当前位置:网站首页>Using sqlmap injection to obtain the account and password of the website administrator
Using sqlmap injection to obtain the account and password of the website administrator
2022-04-23 09:20:00 【Partition CC】
1、 Cross site scripts
principle : It refers to that the attacker uses the website program to filter the user input insufficiently , Input can be displayed on the page to affect other users HTML Code , So as to steal user information 、 An attack that uses the user's identity for certain actions or virus attacks on the visitor .
(1)GET Mode cross site script
Because some websites will <script> Tags are filtered , If there is no pop-up display 1234 Alarm box , Right click on the returned page , View page source code . Check whether the web source code contains the complete <script>alert(1234)</script> character string , In this way, whether there is a pop-up display or not 1234 Alarm box , All indicate that there are cross site scripting vulnerabilities .
(2)POST Mode cross site script
post Same as above , Generally, you can use hackbar The plug-in Enable Post data Insert validation content .
2、 Frame injection 、 Link Injection
principle : Framework injection is an all based approach GUI Browser attacks , It's because the script doesn't validate them correctly , It is possible for attackers to inject frame or iframe Mark .
Link injection is the act of modifying the content of a site , The way is to transfer the information of the external site URL Embedded in , Or there will be scripts in vulnerable sites URL Embedded in . take URL Embedded in vulnerable sites , Attackers can use it as a platform to launch attacks on other sites , And attack the vulnerable site itself .
The specific methods : Through the analysis of get The submitted url Frame or link injection with parameters in , Inject into parameters id
3、 allow TRACE Method
principle :TRACE The method is HTTP A protocol debugging method of protocol definition , This method makes the server return the content requested by any client as it is . The attacker took advantage of TRACE request , Combined with other browser side vulnerabilities , Cross site scripting attack is possible , Get sensitive information , such as cookie Authentication information in , This sensitive information will be used for other types of attacks .
4、Struts2 Remote command
principle : As the bottom template of website development , Is the most widely used Web One of the application frameworks .
One type of vulnerability is a remote code execution vulnerability when using an abbreviated navigation parameter prefix , Common are Struts2 Remote command execution S2-045、Struts2 Remote command execution S2-016、Struts2 Remote command execution S2-019、Struts2 Remote command execution S2-033、Struts2 Remote command execution S2-037.
5、Struts2 URL Jump S2-017
principle :Struts2 URL Jump S2-017, yes Struts2 The second type of vulnerability of remote command , Is an open redirection vulnerability when using the abbreviated redirection parameter prefix .
Sqlmap Injection command common table
1.-u # Injection point
- -f # Fingerprint identification database type
- -b # Get database version information
- -p # Specify testable parameters
- -D "" # Specify the database name
- -T "" # The designation indicates
- -C "" # Specified field
- --level=(1-5) # The level of testing to be performed
- --risk=(0-3) # The level of risk to be performed
- --data # adopt post send data
- --columns # List fields
- --current-user # Get the current user name
- --current-db # Get the current database name
- --users # List all users of the database
- --passwords # All passwords of database users
- --privileges # View user permissions (--privileges -U root)
- -U # Specify the database user
- --dbs # List all databases
- --tables -D "" # Lists the tables in the specified database
- --columns -T "user" -D "mysql" # List mysql In the database user All fields of the table
- --dump-all # List all databases, all tables
- --exclude-sysdbs # Only the new databases and tables created by users are listed
- --dbms # Specify database
- --os # Specify the operating system
- --is-dba # Whether you are a database administrator
- --union-check # Do you support union Inject
- --union-use # use union Inject
- --cookie "" #cookie Inject
- --user-agent # Customize user-agent
- --string="" # string matching
- --sql-shell # Execute assignment sql Inject
- --file-read # Read the specified file
- --file-write # Write to local file
- --os-cmd-id # Execute system commands
- --os--pwn # rebound shell
utilize sqlmap Attack injection
SQL Injected vulnerability verification
principle : finger web The application does not judge or filter the validity of the user's input data , Attackers can web Add extra... At the end of a predefined query statement in the application SQL sentence , In this way, the database server is cheated to execute any unauthorized query , Get database information .
1. This time, we chose the actual combat of a shooting range
stay kali Internal utilization sqlmap Verify that... Exists SQL Inject holes
3. Launch an injection attack
It's reported 2 A database
4. Burst the database and then report the form The form is also reported 2 The forms of the two databases are
To get the user name, account and password, you need to judge
Generally, the account and password of the user name are in admin Inside
5. Try to do admin Field injection into the form
Injection found that the user name is saved And password fields
6. Explain how to get the user name
Blast again Found that the user name has burst out
7. Get administrator user password
Burst the password It's three lines cmd5 The ciphertext of Decrypt the ciphertext You get the administrator password
8. Decrypt password Blast it out. You can search here cmd5 To decrypt . There is no demonstration here
Get injection command wx Focus on :( Tianyin security ) reply : Inject Free access to
版权声明
本文为[Partition CC]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230630141825.html
边栏推荐
- LGB, XGB, cat, k-fold cross validation
- Base de la technologie électronique numérique 3.1 aperçu du circuit de porte, 3.2 circuit de porte à diode semi - conductrice
- Trc20 fund collection solution based on thinkphp5 version
- 资源打包关系依赖树
- [in-depth good article] detailed explanation of Flink SQL streaming batch integration technology (I)
- Brush classic topics
- Go language learning notes - language interface | go language from scratch
- Go language learning notes - structure | go language from scratch
- ASUS laptop can't read USB and surf the Internet after reinstalling the system
- Rembg split mask
猜你喜欢
Experimental report on analysis of overflow vulnerability of assembly language and reverse engineering stack
Leetcode-199 - right view of binary tree
Kettle experiment conversion case
Kettle experiment (III)
Pctp test experience sharing
What is augmented reality technology? Where can it be used?
[58] length of the last word [leetcode]
How to protect open source projects from supply chain attacks - Security Design (1)
Kettle实验 (三)
First principle mind map
随机推荐
[in-depth good article] detailed explanation of Flink SQL streaming batch integration technology (I)
Number of islands
node安装
Kettle experiment (III)
Group Backpack
[indexof] [lastIndexOf] [split] [substring] usage details
[reading notes] Chapter 5 conditional statements, circular statements and block statements of Verilog digital system design tutorial (with answers to thinking questions)
資源打包關系依賴樹
Failed to prepare device for development
[original] use system Text. JSON formats the JSON string
Find the sum of simple types of matrices
LeetCode_DFS_中等_1254. 统计封闭岛屿的数目
108. Convert an ordered array into a binary search tree
OpenCV中的图像处理 —— 轮廓入门+轮廓特征
JS prototype chain
Flink reads MySQL and PgSQL at the same time, and the program will get stuck without logs
Harbor enterprise image management system
STM32 and FreeRTOS stack parsing
Valgrind et kcachegrind utilisent l'analyse d'exécution
Arbre de dépendance de l'emballage des ressources