- 1、本文档共5页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
五大著名的免费SQL注入漏洞扫描工具(国外英语资料)
五大著名的免费SQL注入漏洞扫描工具
Five famous free SQL injection vulnerability scanning tools
One, SQLIer
SQLIer can find a URL with a SQL injection vulnerability on its Web site and generate SQL exploit vulnerabilities based on the relevant information, but it does not require user interaction. In this way, it generates a UNION Select query, which can then strongly attack database passwords. This program does not use quotes when it exploits vulnerabilities, which means it can be adapted to multiple sites.
SQLIer uses true/false SQL to inject vulnerabilities and powerful passwords. With the help of the true/false SQL injection vulnerability, strong password, the user can not query data from the database, can only query a return true, false value statement.
According to statistics, a eight character password (including any character in the decimal ASCII code) only takes about 1 minutes to break.
Its syntax is as follows, sqlier [options] [URL]
The options are as follows:
-c:[host clears the hosts vulnerability and exploits information
-s:[seconds] the number of seconds waiting between web requests
U:[username] strong attacks from the database user name, separated by commas.
[w:[options] [options] to WGet
In addition, this program also supports guessing field names with the following choices:
--table-names [table name]: a table name that can be guessed, separated by commas.
--user-fields [user field]: the user name field name that can be guessed, separated by commas.
--pass-fields [password field]: the name of the password field that can be guessed, separated by commas.
Heres the basic usage:
For example, suppose there is a SQL injection vulnerability in the following URL:
Http:///sqlihole.php? Id=1?
We run the following command:
Sqlier -s 10 /sqlihole.php id=1 gets enough information from the database to use its password, where the number 10 means waiting for 10 seconds between each query.
If the table, user name field, password field name is guessed correctly, then the vulnerabil
您可能关注的文档
- 《管理学》第四阶段在线作业(自测)(国外英语资料).doc
- 《职业道德》学习笔记1(国外英语资料).doc
- 《结构设计原理1643》课程教学大纲(国外英语资料).doc
- 《脉象统类》(国外英语资料).doc
- 《西方经济学》(国外英语资料).doc
- 《西方经济学》考试题(国外英语资料).doc
- 《综合常识与职业能力测试(教导类)》测验纲目 - 深272(国外英语资料).doc
- 《社会学概论》第三次在线作业(国外英语资料).doc
- 《请理解我——气质、性情与智能》INTJ(国外英语资料).doc
- 《走向高考》2013高考物理总复习 7-5实验(三)测定电源电动势和内阻 实验(四)练习使用多用电表 76张(国外英语资料).doc
文档评论(0)