当前位置:网站首页>Sqqyw (indifferent dot icon system) vulnerability recurrence and 74cms vulnerability recurrence
Sqqyw (indifferent dot icon system) vulnerability recurrence and 74cms vulnerability recurrence
2022-07-06 14:11:00 【Unknown white hat】
Catalog
One 、sqqyw( Indifferent point icon system )
Select regular and case insensitive
View with variables id File contents of
To define ID Of ywX Function to perform a global search
Look at the pictures with ywX File content of function
Conduct full-text search on the obtained text
Yes sohuquan Full text tracking
Judge the echo through time blind injection
adopt sqlmap Just inject the tool
Two 、74cms Loophole recurrence
Or continue to save and monitor
sqqyw( Indifferent point icon system )
Global search keywords
Search for select

Find out select, But it's not sql Statement select, This is in the label select
Select regular and case insensitive

View with variables id File contents of
If there is garbled code, change the coding format , Can be replaced by GBK and UTF-8

To define ID Of ywX Function to perform a global search


Look at the pictures with ywX File content of function

see /php/v144.php page

Conduct full-text search on the obtained text

see domain Whether in sohuquan Inside
Yes sohuquan Full text tracking

Get the address of your website
Yes domain Full text tracking

Modify the source address


id=1


Continue searching for text

Give Way api==ok, And u,p,id It's not empty.
Go around


Statement executed
Judge the echo through time blind injection

Because in the statement sleep(3) Was executed three times , So delay 9s
So here is the injection point
adopt sqlmap Just inject the tool
python sqlmap.py -u "http://localhost/sqqyw/php/v144.php?api=ok&u=1&p=1&id=1" --batch -p "id" --current-db74cms Loophole recurrence
Using the conditions of secondary injection :
insert update
Variable control
Enter the membership Center

Sign in / register

Create a new resume

Turn on mysql monitor

Break down 、 to update

Save and listen


update The statement in is not related to the statement we inserted ,update We didn't write it ourselves , It is the updated number of the corresponding field matched by the system , So you can't use .
Continue to save and listen


insert The data in is our choice , It's not what we inserted , So you can't use .
Or save and listen


This makes it direct update The updated , No insertion , So it doesn't work .
Or continue to save and monitor


There is insert and update, And the variables are controllable
So we can check the user name through secondary injection



insert Filtering has little effect when inserting , as long as update Just don't filter when updating .
Resume management

边栏推荐
- 【educoder数据库实验 索引】
- 7-5 走楼梯升级版(PTA程序设计)
- Experiment 9 input and output stream (excerpt)
- 强化學習基礎記錄
- Brief introduction to XHR - basic use of XHR
- [MySQL database learning]
- 7-1 输出2到n之间的全部素数(PTA程序设计)
- It's never too late to start. The tramp transformation programmer has an annual salary of more than 700000 yuan
- Intensive literature reading series (I): Courier routing and assignment for food delivery service using reinforcement learning
- [MySQL table structure and integrity constraint modification (Alter)]
猜你喜欢

Middleware vulnerability recurrence Apache

captcha-killer验证码识别插件

Mixlab unbounded community white paper officially released

Strengthen basic learning records

Hackmyvm Target Series (3) - vues

内网渗透之内网信息收集(二)

2. First knowledge of C language (2)

Detailed explanation of network foundation routing

《英特尔 oneAPI—打开异构新纪元》

HackMyvm靶機系列(3)-visions
随机推荐
Detailed explanation of network foundation routing
7-1 output all primes between 2 and n (PTA programming)
A complete collection of papers on text recognition
Experiment five categories and objects
【头歌educoder数据表中数据的插入、修改和删除】
SRC挖掘思路及方法
Hackmyvm target series (7) -tron
"Gold, silver and four" job hopping needs to be cautious. Can an article solve the interview?
记一次api接口SQL注入实战
Simply understand the promise of ES6
实验四 数组
Force deduction 152 question multiplier maximum subarray
Callback function ----------- callback
【Numpy和Pytorch的数据处理】
HackMyvm靶机系列(6)-videoclub
Attack and defense world misc practice area (simplerar, base64stego, no matter how high your Kung Fu is, you are afraid of kitchen knives)
链队实现(C语言)
SQL injection
Record a penetration of the cat shed from outside to inside. Library operation extraction flag
Intensive literature reading series (I): Courier routing and assignment for food delivery service using reinforcement learning