- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 160字
- 2021-06-10 18:35:33
Inferential SQLi (blind SQLi)
Inferential SQL injection is also commonly known as blind SQL injection; it is referred to as so because, in this case, the data is not actually transferred between the web application and the attacker is not able to directly see the response of the injected queries. Instead, this kind of vulnerability is exploited when the attacker enumerates the database by observing the application's behavior. There are two kinds of blind SQL injection:
- Boolean-based blind SQLi: This is a type of inferential SQL injection attack in which the attacker mainly sends an SQL query to the database, in response to which the application returns results that depend on whether the query is a true or false result
- Time-based blind SQLi: In time-based SQL injection the attacker relies on sending an SQL query to the database; the result, either true or false, is based on a time delay for the response that is returned back from the database
推薦閱讀
- 信息安全導(dǎo)論(在線(xiàn)實(shí)驗(yàn)+在線(xiàn)自測(cè))
- Web漏洞分析與防范實(shí)戰(zhàn):卷1
- 信息系統(tǒng)安全檢測(cè)與風(fēng)險(xiǎn)評(píng)估
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- Kali Linux Network Scanning Cookbook(Second Edition)
- 物聯(lián)網(wǎng)安全滲透測(cè)試技術(shù)
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 人工智能安全(精裝版)
- End to End GUI Development with Qt5
- 黑客攻防從入門(mén)到精通
- 捍衛(wèi)隱私
- 網(wǎng)絡(luò)空間安全法律問(wèn)題研究
- ATT&CK與威脅獵殺實(shí)戰(zhàn)
- Blockchain Development with Hyperledger
- CCNA Security 210-260 Certification Guide