sqli-labs Less-13/Less-14 POST Error Based

Less-11/Less-12 POST Error Based

POST型基于错误的注入
Less-11单引号闭合,Less-12双引号闭合,下面以Less-11为例说明

1、页面情况

访问页面,发现是一个登陆窗口。

2、获取数据库信息

浏览器设置代理,先随便输入一些内容,打开Burpsuite进行拦截抓包
sqli-labs Less-13/Less-14 POST Error Based
sqli-labs Less-13/Less-14 POST Error Based
将拦截到的请求信息发送到Repeater
在uname=123后面加一个单引号,点击Send
sqli-labs Less-13/Less-14 POST Error Based
查看右侧的响应信息,发现有提示语法错误的报错信息,说明单引号被带入到数据库进行执行了。此位置存在SQL注入漏洞。
sqli-labs Less-13/Less-14 POST Error Based
可以构造报错语句,来获取数据库信息
123‘ union select count(*),concat(0x3a,0x3a,(select database()),0x3a,0x3a,floor(rand(0)*2)) aa from information_schema.tables group by aa --+
获取数据名
sqli-labs Less-13/Less-14 POST Error Based
响应信息里面包含了数据库名 " security "
sqli-labs Less-13/Less-14 POST Error Based
再构造其他语来获取所需要的信息,具体语句请参考文章sqli-labs Less-5/Less-6 Double Injection
链接如下:
https://blog.****.net/bigblue00/article/details/106747412