当前位置:网站首页>POC——DVWA‘s SQL Injection
POC——DVWA‘s SQL Injection
2022-07-19 04:59:00 【wavesky111】
Recently, I began to try to write some by myself POC, From basic DVWA Let's start the shooting range , Update from time to time ~
Level——low:
import requests
import browser_cookie3
cookie = browser_cookie3.chrome() // To obtain the chrome All visited cookie, See if there is any way to get only the current , And this method seems to have only chrome Sure ,firefox Not very good
response = requests.get("http://192.168.117.133/dvwa/vulnerabilities/sqli/?id=1'&Submit=Submit#",cookies=cookie)
re = 'syntax'
flag=re in str(response.content)
if flag:
print("It looks likely vulnerable")
else:
print("It is strong")Level——Medium

1 import requests
2 import browser_cookie3
3
4 cookie = browser_cookie3.chrome()
5 datas = {"id":"1'","Submit":"Submit"} // Here because Content-Type:application/x-www-form-urlencoded, therefore post Constructed as this pattern ( according to Payload Internal value )
6 response = requests.post("http://192.168.117.130/DVWA-1.9/vulnerabilities/sqli/?id=1'&Submit=Submit#",cookies=cookie,data=datas)
7
8 re = 'syntax'
9 flag=re in str(response.content)
10
11 if flag:
12 print("It looks likely vulnerable")
13 else:
14 print("It is strong")Level——High
1 import requests
2 import browser_cookie3
3
4 cookie = browser_cookie3.chrome()
5 datas = {"id":"1'","Submit":"Submit"}
6 response1 = requests.post("http://192.168.117.130/DVWA-1.9/vulnerabilities/sqli/session-input.php",cookies=cookie,data=datas)
7 response2 = requests.get("http://192.168.117.130/DVWA-1.9/vulnerabilities/sqli/",cookies=cookie) //high in , Query and echo are not in the same page , So here's the point post Query and get Access to the page
8
9 re = 'wrong' // Here we change the characteristic sentence
10 flag=re in str(response2.content)
11
12 if flag:
13 print("It looks likely vulnerable")
14 else:
15 print("It is strong")边栏推荐
- Pingcap clinic data acquisition instructions
- The database takes the fields of the configuration file, and then processes and judges the data
- [FPGA tutorial case 27] realize dual port RAM ping-pong structure through Verilog
- UE plug-in electronicnodes 5.0.0/4.23-4.27
- Differences and precautions of fastjson, jackjson and gson
- CVE-2021-44228 Log4j 复现及原理
- POC——DVWA‘s XSS Reflected
- Kubernetes 的监控与告警
- 畢設:基於Vue+Socket+Redis的分布式高並發防疫健康管理系統
- Some concepts of ES
猜你喜欢

用户的管理-限制
![Money making master applet [latest version 5.9.9] mall / instant withdrawal of commission / distribution promotion / phone recharge / is meituan hungry for takeout](/img/8b/29027c2dee4ef764bb2e4b5b499a23.jpg)
Money making master applet [latest version 5.9.9] mall / instant withdrawal of commission / distribution promotion / phone recharge / is meituan hungry for takeout

Sleuth getting started

Quickly master Mipi development strategy

MYSQL数据库表A数据同步到表B

一文了解配置中心

3. Restclient query document

ThinkPHP official website tutorial

shardingsphere内核原理

DirectExchange交换机的简单使用。
随机推荐
MySQL fuzzy matching 1, 11111 similar string problems
Website online package APK system source code
毕设:基于Vue+Socket+Redis的分布式高并发防疫健康管理系统
Tidb performance optimization overview
Simple UI funny text conversion Emoji expression wechat applet supports sentence word conversion_ Source code
Microservice high concurrency service governance
TopicExchange交换机简单使用。
solve [email protected] : `node install. Problems of js`
Database and the future of open source
Learn about the configuration center
RestClient操作文档
天道酬勤,保持热爱
模板类的声明和定义
浅聊链路追踪
Basic operations of index library operation
三种高并发方式实现i++
Learn about scheduled tasks in one article
itext修改pdf文字
NoSQL概述
Embrace declarative UI