In SQL, a semicolon represents the end of one SQL statement, while stack-based injection involves executing multiple SQL statements together. Stack-based injection is different from other injection techniques and has limitations.
1 | %27 --- ' |
How can you find the table fields and table names of the other party?
- Look for exploitable files using directory traversal vulnerabilities, such as files with a .sql extension.
- Use directory/file fuzzing tools like Dirsearch, etc., to search for .sql files.
- Search for source code leakage vulnerabilities on the other party’s website; the source code may contain exploitable files.
- Search for the other party’s website source code on GitHub.
Example:
1 | http://192.168.1.33/sqli-labs-master/Less-38/?id=1' //You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''1'' LIMIT 0,1' at line 1 |