sqlmap遇到url重写的示例

高中时看见英文就头大,现在慢慢的发现当拿到一个工具时 先看看其官方给的 faq doc pdf等文档是非常有益的。
url_rewrite 这个问题 国内外都有人问。
D:\cygwin\pentest\database\sqlmap\doc \faq.pdf
下面是官方给的解答。
1.15 How to use sqlmap with mod_rewrite enabled?
Append an asterisk, *, to the place where sqlmap should check for injections in
URI itself. For example, ./sqlmap.py -u “http://target.tld/id1/1*/id2/2″,
sqlmap will inject its payloads at that place marked with * character. This
feature also applies to POST data. Multiple injection points are supported and
will be assessed sequentially.
大意为:哪里存在注入就加上 * 号

例:

link:www.cunlide.com/?post=95

本文由网络安全攻防研究室(www.91ri.org)信息安全小组收集整理,转载请注明出处。