Writer: Demonalex / Little God Email: Demonalex_at_hackermail.com Preface: Write this article Not to tell you how to do invading, but hope to remind everyone: "Invasion is accidental, but safe is not inevitable", do not neglect the operation Some small details on it. The author has always had a habit of frequently wandering some security websites. Recently, because of a chance of a chance to come to Guangzhou a famous online security company website. To be honest, this website is quite diversified, providing software downloads, there is your own forum (嘿, the interface is really good, do not know how security?). Out of the curiosity of its safety, the vitality decided to make a preliminary "safe penetration test" for it. At the beginning, just take some comprehensive network vulnerability scanning tools (X-Scan 3.0, NMAP, Retina, etc.) for information scanning, then do a result filtering, the result is only to find the other party's TCP80 port (that is, their The server only provides a normal HTTP service), without any typical vulnerability .... No play, the other party is still a one-wellnted business (because the focus of this article is not here, so network vulnerability scanner I will not explain this step by scanning this step. Is it given up? Not so easy ... Just a small god recently in sorting SQL INJECTION data, since there is now a chance to "help it" to help it test: P ------------ -------------------------------------------------- ------------------------------ Tip: Q: What is SQL injection? A: This attack is to put SQL's query / behavior commands into a legitimate HTTP submission request via the 'embedd' to reach an attacker's intention. Many dynamic web pages now get some parameters from the request from the web, and then dynamically constitute SQL requests to the database. For example, when a user needs to log in (user authentication) on the web page (user authentication), the dynamic web page will send the username and password submitted to the SQL inquiry request to the database to confirm the user. Submitted authentication information is valid. At the perspective of SQL injection attacks, we can achieve the purpose of attacking the attack by modifying the username and / or password value when sending SQL requests. For more information about SQL injection technology, please see: http://demonalex.nease.net/sql_injection/walkthrough.txt ------------------------ -------------------------------------------------- ---------------- First is the download system, just draw a tool download address: http: // The security company's website / a directory / Download/open.asp?id= 3444 ------------------------------------- ----------------------------------------- Appendix: Here the author uses Chinese instead of some Some sensitive information, please forgive me.
-------------------------------------------------- ---------------------------------------- http: // The security company's website / A directory / Download/open.asp?id=3444 'first test the other party without filtering' (single number) ...---------------------- -------------------------------------------------- ------------------ Tip: Q: How do I confirm that a website has SQL injection defects? A: First join some special character tags, entries, such as: hi 'or 1 = 1 - Find some landing page, enter the password input, or in the URL: - login: hi' or 1 = 1 --- Pass: hi 'or 1 = 1 --- http: //duck/index.asp? Id = hi' or 1 = 1 - If you want to do this type in a 'hidden', you can Download the HTML page from the website to the local hard drive, modify the value of its hidden part, such as