官术网_书友最值得收藏!

  • Bug Bounty Hunting Essentials
  • Carlos A. Lozano Shahmeer Amir
  • 160字
  • 2021-06-10 18:35:33

Inferential SQLi (blind SQLi)

Inferential SQL injection is also commonly known as blind SQL injection; it is referred to as so because, in this case, the data is not actually transferred between the web application and the attacker is not able to directly see the response of the injected queries. Instead, this kind of vulnerability is exploited when the attacker enumerates the database by observing the application's behavior. There are two kinds of blind SQL injection:

  • Boolean-based blind SQLi: This is a type of inferential SQL injection attack in which the attacker mainly sends an SQL query to the database, in response to which the application returns results that depend on whether the query is a true or false result
  • Time-based blind SQLi: In time-based SQL injection the attacker relies on sending an SQL query to the database; the result, either true or false, is based on a time delay for the response that is returned back from the database
主站蜘蛛池模板: 崇礼县| 屏东市| 沾化县| 友谊县| 达日县| 湖口县| 宝应县| 财经| 新和县| 大足县| 兰溪市| 秭归县| 阿克苏市| 永兴县| 方山县| 西充县| 台湾省| 西充县| 墨脱县| 陵水| 防城港市| 墨竹工卡县| 龙海市| 湛江市| 博客| 新邵县| 通化县| 德格县| 奇台县| 莱阳市| 曲麻莱县| 武安市| 信宜市| 四川省| 昌邑市| 宜城市| 曲靖市| 揭阳市| 册亨县| 张掖市| 唐山市|