- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 160字
- 2021-06-10 18:35:33
Inferential SQLi (blind SQLi)
Inferential SQL injection is also commonly known as blind SQL injection; it is referred to as so because, in this case, the data is not actually transferred between the web application and the attacker is not able to directly see the response of the injected queries. Instead, this kind of vulnerability is exploited when the attacker enumerates the database by observing the application's behavior. There are two kinds of blind SQL injection:
- Boolean-based blind SQLi: This is a type of inferential SQL injection attack in which the attacker mainly sends an SQL query to the database, in response to which the application returns results that depend on whether the query is a true or false result
- Time-based blind SQLi: In time-based SQL injection the attacker relies on sending an SQL query to the database; the result, either true or false, is based on a time delay for the response that is returned back from the database
推薦閱讀
- Kali Linux Social Engineering
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級(jí)版)
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- 局域網(wǎng)交換機(jī)安全
- 情報(bào)驅(qū)動(dòng)應(yīng)急響應(yīng)
- CTF那些事兒
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- SQL Injection Strategies
- 捍衛(wèi)隱私
- 信息內(nèi)容安全管理及應(yīng)用
- 黑客攻防與電腦安全從新手到高手(超值版)
- 黑客攻防入門
- Real-World SRE
- CCNA Security 210-260 Certification Guide