In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly explains "the detailed explanation of MySQL injection". Interested friends may wish to have a look. The method introduced in this paper is simple, fast and practical. Now let the editor to take you to learn "the detailed explanation of MySQL injection"!
Introduction
What is a database?
What is SQL injection?
Bypass login
Access to secret data
Check for loopholes
Number of columns found
Solve the fragile part
Looking for MySQL version
Injection of MySQL 5 or above
MySQL 4 injection
Modify the content of the website
Shut down the MySQL server
Loadfile
MySQL Root
Major MySQL commands
Complete the injection tutorial
Update
Bypass login advanced
RF injection SQL injection
URL deceives phishing
Head
Cookie
0x01 ~ introduction
Hello, everyone. For those who don't know me, I am their nightmare. In this tutorial, I'll show you the infamous injection in MySQL from a novice perspective so that all beginners can become successful SQL injectors. Purpose, be sure to check the various functions and websites in PHP and MySQL, they will be of great help to you. Don't be critical about whether I have any grammatical errors in the tutorial because English is not my mother tongue (I am from Saturn rings). Now let's start the SQL injection exercise.
0x02 ~ what is a database
It's just general information.. A database is an application that stores a collection of data. The database provides a variety of API for creating, accessing, and managing the data it owns. And the DB server can be integrated with our Web development so that we can get what we want from the database without too much difficulty. DB may contain a variety of key information, such as user name, password, credit, etc. As a result, databases need to be protected, but many of the database servers running are not secure due to vulnerabilities or improper programming. Just to name a few DB servers, MySQL (open source), MSSQL,MS-ACCESS,Oracle,Postgre SQL (open source), SQLite, etc.
0x03 ~ what is Sql injection?
SQL injection is probably the richest programming flaw on the Internet today. This is a loophole in which unauthorized people can access a variety of critical and private data. SQL injection is not a defect in Web or database servers, but is caused by poor programming practice and inexperience. It is one of the deadliest and easiest attacks to be performed from a remote location.
In SQL injection, we use various commands to interact with the DB server and get all kinds of data from it. In this tutorial, I'll discuss three aspects of SQL injection, namely, bypassing login, accessing confidential data, and modifying page content. So let's move forward in a real exercise.
# 0x04 ~ Bypass login
Suppose a site has a login form that allows only registered users to enter the site. Now, suppose you want to bypass login and enter the site as a legitimate user. If the programmer does not clean up the login script correctly, you may be lucky to be able to enter the site. By interacting with the DB server, you may not need to know the real user name and password to log in to the site. So, isn't that the beauty injected by SQL?
Let's look at an example where the user name admin and password sam207 can log in to the site. Suppose that the SQL query for this is executed as follows:
HTML Code:
SELECT USER from database WHERE username = 'admin'AND password =' xenu'
If the above SELECT command is evaluated as true, the user is granted access to the site. Think about what we can do if we don't have a cleanup script. This opens a door for hackers to gain illegal access to websites.
In this example, an attacker can enter the following user data in the login form:
Username:an or 1=1--password:blank
So, this will make our query as follows:
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.