当前位置:网站首页>SQL injection less42 (post stack injection)
SQL injection less42 (post stack injection)
2022-07-28 22:17:00 【Happy star】
Pre knowledge : SQL Inject Less38( Stack Injection )
The page of this question is similar to the second injection , But we can't register users , Therefore, it is impossible to use secondary injection .
White box audit , Look at the code
$username = mysqli_real_escape_string($con1, $_POST["login_user"]);
$password = $_POST["login_password"];
Only right username Escaped , And not right password, therefore password It's a breakthrough
Use universal password to test password' or 1=1#
But why do we enter admin But what logged in was Dumb Well .
Because it's here SQL yes
SELECT * FROM users WHERE username='admin' and password='' or 1=1 #'
and and Priority is higher than or Of . So this statement is equivalent to
select * from users where 1
Then the result is the whole picture users surface . and Dumb On the first line , So what you log in to is Dumb.
use password Stack Injection
Enter the user name casually
password ';drop table users;
https://blog.csdn.net/weixin_43901998/article/details/107566100
边栏推荐
猜你喜欢
随机推荐
Hcip experiment (15)
array_diff_assoc 元素是数组时不比较数组值的办法
熊市下 DeFi 的未来趋势
【二叉树】二叉树中的伪回文路径
Kubevera plug-in addons download address
hcip实验(12)
使用百度EasyDL实现明厨亮灶厨师帽识别
Intranet penetration learning (III) horizontal movement of domain - planning tasks
hcip实验(14)
HCIP(13)
小程序 组件 定时器的清除
罗克韦尔AB PLC RSLogix数字量IO模块基本介绍
IFLYTEK written examination
[machine learning] naive Bayesian classification of text -- Classification of people's names and countries
tutorial/detailed_workflow.ipynb 量化金融Qlib库
Practice and exploration of overseas site Seata of ant group
Small program canvas generates posters
Hcip seventh experiment
In Kingbase, the user is specified to search the schema by default, or the user cannot use the function under the public schema
Principle of object. Prototype. ToString. Call()








