- 浏览: 291106 次
-
文章分类
- 全部博客 (276)
- burp+hydra暴力破解 (1)
- kali linux工具集 (6)
- kali (59)
- linux (54)
- password (14)
- web (63)
- 渗透测试 (50)
- windows (40)
- metasploit (9)
- 信息收集 (32)
- burp suit (4)
- 安全审计 (9)
- https://github.com/secretsquirrel/the-backdoor-factory (0)
- nmap (4)
- arachni (2)
- 工具 (5)
- sql (3)
- 网络 (2)
- 后渗透测试 (10)
- 内网 (5)
- 无线 (2)
- C (3)
- bios (1)
- RoR (12)
- mongodb (1)
- linxu (1)
- gdb (1)
- linux,虚拟化 (1)
- python (4)
最新评论
使用burp拦截请求,删除请求中
root@kali:~# cat w3af.txt
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20140722 Firefox/24.0 Iceweasel/24.7.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.59.142/dvwa/vulnerabilities/sqli/?id=12345&Submit=Submit
Cookie: security=low; PHPSESSID=2efb28ea69e34344dd07fb72d06684bd
Connection: keep-alive
root@kali:~# w3af_console
w3af>>> plugins
w3af/plugins>>> output console
w3af/plugins>>> audit sqli
w3af/plugins>>> back
w3af>>> http-settings
w3af/config:http-settings>>> set headers_file /root/w3af.txt
w3af/config:http-settings>>> set proxy_address 127.0.0.1
w3af/config:http-settings>>> back
The configuration has been saved.
w3af>>> target
w3af/config:target>>> set target 192.168.59.142/dvwa/vulnerabilities/sqli/?id=23456&Submit=Submit
w3af/config:target>>> back
The configuration has been saved.
w3af>>> start
A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "You have an error in your SQL syntax;". The error was found on response with id 36.
A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "MySQL server version for the right syntax to use". The error was found on response with id 36.
A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "You have an error in your SQL syntax;". The error was found on response with id 35.
A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "MySQL server version for the right syntax to use". The error was found on response with id 35.
SQL injection in a MySQL database was found at: "http://192.168.59.142/dvwa/vulnerabilities/sqli/", using HTTP method GET. The sent data was: "id=a'b"c'd"&Submit=Submit". This vulnerability was found in the request with id 36.
SQL injection in a MySQL database was found at: "http://192.168.59.142/dvwa/vulnerabilities/sqli/", using HTTP method GET. The sent data was: "id=a%27b%22c%27d%22&Submit=Submit". The modified parameter was "id". This vulnerability was found in the request with id 35.
Scan finished in 17 seconds.
Stopping the core...
w3af>>>
从burp拦截的流量中查看w3af发送的各种请求
GET /dvwa/vulnerabilities/fi/?page=include.php HTTP/1.1 Host: 192.168.59.142
root@kali:~# cat w3af.txt
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20140722 Firefox/24.0 Iceweasel/24.7.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.59.142/dvwa/vulnerabilities/sqli/?id=12345&Submit=Submit
Cookie: security=low; PHPSESSID=2efb28ea69e34344dd07fb72d06684bd
Connection: keep-alive
root@kali:~# w3af_console
w3af>>> plugins
w3af/plugins>>> output console
w3af/plugins>>> audit sqli
w3af/plugins>>> back
w3af>>> http-settings
w3af/config:http-settings>>> set headers_file /root/w3af.txt
w3af/config:http-settings>>> set proxy_address 127.0.0.1
w3af/config:http-settings>>> back
The configuration has been saved.
w3af>>> target
w3af/config:target>>> set target 192.168.59.142/dvwa/vulnerabilities/sqli/?id=23456&Submit=Submit
w3af/config:target>>> back
The configuration has been saved.
w3af>>> start
A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "You have an error in your SQL syntax;". The error was found on response with id 36.
A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "MySQL server version for the right syntax to use". The error was found on response with id 36.
A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "You have an error in your SQL syntax;". The error was found on response with id 35.
A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "MySQL server version for the right syntax to use". The error was found on response with id 35.
SQL injection in a MySQL database was found at: "http://192.168.59.142/dvwa/vulnerabilities/sqli/", using HTTP method GET. The sent data was: "id=a'b"c'd"&Submit=Submit". This vulnerability was found in the request with id 36.
SQL injection in a MySQL database was found at: "http://192.168.59.142/dvwa/vulnerabilities/sqli/", using HTTP method GET. The sent data was: "id=a%27b%22c%27d%22&Submit=Submit". The modified parameter was "id". This vulnerability was found in the request with id 35.
Scan finished in 17 seconds.
Stopping the core...
w3af>>>
从burp拦截的流量中查看w3af发送的各种请求

发表评论
-
kali 2.0 broadcom wifi connection
2015-12-12 16:28 446引用apt-get install -y linux-head ... -
kali2.0中国源
2015-09-27 01:42 465#中科大kali源 deb http://mirrors.us ... -
linux 安装scrapy
2015-09-07 13:06 607由于scrapy对python3支持不是很好,所以使用pyth ... -
nginx reverse proxy cofinguration
2015-08-28 15:18 430based on our case, we need to h ... -
wpscan
2015-08-01 10:39 446https://www.digitalocean.com/co ... -
arachni-web-ui使用
2015-06-10 01:04 2150最近在玩儿arachni,想试试arachni-ui-web, ... -
linux dd命令
2015-06-06 14:29 395dd if=/dev/hda of=disk.mbr coun ... -
HACKING NODEJS AND MONGODB
2015-06-04 23:52 347http://blog.websecurify.com/201 ... -
php object inject
2015-05-29 00:45 343解释: http://securitycafe.ro/2015 ... -
[转]Forcing XXE Reflection through Server Error Messages
2015-05-19 01:10 464原文地址:https://blog.netspi.com/fo ... -
CVE-2011-2461
2015-03-31 01:19 437http://blog.nibblesec.org/2015/ ... -
[译]从配置错误的web server中dump git数据
2015-03-26 01:07 600原文地址:https://blog.netspi.com/du ... -
[转]Microsoft Access sqli
2015-03-18 00:57 446https://milo2012.wordpress.com/ ... -
[转]sqlmap注入Microsoft Access
2015-03-18 00:49 1600https://github.com/sqlmapprojec ... -
Wine中使用MinGW
2015-03-17 00:49 656原文:http://null-byte.wonderhowto ... -
crossdomain.xml
2015-03-12 01:23 684参考: https://hackerone.com/repor ... -
[译]使用wireshark解密TLS浏览器流量
2015-03-12 00:57 4146原文地址:https://jimshaver.net/2015 ... -
xxe方法
2015-02-01 18:32 854原文地址:http://www.christian-schne ... -
owasp zed--Web Sockets
2015-01-31 01:16 650http://digi.ninja/blog/zap_web_ ... -
memcached
2015-01-25 01:56 0http://www.sensepost.com/blog/4 ...
相关推荐
在DVWA(Damn Vulnerable Web Application)的SQL注入(low)级别中,可以学习到多个关于SQL注入的知识点。例如,了解了SQL语句中的"ORDER BY"子句,它用于对查询结果进行排序。"ORDER BY 1"意味着按照第一个字段...
接着是DVWA,这个应用设计有多个安全漏洞,包括跨站脚本(XSS)、文件包含漏洞、SQL注入等,用于模拟真实世界的网络安全问题。通过DVWA,开发者或安全研究人员可以实践如何发现这些漏洞,并学习如何修复它们。每个...
DVWA SQL盲注,Low,Medium,High 三个级别的bool盲注脚本,比较完整,配套解释 : https://blog.csdn.net/csdn_Pade/article/details/82886765
### DVWA-安装-漏洞测试-漏洞修复指南 #### 安装与配置 根据文档描述,为了使用DVWA(Damn Vulnerable Web Application)进行漏洞测试,首先需要...希望本文能帮助读者更好地理解和掌握DVWA中的漏洞测试及修复技巧。
SQL注入是一种常见的Web应用程序安全漏洞,攻击者可以通过这种手段将恶意SQL代码插入到应用程序的查询中,以达到非法访问或篡改数据的目的。在本篇内容中,我们将通过DVWA(Damn Vulnerable Web Application,一个...
SQL Injection(SQL注入)是一种常见的Web应用程序安全漏洞,攻击者通过将恶意SQL代码插入应用程序的输入字段中,从而改变原有SQL语句的逻辑,进而获取敏感数据、修改数据或执行其他非法操作。 #### 二、DVWA介绍 ...
- **漏洞介绍**:SQL注入是指攻击者通过在输入字段中插入恶意SQL语句,从而操纵数据库查询的结果。 - **攻击实战**:攻击者可以尝试在输入框中输入`' OR 1=1 --`来绕过认证或获取敏感信息。 - **PHP源代码**:源代码...
例如,假设在扫描过程中发现了一个命令执行漏洞,可以使用exploit模块中的os_commanding插件来进一步探索和利用该漏洞。通过选择合适的命令执行方式,比如反弹shell,可以更深入地理解和评估漏洞的影响程度。 总之...
通过在DVWA中实践,用户能够深入理解漏洞的原理,学习如何识别它们,以及如何利用这些漏洞,进一步提高网络安全防护能力。 OWASP Top 10漏洞包括: 1. A1:注入攻击(Injection) - 这种攻击发生在用户输入的数据...
在《DVWA漏洞测试平台分析.v1.0》中,我们将深入探讨这些漏洞的原理、检测方法以及如何进行防护。以下是对每个主要知识点的详细解析: 1. SQL注入:这是最常见的Web应用漏洞之一,攻击者通过构造恶意SQL语句,欺骗...
( Web漏洞实战教程(DVWA的使用和漏洞分析)2013完整版.pdf )不错的web漏洞演练平台的使用教程。
1. **SQL注入**:DVWA中的SQL注入漏洞是最基础的学习点。它涉及到攻击者通过输入恶意SQL代码来操纵数据库查询,可能导致数据泄露、用户权限提升甚至完全控制系统。学习如何预防SQL注入,包括使用预编译语句、参数化...
在本教程中,读者将学习如何设置和使用DVWA,通过不同的安全级别(如低、中、高)体验各种漏洞的实际情况,同时掌握检测和修复漏洞的方法。 SQL注入是Web漏洞的经典案例,它允许攻击者通过构造恶意SQL语句来获取、...
基于PythonFlaskWeb版网站sqlxss漏洞扫描 框架 html + flask + python + mysql + orm +dvwa+sqllabs+pikachu dvwa config\config.inc.php.bak to config.inc.php $_DVWA[ 'db_server' ] = getenv('DB_SERVER') ?:...
在我们的学习环境中,sqlmap可以用来验证我们创建的URL是否真正存在SQL注入漏洞。 接着,`wamp`是一个Windows下的Web开发环境,包含Apache、MySQL和PHP,它们共同构成了一套运行PHP网页和MySQL数据库的基础架构。在...
解决awvs无法正常扫描问题
在DVWA中,"id"参数存在SQL注入漏洞,允许攻击者执行自定义SQL查询。 2. 手工爆破: - **查询数据库名称**:`1' union select 1,database() from information_schema.schemata#` 这个查询用于获取当前连接的数据库...
通常在DVWA源码目录下的"sql"文件夹中,有一个名为"dvwa.sql"的文件。将这个文件导入到刚才创建的数据库中。 3. 更新DVWA的配置文件。找到DVWA源码根目录下的"config.inc.php",修改其中的数据库连接信息,如数据库...
该DVWA漏洞测试PDF由红日安全组组长Silense编写,从dvwa漏洞平台的搭建到各个漏洞低中高类型分析,特别是使用了python脚本来利用漏洞。