DVWA环境下的测试
一、基于get请求:
--batch是自动执行,可以不加;
图1测试是否含有注入漏洞,若含有就会出现类似图2的代码
![](https://img.haomeiwen.com/i12047485/19e485cb1fe5a523.png)
![](https://img.haomeiwen.com/i12047485/266bb326bad291e8.png)
图3是在前面基础的前提下枚举出所有数据库,会出现如图4所示效果
![](https://img.haomeiwen.com/i12047485/5e4fb06c0e5c1e90.png)
![](https://img.haomeiwen.com/i12047485/4c2ad825556aa9ef.png)
图5选择了图4中的一个名为“dvwa”的数据库,枚举dvwa的表单,如图6枚举出两个表单
![](https://img.haomeiwen.com/i12047485/0c79115a931f9fc2.png)
![](https://img.haomeiwen.com/i12047485/a1047e539ce69205.png)
同理枚举出表单为users的内容
![](https://img.haomeiwen.com/i12047485/922a32d4235b7928.png)
![](https://img.haomeiwen.com/i12047485/8bdac52fcf7c5e8d.png)
枚举出列表user和password内的数据即为用户名和密码
![](https://img.haomeiwen.com/i12047485/dece9a83c4936124.png)
![](https://img.haomeiwen.com/i12047485/52c58805b0576142.png)
二、基于post请求:
与基于get请求相比多了一个--data参数,get请求内容在URL内,post请求内容在 request body内,其余内容与第一类似;
![](https://img.haomeiwen.com/i12047485/5e12fa01178e1fed.png)
![](https://img.haomeiwen.com/i12047485/f928ed09aeb44ee7.png)
![](https://img.haomeiwen.com/i12047485/de8155c1f89f5794.png)
三、基于跳转页面
与基于post请求相同,但多了一个second-url参数,是因为输入参数时有个网页跳转的过程
![](https://img.haomeiwen.com/i12047485/dd08b11885dfc3ee.png)
![](https://img.haomeiwen.com/i12047485/ff6526b0481fc815.png)
网友评论