这个SQL技巧或注入意味着什么?

i founded this as some user try to put it in my sql

but using mysql_real_escape_string it actully save my website ..

i just want to ask what this code exactly do .. thanks alot ;)

    (select(@) from (select (@:=0x00),(select (@) from (TABLE) where (@) in (@:=concat(@,0x0a,col1,0x3a,col2,0x3a,col3))))a)

In an isolated test environment, execute it against a clean database and see what it does. It would also help to see what a normal sql statement looks like so it can be compared with the malicious version. As a side note, use prepared statements to prevent sql injection situations.

Always constrain input. Validate all input to your apps for type, length, format, and range.