目录
一、信息收集
1.查找带有ID传参的网站(可以查找sql注入漏洞)
inurl:asp id=xx
2.查找网站后台(多数有登陆框,可以查找弱口令,暴力破解等漏洞)
site:http://xxxx.com “admin”
site:http://xx.com intext:管理
site:http://xx.com inurl:login
site:http://xx.com intitle:后台
3.查看上传漏洞
site:http://xx.com inurl:file
site:http://xx.com inurl:load
4.查找敏感文件
filetype:mdb|doc|xlsx|pdf
二、实战演示
1.谷歌语法搜索inurl:php id=62
随便点进一个带有id传参=62的网站,大概率存在SQL注入
2.判断是否存在SQL注入漏洞,显示页面正常id=62 and 1=1
3.id=62 and 1=1
显示页面不正常,已经肯定存在SQL注入
<