On December 1st, Net Workers 1 Experiment "SQL Injection"

xiaoxiao2021-03-06  64

Experimental content:

Get the background management password for web applications with SQL Injection

Purpose:

Familiar with the principle of Injection, master the relevant tools, master the impact of the Injection attack

Experimental steps:

1. Understand the construction of the web application environment, this target program is "Dusty Yajitang Graphic System Boiling 3AS Modified V0.40"

2. Master the injection technique for the ordinary ASP forum / message book, learn how to judge the other party's injection point

3. Adjust your browser, guess the test target, password through the GET method

process:

Find the injection point, what kind of injection method belongs is

The table name of the burst, the field name [here is skipped from the online download program, slightly]

Gets the number of IDs and minimum records of the other party

Get minimum user name length

Get minimum username letter combination

Find the same length, content

Find the management background entrance, log in with a guess account

4, use tools such as WIS, NBSI to suspect, more manual and procedures diverse

WIS: Little bunge, ordered the command line mode

Web: Little bunge, ordered the command line mode

NBSI: Little bamboo software, the latest version 2.0, GUI interface

5. Browse IIS logs, summarize the experience and prevention method

转载请注明原文地址:https://www.9cbs.com/read-85815.html

New Post(0)