admin管理员组

文章数量:1589777

靶场内容:

This lab contains a blind SQL injection vulnerability. The application uses a tracking cookie for analytics, and performs an SQL query containing the value of the submitted cookie.

The SQL query is executed asynchronously and has no effect on the application’s response. However, you can trigger out-of-band interactions with an external domain.

To solve the lab, exploit the SQL injection vulnerability to cause a DNS lookup to Burp Collaborator.

Learning path

note:
To prevent the Academy platform being used to attack third parties, our firewall blocks interactions between the labs and arbitrary external systems.
To solve the lab, you must use Burp Collaborator’s default public server (burpcollaborator).

解决方法

  • 这里直接使用xxe注入
  • server. For example, you

本文标签: 外带半成品sqlblindLab