Network attack Test--sql injection

Source: Internet
Author: User

SQL Injection, because the program in the actual use, in order to manage the huge data information, it will be used to the database. The database can be easily stored and classified by the program for all the data information, so as to facilitate the query and update. Users in the use of the program, the program can automatically through the database query, the information obtained in accordance with a certain format feedback to the user, while the user is also through the Interactive dialog box submitted to the program data, so that the program according to the information users want to query, feedback to the user want information.

The dangers of cyber security attacks are:
General intrusion Network attack scanning technology denial of service attack technology buffer overflow backdoor technology Sniffer Technology virus Trojan
Network security technology, from proxy server, network address translation, packet filtering to data encryption anti-attack, anti-virus trojan and so on.

Therefore, we have a typical SQL injection test, for the following purposes:

§ 1. Enhance Safety Awareness

§ 2. Mastering Professional Knowledge

§ 3, improve hands-on practical ability

§ 4. Combining Theory with practice

§ 5, Division of labor, improve team awareness

first sign in to the target page, click the Teaching team option

650) this.width=650; "title=" 1.JPG "style=" float:none;width:750px;height:570px; "height=" 719 "src=" http:/ S3.51cto.com/wyfs02/m00/4b/45/wkiol1qpapscyybtaaeo6lb98pc739.jpg "width=" "alt=" Wkiol1qpapscyybtaaeo6lb98pc739.jpg "/>

Then click on open page, add command in Address bar Union select 1,username,3,password,5 from admin where username= ' admin ';

650) this.width=650; "title=" 2.JPG "style=" float:none;width:749px;height:628px; "height=" 656 "src=" http:/ S3.51cto.com/wyfs02/m00/4b/45/wkiol1qpapswfnzjaado_5bzvoq444.jpg "width=" "alt=" Wkiol1qpapswfnzjaado_ 5bzvoq444.jpg "/>

Then go to the Web page, This time the page shows the user named admin Password

650) this.width=650; "title=" 3.JPG "style=" float:none;width:745px;height:490px; "height=" 591 "src=" http:/ S3.51cto.com/wyfs02/m00/4b/43/wkiom1qpamqx-se6aarrbifka38652.jpg "width=" 1151 "alt=" Wkiom1qpamqx-se6aarrbifka38652.jpg "/>

§ Copy this password, online query MD5 code decryption

650) this.width=650; "title=" 4.JPG "style=" float:none;width:743px;height:643px; "height=" 514 "src=" http:/ S3.51cto.com/wyfs02/m01/4b/45/wkiol1qpapwr7rsmaaxezpi2lfo994.jpg "width=" 995 "alt=" Wkiol1qpapwr7rsmaaxezpi2lfo994.jpg "/>

§ Login URL Background login http://10.0.200.111/admin/admin.asp, enter the account password

650) this.width=650; "title=" 6.JPG "style=" FLOAT:NONE;WIDTH:788PX;HEIGHT:656PX; "height=" 586 "src=" http:/ S3.51cto.com/wyfs02/m00/4b/43/wkiom1qpamugunwdaak6nihnixs580.jpg "width=" 992 "alt=" Wkiom1qpamugunwdaak6nihnixs580.jpg "/>

Go backstage and add content to the industry trend Bar

650) this.width=650; "title=" 7.JPG "style=" FLOAT:NONE;WIDTH:864PX;HEIGHT:559PX; "height=" 504 "src=" http:/ S3.51cto.com/wyfs02/m02/4b/45/wkiol1qpapbjxlbhaav_fbohrj8865.jpg "width=" 905 "alt=" wKioL1QpApbjxLBHAAV_ Fbohrj8865.jpg "/>

§ go back to the home page and see what's added now

650) this.width=650; "title=" 8.JPG "style=" FLOAT:NONE;WIDTH:877PX;HEIGHT:536PX; "height=" 406 "src=" http:/ S3.51cto.com/wyfs02/m01/4b/45/wkiol1qpapacx5aoaaeua-qsnwa903.jpg "width=" 940 "alt=" Wkiol1qpapacx5aoaaeua-qsnwa903.jpg "/>

Test complete

650) this.width=650; "title=" 9.JPG "style=" float:none;width:880px;height:525px; "height=" 394 "src=" http:/ S3.51cto.com/wyfs02/m01/4b/43/wkiom1qpamza3yn0aarttzdtu0m163.jpg "width=" 868 "alt=" Wkiom1qpamza3yn0aarttzdtu0m163.jpg "/>

The above is the whole process of testing and some of them, the test is only to check the site security and testing site for individuals in the personal intranet site, non-commercial sites, I hope you do not use SQL injection technology to invade others site, but also hope that this blog can bring you help! Thank you!

This article is from the "a group" blog, make sure to keep this source http://8828635.blog.51cto.com/8818635/1559424

Network attack Test--sql injection

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.