如何判断字符型注入和数字型注入

参考网址

https://blog.csdn.net/weixin_43919144/article/details/105552701

https://blog.csdn.net/weixin_43096078/article/details/108214500

数字型注入

http://localhost:8888/form.php?id=1 and 1=1

http://localhost:8888/form.php?id=1 and 1=2

如果结果不同,可判断未数字型注入,为什么呢?

如果是数字型注入,sql语句就会是这样的

select * from tablename where id =1 and 1=1

select * from tablename where id =1 and 1=2

 

如果是字符型注入,sql语句应该是这样的

select * from tablename where id ='1 and 1 = 1'

select * from tablename where id ='1 and 1 = 2'

如果后面加1=1 和1=2 结果不同,可判断未数字型注入,如果相同,可能为字符型注入

 

字符型注入

http://localhost:8888/form.php?id=1' and '1'='1

http://localhost:8888/form.php?id=1' and '1'='2

sql语句应该是这样的

select * from tablename where cat ='1' and '1' = '1'

select * from tablename where cat ='1' and '1' = '2'

 

posted @ 2020-12-18 14:26  学习之旅之20171013  阅读(730)  评论(0编辑  收藏  举报