当前位置:网站首页>Sqqyw (indifferent dot icon system) vulnerability recurrence and 74cms vulnerability recurrence
Sqqyw (indifferent dot icon system) vulnerability recurrence and 74cms vulnerability recurrence
2022-07-06 14:11:00 【Unknown white hat】
Catalog
One 、sqqyw( Indifferent point icon system )
Select regular and case insensitive
View with variables id File contents of
To define ID Of ywX Function to perform a global search
Look at the pictures with ywX File content of function
Conduct full-text search on the obtained text
Yes sohuquan Full text tracking
Judge the echo through time blind injection
adopt sqlmap Just inject the tool
Two 、74cms Loophole recurrence
Or continue to save and monitor
sqqyw( Indifferent point icon system )
Global search keywords
Search for select
Find out select, But it's not sql Statement select, This is in the label select
Select regular and case insensitive
View with variables id File contents of
If there is garbled code, change the coding format , Can be replaced by GBK and UTF-8
To define ID Of ywX Function to perform a global search
Look at the pictures with ywX File content of function
see /php/v144.php page
Conduct full-text search on the obtained text
see domain Whether in sohuquan Inside
Yes sohuquan Full text tracking
Get the address of your website
Yes domain Full text tracking
Modify the source address
id=1
Continue searching for text
Give Way api==ok, And u,p,id It's not empty.
Go around
Statement executed
Judge the echo through time blind injection
Because in the statement sleep(3) Was executed three times , So delay 9s
So here is the injection point
adopt sqlmap Just inject the tool
python sqlmap.py -u "http://localhost/sqqyw/php/v144.php?api=ok&u=1&p=1&id=1" --batch -p "id" --current-db
74cms Loophole recurrence
Using the conditions of secondary injection :
insert update
Variable control
Enter the membership Center
Sign in / register
Create a new resume
Turn on mysql monitor
Break down 、 to update
Save and listen
update The statement in is not related to the statement we inserted ,update We didn't write it ourselves , It is the updated number of the corresponding field matched by the system , So you can't use .
Continue to save and listen
insert The data in is our choice , It's not what we inserted , So you can't use .
Or save and listen
This makes it direct update The updated , No insertion , So it doesn't work .
Or continue to save and monitor
There is insert and update, And the variables are controllable
So we can check the user name through secondary injection
insert Filtering has little effect when inserting , as long as update Just don't filter when updating .
Resume management
边栏推荐
- 实验七 常用类的使用(修正帖)
- Network layer - simple ARP disconnection
- 【MySQL数据库的学习】
- 实验六 继承和多态
- Attach the simplified sample database to the SQLSERVER database instance
- [three paradigms of database] you can understand it at a glance
- Safe driving skills on ice and snow roads
- Applet Web Capture -fiddler
- Experiment 9 input and output stream (excerpt)
- 7-1 输出2到n之间的全部素数(PTA程序设计)
猜你喜欢
Renforcer les dossiers de base de l'apprentissage
HackMyvm靶机系列(3)-visions
附加简化版示例数据库到SqlServer数据库实例中
Intensive literature reading series (I): Courier routing and assignment for food delivery service using reinforcement learning
2. First knowledge of C language (2)
记一次,修改密码逻辑漏洞实战
撲克牌遊戲程序——人機對抗
Nuxtjs quick start (nuxt2)
Hackmyvm target series (5) -warez
Strengthen basic learning records
随机推荐
7-15 h0161. 求最大公约数和最小公倍数(PTA程序设计)
Middleware vulnerability recurrence Apache
Nuxtjs quick start (nuxt2)
Strengthen basic learning records
外网打点(信息收集)
1. First knowledge of C language (1)
Harmonyos JS demo application development
Hackmyvm target series (1) -webmaster
Simply understand the promise of ES6
List and data frame of R language experiment III
SRC挖掘思路及方法
Get started with typescript
Yugu p1012 spelling +p1019 word Solitaire (string)
内网渗透之内网信息收集(二)
. How to upload XMIND files to Jinshan document sharing online editing?
UGUI—Text
Attack and defense world misc practice area (simplerar, base64stego, no matter how high your Kung Fu is, you are afraid of kitchen knives)
Experiment 7 use of common classes (correction post)
C language file operation
7-5 走楼梯升级版(PTA程序设计)