o -i -x -p -u "
%hosts%"
>>
"%hosts%" (
for %%a in (%list%) do (
>NUL 2>NUL find /I "
%%a
" "
%hosts%" || echo(%NEWLINE% %%a
)
)
attrib %attrs%
"%hosts%"
echo # flushing dns settings..
ipconfig /flushdns >nul 2>&1
echo.
echo /// done
:Start
echo # Restarting Acunetix service..
net start "
Acunetix Database
" >nul 2>&1
net start "
Acunetix
" >nul 2>&1
echo # Open your browser to https://localhost:3443 or whatever you set it at install time
:ending
echo.
pause
获取方式
https://www.123pan.com/s/qDVvjv-Srkod.html提取码:NERZ
解压密码:Pwn3rzs
原文始发于微信公众号(知攻善防实验室):AWVS 2024最新版破解教程
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论