当前位置:网站首页>SRC mining ideas and methods
SRC mining ideas and methods
2022-07-06 13:48:00 【One call yyds】
Recently, I found that many small partners who have just come into contact with infiltration do not know the secret of actually digging holes , So I'm going to write some tips for digging holes by myself .
src It is recommended that novices dig holes in the preferred vulnerability box , Because the vulnerability box has a wide range , All domestic sites receive . Compared with other src platform , Mining is very suitable for novices .
Vulnerability mining , Information gathering is important .
Here we will explain with some actual combat .
First of all, let's talk about Google grammar !!!
The following can be done by fofa、 Zhong Kui's eyes 、shodan Wait for cyberspace search engines to search Google Mirror image .
# SQL Injection and hole digging are basically smooth
1. Look for loopholes , Through basic site:、inurl: Google Syntax .
2. Find a site , Various points , Find his injection point .
3. Injection point not found , information gathering .
4. Then there are some column operations .
open Google Mirror image , Enter our Google syntax site:.com company .
In this way, you will get the domain name with .com Is the suffix related company name , The meaning of adding a company after it is to specify the company name for screening .
Google Syntax , Search through Google browser :site:.com inurl:php?id=22 company
And here we add php?id=22, Because the core of our injection point is to transmit parameters , Therefore, it will be easier to find loopholes by searching for participants .
Now we find a website to test .
First we enter single quotation marks : ' , Look, the page has changed .
This means that the single quotation mark we entered is executed , There was a misreport . There is a great possibility that SQL Inject .
Further use ,and 1=1 && and 1=2, Verify whether the vulnerability exists .
there and 1=1, The page is normal , But in and 1=2 When , The page is echoed normally , Further verify .
We continue to use SQL Statement function , Come to the conclusion , We were blocked by the website firewall .
Did not bypass the website firewall , Try the inline annotation method casually here , Execution succeeded . It's too cumbersome to bypass the firewall , I'll do more , For starters , If you encounter a firewall, you can retreat directly .
Find a station below , Enter single quotes ', Page exception , We look for input and 1=1 | 1=2, Find out 1=2 abnormal .
It indicates that the function we input is executed by the database , There is SQL Inject .
The vulnerability has been tested , Next, let's see if we can verify the vulnerability . On SQL sentence , We use order by 11 | order by 12.
order by 11 The page is normal , and order by 12 Page exception ( That there is 11 A field ).
Then we use SQL sentence , It is found that there is a Boolean blind note , Boolean blind note query data is cumbersome , Just throw it here SQLmap ran .
sqlmap command :Python sqlmap.py -u The goal is URL --dbs( Specify the name of the target database ), Finally, the library name is successfully obtained .
Digging a hole is so easy ,SQL There are still a lot of injections , encounter waf, Those who have ideas can try to bypass .
XSS Loophole
Generally, check whether there is a message board through the searched site , Try blind typing XSS, Generally one XSS Medium risk , Build... Directly xss sentence :<script>alert(1)</script>, Just insert it directly in the box , Pop up and submit directly src The platform is ok .
XSS General message board !!!
Weak password vulnerability mining
Weak password Google syntax :inurl:admin/login.php company .
In this way, you can search the backstage of many companies .
Entering the background, you can use tools to blast weak passwords in batches , Such as admin/111111 etc. , You can also view js Code to check whether there is an account password .
You can use or build your own weak password blasting tool , There are many such tools , I won't elaborate more .
Some verification codes are arranged , There is also a verification code that will not change if you catch the package .
These are all excavations src Compare the recommended vulnerabilities , I wish you all to be on the list as soon as possible !!!
边栏推荐
- The difference between overloading and rewriting
- Reinforcement learning series (I): basic principles and concepts
- 2.初识C语言(2)
- 7-3 构造散列表(PTA程序设计)
- [面试时]——我如何讲清楚TCP实现可靠传输的机制
- 稻 城 亚 丁
- [the Nine Yang Manual] 2020 Fudan University Applied Statistics real problem + analysis
- 1.C语言初阶练习题(1)
- Miscellaneous talk on May 27
- 2.C语言矩阵乘法
猜你喜欢
一段用蜂鸣器编的音乐(成都)
2022泰迪杯数据挖掘挑战赛C题思路及赛后总结
7-7 7003 组合锁(PTA程序设计)
MATLAB打开.m文件乱码解决办法
ABA问题遇到过吗,详细说以下,如何避免ABA问题
MySQL事务及实现原理全面总结,再也不用担心面试
Have you encountered ABA problems? Let's talk about the following in detail, how to avoid ABA problems
[au cours de l'entrevue] - Comment expliquer le mécanisme de transmission fiable de TCP
(原创)制作一个采用 LCD1602 显示的电子钟,在 LCD 上显示当前的时间。显示格式为“时时:分分:秒秒”。设有 4 个功能键k1~k4,功能如下:(1)k1——进入时间修改。
C language Getting Started Guide
随机推荐
[hand tearing code] single case mode and producer / consumer mode
重载和重写的区别
【九阳神功】2017复旦大学应用统计真题+解析
C语言实现扫雷游戏(完整版)
优先队列PriorityQueue (大根堆/小根堆/TopK问题)
7-8 7104 约瑟夫问题(PTA程序设计)
Programme de jeu de cartes - confrontation homme - machine
Relationship between hashcode() and equals()
Pit avoidance Guide: Thirteen characteristics of garbage NFT project
3. Number guessing game
C language Getting Started Guide
4.分支语句和循环语句
(original) make an electronic clock with LCD1602 display to display the current time on the LCD. The display format is "hour: minute: Second: second". There are four function keys K1 ~ K4, and the fun
Beautified table style
[the Nine Yang Manual] 2021 Fudan University Applied Statistics real problem + analysis
5.函数递归练习
[modern Chinese history] Chapter 6 test
C语言入门指南
简单理解ES6的Promise
仿牛客技术博客项目常见问题及解答(三)