SQL injection
Reprinted from: Xiaoxi of the fox
1.0 introduction
When a machine only opens 80 ports (hereby providing HTTP services), you may not give you a lot of valuable information (vulnerability information), if this machine's administrator If it is often playing Patch for his server, we have to attack the head of the attack to the web service. SQL Injection Attack is one of the web attack type. This attack has no special requirements, and only the other party provides normal HTTP services, and does not need to pay attention to whether the administrator is "Patch Mad". Such attacks are mainly for some kind of web handler such as ASP, JSP, PHP, CGI, etc.).
This article is not to introduce any new "玩", and SQL injection attack has been widely circulated. The reason why I am writing this article is because I want to record some of my experiences from my recent experiment, I hope to give readers some references. You can also find more people written by others in "9.0 I can get more related information?" The column of SQL injection techniques.
1.1 What is SQL injection?
This attack is to put SQL's query / behavior commands into a legitimate HTTP submission request via 'embedd' to achieve an attacker's intention. Many dynamic web pages now get some parameters from the request from the web, and then dynamically constitute SQL requests to the database. For example, when a user needs to log in (user authentication) on the web page, the dynamic web page will
The username submitted by the user is added to the SQL inquiry request to the database to confirm whether the authentication information submitted by the user is valid. At the perspective of SQL injection attacks, we can achieve the purpose of attacking the attack by modifying the username and / or password value when sending SQL requests.
1.2sql injection requires what (tools, etc.)?
One (some) web browser.
2.0 What information is what you need to find?
First you need to find a page that allows submission of data, such as: Landing page, search page, feedback page, and more. Sometimes, some HTML pages will pass the required parameters to other ASP pages via the post command. So, sometimes you don't see the relevant parameters in the URL path. Despite this, you can still distinguish whether there is parameter pass by viewing the "Form" tab in the source code of HTML. The relevant code is as follows: