分类 电脑相关 下的文章

sqlmap -hh

为了方便阅读,输出并摘录如下:
Linux lilei 3.2.0-3-686-pae #1 SMP Mon Jul 23 03:50:34 UTC 2012 i686

The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.

Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
root@lilei:~# sqlmap

sqlmap/0.9 - automatic SQL injection and database takeover tool
http://sqlmap.sourceforge.net

Usage: python /root/sqlmap/sqlmap/sqlmap.py [options]

sqlmap.py: error: missing a mandatory parameter ('-d', '-u', '-l', '-r', '-g', '-c', '--wizard' or '--update'), -h for help
root@lilei:~# sqlmap -hh

sqlmap/0.9 - automatic SQL injection and database takeover tool
http://sqlmap.sourceforge.net

Usage: python /root/sqlmap/sqlmap/sqlmap.py [options]

Options:
--version show program's version number and exit
-h, --help show this help message and exit
-v VERBOSE Verbosity level: 0-6 (default 1)

Target:

At least one of these options has to be specified to set the source to
get target urls from.

-d DIRECT           Direct connection to the database
-u URL, --url=URL   Target url
-l LIST             Parse targets from Burp or WebScarab proxy logs
-r REQUESTFILE      Load HTTP request from a file
-g GOOGLEDORK       Process Google dork results as target urls
-c CONFIGFILE       Load options from a configuration INI file

Request:

These options can be used to specify how to connect to the target url.

--data=DATA         Data string to be sent through POST
--cookie=COOKIE     HTTP Cookie header
--cookie-urlencode  URL Encode generated cookie injections
--drop-set-cookie   Ignore Set-Cookie header from response
--user-agent=AGENT  HTTP User-Agent header
--random-agent      Use randomly selected HTTP User-Agent header
--referer=REFERER   HTTP Referer header
--headers=HEADERS   Extra HTTP headers newline separated    --auth-type=ATYPE   HTTP authentication type (Basic, Digest or NTLM)
--auth-cred=ACRED   HTTP authentication credentials (name:password)
--auth-cert=ACERT   HTTP authentication certificate (key_file,cert_file)
--proxy=PROXY       Use a HTTP proxy to connect to the target url
--proxy-cred=PCRED  HTTP proxy authentication credentials (name:password)
--ignore-proxy      Ignore system default HTTP proxy
--delay=DELAY       Delay in seconds between each HTTP request
--timeout=TIMEOUT   Seconds to wait before timeout connection (default 30)
--retries=RETRIES   Retries when the connection timeouts (default 3)
--scope=SCOPE       Regexp to filter targets from provided proxy log
--safe-url=SAFURL   Url address to visit frequently during testing
--safe-freq=SAFREQ  Test requests between two visits to a given safe url

Optimization:

These options can be used to optimize the performance of sqlmap.

-o                  Turn on all optimization switches
--predict-output    Predict common queries output
--keep-alive        Use persistent HTTP(s) connections
--null-connection   Retrieve page length without actual HTTP response body
--threads=THREADS   Max number of concurrent HTTP(s) requests (default 1)

Injection:

These options can be used to specify which parameters to test for,
provide custom injection payloads and optional tampering scripts.

-p TESTPARAMETER    Testable parameter(s)
--dbms=DBMS         Force back-end DBMS to this value
--os=OS             Force back-end DBMS operating system to this value
--prefix=PREFIX     Injection payload prefix string
--suffix=SUFFIX     Injection payload suffix string
--tamper=TAMPER     Use given script(s) for tampering injection data

Detection:

These options can be used to specify how to parse and compare page
content from HTTP responses when using blind SQL injection technique.

--level=LEVEL       Level of tests to perform (1-5, default 1)
--risk=RISK         Risk of tests to perform (0-3, default 1)
--string=STRING     String to match in page when the query is valid
--regexp=REGEXP     Regexp to match in page when the query is valid
--text-only         Compare pages based only on the textual content

Techniques:

These options can be used to tweak testing of specific SQL injection
techniques.

--technique=TECH    SQL injection techniques to test for (default BEUST)
--time-sec=TIMESEC  Seconds to delay the DBMS response (default 5)
--union-cols=UCOLS  Range of columns to test for UNION query SQL injection
--union-char=UCHAR  Character to use for bruteforcing number of columns

Fingerprint:

-f, --fingerprint   Perform an extensive DBMS version fingerprint

Enumeration:

These options can be used to enumerate the back-end database
management system information, structure and data contained in the
tables. Moreover you can run your own SQL statements.

-b, --banner        Retrieve DBMS banner
--current-user      Retrieve DBMS current user
--current-db        Retrieve DBMS current database
--is-dba            Detect if the DBMS current user is DBA
--users             Enumerate DBMS users
--passwords         Enumerate DBMS users password hashes    --privileges        Enumerate DBMS users privileges
--roles             Enumerate DBMS users roles
--dbs               Enumerate DBMS databases
--tables            Enumerate DBMS database tables
--columns           Enumerate DBMS database table columns
--dump              Dump DBMS database table entries
--dump-all          Dump all DBMS databases tables entries
--search            Search column(s), table(s) and/or database name(s)
-D DB               DBMS database to enumerate
-T TBL              DBMS database table to enumerate
-C COL              DBMS database table column to enumerate
-U USER             DBMS user to enumerate
--exclude-sysdbs    Exclude DBMS system databases when enumerating tables
--start=LIMITSTART  First query output entry to retrieve    --stop=LIMITSTOP    Last query output entry to retrieve
--first=FIRSTCHAR   First query output word character to retrieve
--last=LASTCHAR     Last query output word character to retrieve
--sql-query=QUERY   SQL statement to be executed
--sql-shell         Prompt for an interactive SQL shell

Brute force:

These options can be used to run brute force checks.

--common-tables     Check existence of common tables
--common-columns    Check existence of common columns

User-defined function injection:

These options can be used to create custom user-defined functions.

--udf-inject        Inject custom user-defined functions    --shared-lib=SHLIB  Local path of the shared library

File system access:

These options can be used to access the back-end database management
system underlying file system.

--file-read=RFILE   Read a file from the back-end DBMS file system
--file-write=WFILE  Write a local file on the back-end DBMS file system
--file-dest=DFILE   Back-end DBMS absolute filepath to write to

Operating system access:

These options can be used to access the back-end database management
system underlying operating system.

--os-cmd=OSCMD      Execute an operating system command
--os-shell          Prompt for an interactive operating system shell
--os-pwn            Prompt for an out-of-band shell, meterpreter or VNC
--os-smbrelay       One click prompt for an OOB shell, meterpreter or VNC
--os-bof            Stored procedure buffer overflow exploitation
--priv-esc          Database process' user privilege escalation
--msf-path=MSFPATH  Local path where Metasploit Framework 3 is installed
--tmp-path=TMPPATH  Remote absolute path of temporary files directory

Windows registry access:

These options can be used to access the back-end database management
system Windows registry.

--reg-read          Read a Windows registry key value
--reg-add           Write a Windows registry key value data
--reg-del           Delete a Windows registry key value
--reg-key=REGKEY    Windows registry key
--reg-value=REGVAL  Windows registry key value
--reg-data=REGDATA  Windows registry key value data
--reg-type=REGTYPE  Windows registry key value type

General:

These options can be used to set some general working parameters.

-t TRAFFICFILE      Log all HTTP traffic into a textual file
-s SESSIONFILE      Save and resume all data retrieved on a session file
--flush-session     Flush session file for current target
--fresh-queries     Ignores query results stored in session file
--eta               Display for each output the estimated time of arrival
--update            Update sqlmap
--save              Save options on a configuration INI file
--batch             Never ask for user input, use the default behaviour

Miscellaneous:

--beep              Alert when sql injection found
--check-payload     IDS detection testing of injection payloads
--cleanup           Clean up the DBMS by sqlmap specific UDF and tables
--forms             Parse and test forms on target url
--gpage=GOOGLEPAGE  Use Google dork results from specified page number
--page-rank         Display page rank (PR) for Google dork results
--parse-errors      Parse DBMS error messages from response pages
--replicate         Replicate dumped data into a sqlite3 database
--tor               Use default Tor (Vidalia/Privoxy/Polipo) proxy address
--wizard            Simple wizard interface for beginner users

root@lilei:~#

一起来做熊孩子———mcpe服务器搭建过程

好久没有更新过了,所以水一篇凑个数。。

1.以ROOT身份连接自己的vps,无需多说大家都会。
2.获取pocketmine,进入后点获取pocketmine,按照官网说明安装依赖:

安装编译需要的依赖项目, 你可能需要安装perl, gcc, make, automake, libtool, autoconf和m4. 如果你想在x86_64架构上编译你可能需要安装gcc-multilib.

然后执行以下代码:
wget -q -O install.sh http://get.pocketmine.net/
chmod 777 install.sh
./install.sh -r

然后是漫长的等待,直到你看见了这个
pocket1.png

[INFO] Cleaning up... done!

[PocketMine] You should start the server now using "./start.sh."
[PocketMine] If it doesn't work, please send the "install.log" file to the Bug Tracker.

然后执行
./start.sh

接下来会询问你所使用的语言,输入zh就可以,当然你其他语种好我也不拦你。
询问是否跳过向导时回答 N
接下来是服务器名称,写个自己喜欢的就可以了。
服务器端口,为避免不必要的麻烦,默认(19132)就可以了。
分配的内存,如果自己玩128足矣,如果你要分配高了我也不拦你。233
选择模式, 1是生存,2是创造,说的很明白。
询问是否保护出生点,一般选y,、再熊也要根据地啊。233
接下来设置op的名字,自己填。
白名单的设置,是开是关,你开心就好。
接下来是Query请求,看官方的口气不让禁用,那就N好了。
接下来是RCON类似远程控制台,启用也没多大坏处,反正需要密码,还方便管理,说着我禁用了它。
然后是内网ip和外网ip的检查,因为vps一般都带外部ip,直接回车就好。

这时候你可能发现还无法连接,关掉防火墙就好了。

3.打开mcpe,和基友们一块去浪吧。

星期六

话说外面开讲座了,好多人都去听了。。

身体快废了,上四楼都大喘气。

域名已经开始转移了,好慢的说,

内存卡手机无法读取了,明天去网吧看一下。

话说居然在实体店买到了足速的内存卡,足不足量就不清楚了(斜眼)。。

话说帮老师们设置了两次电脑。

讲情况记录下来吧,万一又有苦逼的同学遭到同样的情况呢。对于一个学渣来说办公室里实在太恐怖了。

1:笔记本无线网无法搜寻到网络,具体表现为在无线连接中搜寻不到无线网。

解决办法:首先,最重要的是看看你周围有没有无线网,这是最重要的。
笔记本的话先按下Fn+f4,反正我遇见的差不多,无反应的话看下其他的键上有没有一个无线标识,有的话Fn加这个,按下还没反应的话,请查看笔记本的无线实体开关是否关闭,开关的位置吗?摸着笔记本的周边摸一圈就可以了。

2:笔记本的数字小键盘无法关闭。

这个好解决,按下Fn加numlock就可以关闭,主要是老师的Fn坏掉了,只能尝试屏幕键盘关闭,但老师的又是ghost版的,修改者在制作时把屏幕键盘去掉了,如果没去掉可以按下Win r 然后运行osk就可以了,我只能随便在网上找了一个,恩,至于病毒吗?反正老师的电脑已经够卡了,就不要在意这些细节了。。

最新文章

最近回复

  • 演员:不然呢!
  • 萌新:大佬
  • siyochen:我一直想养只猫。哎 也对自己说,,会有猫的
  • 姜辰:当利益产生,你就可以看到人的让人恶心的地方。
  • 姜辰:你在撸猫?
  • 姜辰:我的天,我被凝视了
  • 徐缓归:同 蹭腾讯的羊毛
  • 欣欣:不知该说什么 敬佩勇敢的人
  • 苏格:这是超大的局域网
  • BlogHome:亲,博客小屋新增博客评论了,快看看大家怎么评价您的博客吧~~

分类

归档

其它