發表文章

目前顯示的是 6月, 2018的文章

sqlmap 用來讀取網站SQL訊息及攻擊

圖片
透過詢問 SQL語法, 去詢問主機, 找出 合適 帳號密碼所在的 table 取的機密資料 Usage: python3 sqlmap [options] Options: -h, --help Show basic help message and exit -hh Show advanced help message and exit --version Show program's version number and exit -v VERBOSE Verbosity level: 0-6 (default 1) Target: At least one of these options has to be provided to define the target(s) -u URL, --url=URL Target URL (e.g. "http://www.site.com/vuln.php?id=1") -d DIRECT Connection string for direct database connection -l LOGFILE Parse target(s) from Burp or WebScarab proxy log file -m BULKFILE Scan multiple targets given in a textual file -r REQUESTFILE Load HTTP request from a file -g GOOGLEDORK Process Google dork results as target URLs -c CONFIGFILE Load options from a configuration INI file Request: These options can be used to specify how to connect to the targ

joomscan 針對 Joomla 網站的偵測

圖片
joomscan 診斷 joomla CMS (content Management System)  共用與修改與版本規畫,這也最常見用於  wordpress  這類型網站漏洞偵測 安裝指令:  sudo git clone https://github.com/rezasp/joomscan.git sudo cd joomscan sudo perl joomscan.pl 參考:  https://www.youtube.com/watch?v=4_F3qrk7SwA