SQL injection - wide byte injection (interview hotspot)

Experimental purpose Popularize the principle and application of wide byte injection, as well as the basic methods and processes of wide byte injection. Experimental environment Attack machine: tell the peach blossom not to open (1) Operating system: Windows10 (2) Installed applications: sqlmap,Burpsuite,FireFox browser plug-in Hackbar, FoxyPr ...

Posted by cravin4candy on Sun, 20 Feb 2022 18:24:22 +0100

Sharding JDBC sub database and sub table case

9 cases 9.1 requirements description The list of goods on the e-commerce platform is displayed. In addition to the basic information and description information of the goods, each list item also includes the store information to which the goods belong, as follows: The functions of this case are as follows: Add itemProduct paging queryC ...

Posted by dibyajyotig on Sun, 20 Feb 2022 15:07:45 +0100

SQL injection -- blind injection based on time

Purpose of this chapter Popularize the application scenarios and conditions of delayed blind injection technology, be familiar with the usage of functions such as length(), Substr(), ascii(), sleep(), if(), and master the basic process of time-based blind injection. PS: the interview questions and answers are delayed without deep questions E ...

Posted by jokkis on Sun, 20 Feb 2022 14:50:47 +0100

Connection query of MySQL learning notes (SQL99 standard) inner, left outer, right outer, full outer, cross, etc

Join query in sql99 syntax Syntax: SELECT query list FROM table 1 alias [connection type] JOIN table 2 alias ON connection conditions [WHERE filter criteria] [GROUP BY] [HAVING filter criteria] [ORDER BY sort list] Connection type: inner connection: inner External connection: Left outer: left [outer] Right outer: right [outer] full ...

Posted by kampbell411 on Sun, 20 Feb 2022 14:24:25 +0100

MySQL save or update saveOrUpdate

1. Introduction In the process of project development, when some data is written, if it already exists, it can be overwritten. This can prevent multiple repeated writes to the only key conflict and error reporting. Here are two examples of using saveOrUpdate in MyBatis configuration files <!-- Single data saving --> <insert id="saveO ...

Posted by mckooter on Sun, 20 Feb 2022 09:29:36 +0100

Manual compilation of StarRocks-2.0 in ARM environment

1. Background Since the official version of rockdoc is available in the cloud environment, rockdoc has to be used as the real-time image of the company's own version, but it is not installed in the cloud environment. According to the release of StarRocks official website, ARM environment is supported in version 2.0, so it starts to scratch the ...

Posted by dpsd on Sun, 20 Feb 2022 09:19:05 +0100

Hive installation, deployment and management

Hive installation, deployment and management Experimental environment Linux Ubuntu 16.04 prerequisite: 1) Java runtime environment deployment completed 2) Hadoop 3.0.0 single point deployment completed 3) MySQL database installation completed The above preconditions are ready for you. Experimental content Under the above preconditions, ...

Posted by Homer30 on Sun, 20 Feb 2022 04:37:39 +0100

MySQL database (grouping and paging, constraints)

1. Group query group by , generally used in conjunction with aggregate functions, the found data is meaningful *Fields to query: 1. Grouping field itself 2. Aggregate function -- For example, I group by part number. For example, there are three departments, and then I calculate the average salary of each department. There should be thre ...

Posted by scottd on Sun, 20 Feb 2022 03:26:58 +0100

Headline: educator -- advanced features of Java - JDBC

Level 1: specify the type of JDBC encapsulation Task description This task: encapsulate a JDBC tool class as required. Relevant knowledge In order to complete this task, you need to master the basic use of JDBC. Please refer to the previous training content Advanced features of Java - JDBC (Part 1). This chapter will encapsulate ...

Posted by revdev on Sun, 20 Feb 2022 03:10:29 +0100

Dvwa exercise 06 SQL injection (Low)

brief introduction SQL injection means that the web application does not judge or filter the legitimacy of the user's input data. The attacker can add additional SQL statements at the end of the query statements defined in advance in the web application, and realize illegal operations without the knowledge of the administrator, so as to d ...

Posted by hrichman on Sun, 20 Feb 2022 02:56:08 +0100