Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Wooyun_Seebug_Python_6 #34

Open
PyxYuYu opened this issue May 19, 2016 · 0 comments
Open

Wooyun_Seebug_Python_6 #34

PyxYuYu opened this issue May 19, 2016 · 0 comments

Comments

@PyxYuYu
Copy link
Owner

PyxYuYu commented May 19, 2016

A book that remains shut is but a block.

0x01 Wooyun

0x02 Seebug

  • 二次注入
    • 二次注入的攻击流程一般如下:
      • 黑客通过构造数据的形式,在浏览器或者其他软件中提交HTTP数据报文请求到服务端进行处理,提交的数据报文请求中可能包含了黑客构造的SQL语句或者命令
    • 服务端应用程序会将黑客提交的数据信息进行存储,通常是保存在数据库中,保存的数据信息的主要作用是为应用程序执行其他功能提供原始输入数据并对客户端请求做出响应
    • 黑客向服务端发送第二个与第一次不相同的请求数据信息
    • 服务端接收到黑客提交的第二个请求信息后,为了处理该请求服务端会查询数据库中已经存储的数据信息处理,从而导致黑客在第一次请求中构造的SQL语句或者命令在服务端环境中执行
    • 服务端返回执行的处理结果数据信息,黑客可以通过返回的结果数据信息判断二次注入漏洞利用是否成功
    • Tipask二次注入简析
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant