当前位置:网站首页>Network security database penetration of secondary vocational group in 2022
Network security database penetration of secondary vocational group in 2022
2022-06-24 18:23:00 【ruihack】
First, let's take a general look at the topic :
The first topic :

To find the web Infiltration interface of :
Let's not hurry , First use nmap Scan it. :

Found to have 80 port , Now let's visit the website :

Find this interface , If you do more, you will know , The appearance of this interface indicates that the background directory is hidden , We got a dictionary here :

Using this dictionary, we can explode its background directory :

You can see that there are two directories :

Through the interview, we found that index2.php Is a suspicious Directory :

Submit successfully .
Let's take a look at the second topic :

Ask to view the name of the database , Most people now think definitely using sqlmap For a meal output , But now if you use sqlmap Will collapse . So now we must try to inject manually . Therefore, the secondary vocational group must also learn about manual injection .

Through judgment, it is found that it is an injection of a string .
Next, we determine how many fields there are :

It is found that an error is reported , Description there are three fields , Now we can look at the topic :
The title requires the name of the database :
Let's first look at which field can be used :

Find out 1 and 2 Both can be used. :
So let's start injecting :

The database is successfully injected :

Submit successfully .
Now let's look at the third question :

The number of fields required to enter and exit the database :
We've just injected it , So we submit directly :

Submit successfully .
Look at question 4 :
Ask for the table name of the user :

The table name is successfully injected , The name of the table where the user exists is users:

Submit successfully .
Let's move on to the next topic
:
5. Via local PC Penetration test platform in KALI2020 Test the target SQL Injection attack , Get the database information of the target , Will be used to store WEB Landing user admin The user's ciphertext password is used as FLAG Submit .
requirement admin Of md5 password :
We are operating on the basis of the table name :

Inject fields based on the table :

Admin The password of the ciphertext will come out :

Let's move on to the next topic :

Ask for the version number of the data :
We then inject :

The version number has also been successfully injected :

This topic needs environment. You can confide in me .
边栏推荐
- 股票网上开户安全吗?应该怎么办理?
- Using flex to implement common layouts
- Welcome to the network security threat information sharing program
- Mengyou Technology: tiktok current limiting? Teach you to create popular copywriting + popular background music selection
- PHP WMI get hostname
- Wechat applet to realize stacked rotation
- Top ten popular codeless testing tools
- The country has made a move! Launch network security review on HowNet
- [can you really use es] Introduction to es Basics (I)
- Php7.4.28 installing the pcntl extension
猜你喜欢

Considerations for it project demand analysis

How to decompile APK files

Five skills of selecting embedded programming language
[quick news] the jeecgboot low code platform was successfully selected into the 2021 scientific innovation China · open source innovation list

How can an enterprise successfully complete cloud migration?
What if the database table structure changes? Smartbi products support one click synchronization

Flutter dart regular regexp special characters $, () (IV)

NVM download, installation and use
Using flex to implement common layouts

How MySQL works - Chapter 14
随机推荐
Cloud service selection of enterprises: comparative analysis of SaaS, PAAS and IAAs
He "painted" what a smart city should look like with his oars
Implementation of pure three-layer container network based on BGP
腾讯云荣获“可信云技术最佳实践-虚拟化”
Provide secure and convenient Oracle solutions for smart contract developers
Three indicators to help you measure the effectiveness of digital transformation
[golang] leetcode intermediate - jumping game & different paths
Exception: Gradle task assembleDebug failed with exit code 1
You don't know about this inspection platform. It's a big loss!
中电投先融期货这家公司怎么样?期货开户办理安全吗?
基于BGP实现纯三层容器网络方案
视频平台如何将旧数据库导入到新数据库?
Six configuration management tools that administrators must know
[untitled]
Top ten popular codeless testing tools
How does the video platform import the old database into the new database?
Error reported after NPM I
Go language GC implementation principle and source code analysis
About swagger
投资理财产品的钱能随时取出来吗?