使用BurpSuite来进行sql注入

使用BurpSuite来进行sql注入

入侵渗透hacker2015-09-15 6:15:2311903A+A-

BurpSuite之SQL Injection

[平台]:mutillidae

[工具]BurpSuite 1.4.07 + FireFox

1:安装配置mutillidae

如果遇到问题,开下面的帖子.

http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10

2:SQL Injection测试

选择“OWASP Top 10″ —>> ”A1 – Injection” —>> ”SQLi – Extract Data” —>> ”User Info”,如下:


进入以下界面,如图:


单引号检测Name对应表单,返回如下:


利用常见的手段进行注入,

1.order by

2.UNION

3.SELECT

….

关于如何手动注入,在此略过.

废话了半天,下面直接看Burp Suite的应用.






如果想要熟悉Burp Suite的使用,一定要搞清楚它的几种检测模式.

假设有下面字典,利用上面四种方式,分别完成测试:


seover" style="box-sizing:border-box;margin:12px 0px;padding:0px;font-family:Monaco, MonacoRegular, 'Courier New', monospace;vertical-align:baseline;width:620px;color:#333332;white-space:normal;height:auto;border:1px solid #DEDEDE !important;overflow:hidden !important;position:relative !important;direction:ltr !important;line-height:15px !important;background-image:initial;background-attachment:initial;background-color:#F8F8FF !important;background-size:initial;background-origin:initial;background-clip:initial;background-position:initial;background-repeat:initial;">

Default


1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30



username ——-password



user002 ——– pwd002



user003 ——– pwd003



user002 ——– pwd002



sniper  ——payload 数为1



----- username/password -------- sniper 测试过程【%username%---表示测试变量,也就是字典值】



-----%username%/password



-----username/%password%



user001 ------- password



user002 ------- password



user003 ------- password



....



username ---- user001



username ---- user002



username ---- user003



....



battering ram ———–payload 数为1



------username/password ------- battering ram 测试



------%username%=%password%---->%username%/%password%



user001 ------- user001



user002 ------- user002



user003 ------- user003



pitchfork



-----username/password ------- pitchfork 测试



user001 -------- pwd001



user002 -------- pwd002



user003 -------- pwd003



...  ---------------- ....<span style="background-color:white;"> </span>



cluster bomb



-------username/password ---------- cluster bomb 测试


 

============================================================

如果还是意犹未尽,www.91ri.org 建议大家去Youtube上看一下关于mutillidae的系列视频,个人觉得那套教程很详细的介绍了Burp Suite的使用.在此仅列出一部分:


seover" style="box-sizing:border-box;margin:12px 0px;padding:0px;font-family:Monaco, MonacoRegular, 'Courier New', monospace;vertical-align:baseline;width:620px;color:#333332;white-space:normal;height:auto;border:1px solid #DEDEDE !important;overflow:hidden !important;position:relative !important;direction:ltr !important;line-height:15px !important;background-image:initial;background-attachment:initial;background-color:#F8F8FF !important;background-size:initial;background-origin:initial;background-clip:initial;background-position:initial;background-repeat:initial;">

Default


1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17



mutillidae-finding-comments-and-file-metadata-using-multiple-techniques



mutillidae-demo-usage-of-burp-suite-comparer-tool



mutillidae-brute-force-page-names-using-burp-intruder-sniper



mutillidae-using-burp-intruder-sniper-to-fuzz-parameters



mutillidae-how-to-install-and-configure-burp-suite-with-firefox



mutillidae-basics-of-web-request-and-response-interception-using-burp-suite



mutillidae-three-methods-for-viewing-http-request-and-response-headers



mutillidae-basics-of-burp-suite-targets-tab-and-scope-settings



mutillidae-how-to-bypass-maxlength-restrictions-on-html-input-fields



mutillidae-manual-directory-browsing-to-reveal-mutillidae-easter-egg-file



mutillidae-two-methods-to-bypass-javascript-validation



mutillidae-basics-of-sql-injection-timing-attacks



mutillidae-how-to-exploit-local-file-inclusion-vulnerability-using-burp-suite



mutillidae-analyze-session-token-randomness-using-burp-suite-sequencer



mutillidae-use-burp-suite-sequencer-to-compare-mutillidae-csrf-token-strengths



mutillidae-spidering-web-applications-with-burp-suite



mutillidae-bypass-authentication-using-sql-injection


参考:http://www.freebuf.com/articles/5560.html


小结:

本文以Intruder的Sniper模式进行实例说明,介绍Burp Suite Intruder功能下singer,battering ram,pitchfork,cluster bomb.是怎么运作的.


点击这里复制本文地址 以上内容由黑资讯整理呈现,请务必在转载分享时注明本文地址!如对内容有疑问,请联系我们,谢谢!
  • 3条评论
  • 嘻友澉约2022-05-29 06:52:40
  • --- battering ram 测试 ------%username%=%password%---->
  • 语酌哑萝2022-05-29 07:26:47
  • ------------ ....<span style="background-color:white;"> </span>
  • 囤梦浪胚2022-05-29 10:33:06
  • ploit-local-file-inclusion-vulnerability-using-burp-suite mutillidae-analyze-

支持Ctrl+Enter提交

黑资讯 © All Rights Reserved.  
Copyright Copyright 2015-2020 黑资讯
滇ICP备19002590号-1
Powered by 黑客资讯 Themes by 如有不合适之处联系我们
网站地图| 发展历程| 留言建议| 网站管理