sqlmap中文手册 (20)

当用户想要安全地删除输出目录中的所有内容时使用此参数。所谓安全删除,不仅仅是删除,而是在删除前先用随机数据覆盖原有数据,甚至对文件名和目录名也进行重命名以覆盖旧名称,所有覆盖工作完成后才执行删除。最后,输出目录中会一无所有。如:

  python sqlmap.py --purge-output -v 3

部分输出如下:

  [*] starting at 19:51:36

 

  [19:51:36] [DEBUG] cleaning up configuration parameters

  [19:51:36] [INFO] purging content of directory '/home/werner/.sqlmap/output'...

  [19:51:36] [DEBUG] changing file attributes

  [19:51:36] [DEBUG] writing random data to files

  [19:51:36] [DEBUG] truncating files

  [19:51:36] [DEBUG] renaming filenames to random values

  [19:51:36] [DEBUG] renaming directory names to random values

  [19:51:36] [DEBUG] deleting the whole directory tree

 

  [*] shutting down at 19:51:36

15.快速扫描

参数:–smart

当有大量URL要进行测试(如:“-m”),目的是尽快找出其中存在的某些注入点而有所遗漏也没有关系时可以使用“–smart”进行正向启发式扫描。此时只有让数据库管理系统报错的参数才会做进一步测试,其余URL均被跳过。如:

  $ python sqlmap.py -u "http://192.168.21.128/sqlmap/mysql/get_int.php?ca=17&user=foo&id=1" --batch --smart

  [...]

  [xx:xx:14] [INFO] testing if GET parameter 'ca' is dynamic

  [xx:xx:14] [WARNING] GET parameter 'ca' does not appear dynamic

  [xx:xx:14] [WARNING] heuristic (basic) test shows that GET parameter 'ca' might not be injectable

  [xx:xx:14] [INFO] skipping GET parameter 'ca'

  [xx:xx:14] [INFO] testing if GET parameter 'user' is dynamic

  [xx:xx:14] [WARNING] GET parameter 'user' does not appear dynamic

  [xx:xx:14] [WARNING] heuristic (basic) test shows that GET parameter 'user' might not be injectable

  [xx:xx:14] [INFO] skipping GET parameter 'user'

  [xx:xx:14] [INFO] testing if GET parameter 'id' is dynamic

  [xx:xx:14] [INFO] confirming that GET parameter 'id' is dynamic

  [xx:xx:14] [INFO] GET parameter 'id' is dynamic

  [xx:xx:14] [WARNING] reflective value(s) found and filtering out

  [xx:xx:14] [INFO] heuristic (basic) test shows that GET parameter 'id' might be

  injectable (possible DBMS: 'MySQL')

  [xx:xx:14] [INFO] testing for SQL injection on GET parameter 'id' heuristic (parsing) test showed that the back-end DBMS could be 'MySQL'. Do you want to skip test payloads specific for other DBMSes? [Y/n] Y

  do you want to include all tests for 'MySQL' extending provided level (1) and risk (1)? [Y/n] Y

  [xx:xx:14] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'

  [xx:xx:14] [INFO] GET parameter 'id' is 'AND boolean-based blind - WHERE or HAVING clause' injectable

  [xx:xx:14] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'

  [xx:xx:14] [INFO] GET parameter 'id' is 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause' injectable

  [xx:xx:14] [INFO] testing 'MySQL inline queries'

  [xx:xx:14] [INFO] testing 'MySQL > 5.0.11 stacked queries'

  [xx:xx:14] [INFO] testing 'MySQL < 5.0.12 stacked queries (heavy query)'

  [xx:xx:14] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'

  [xx:xx:24] [INFO] GET parameter 'id' is 'MySQL > 5.0.11 AND time-based blind' injectable

  [xx:xx:24] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns'

  [xx:xx:24] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other potential injection technique found

  [xx:xx:24] [INFO] ORDER BY technique seems to be usable. This should reduce the

  time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test

  [xx:xx:24] [INFO] target URL appears to have 3 columns in query

  [xx:xx:24] [INFO] GET parameter 'id' is 'MySQL UNION query (NULL) - 1 to 20 columns' injectable

  [...]

16.通过关键词使用或跳过payload

参数:–test-filter

若只想使用包含关键词“ROW”的payload可使用参数“–test-filter=ROW”。下面是以Mysql为目标的例子:

  python sqlmap.py -u "http://192.168.21.128/sqlmap/mysql/get_int.php?id=1" --batch --test-filter=ROW

部分输出如下:

  [xx:xx:39] [INFO] GET parameter ’id’ is dynamic

  [xx:xx:39] [WARNING] reflective value(s) found and filtering out

  [xx:xx:39] [INFO] heuristic (basic) test shows that GET parameter ’id’ might be injectable (possible DBMS: ’MySQL’)

  [xx:xx:39] [INFO] testing for SQL injection on GET parameter ’id’

  [xx:xx:39] [INFO] testing ’MySQL >= 4.1 AND error-based - WHERE or HAVING clause’

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:https://www.heiqu.com/wpyxgg.html