官术网_书友最值得收藏!

Inferential SQLi (blind SQLi)

Inferential SQL injection is also commonly known as blind SQL injection; it is referred to as so because, in this case, the data is not actually transferred between the web application and the attacker is not able to directly see the response of the injected queries. Instead, this kind of vulnerability is exploited when the attacker enumerates the database by observing the application's behavior. There are two kinds of blind SQL injection:

  • Boolean-based blind SQLi: This is a type of inferential SQL injection attack in which the attacker mainly sends an SQL query to the database, in response to which the application returns results that depend on whether the query is a true or false result
  • Time-based blind SQLi: In time-based SQL injection the attacker relies on sending an SQL query to the database; the result, either true or false, is based on a time delay for the response that is returned back from the database
主站蜘蛛池模板: 儋州市| 金阳县| 海南省| 通化市| 武定县| 石渠县| 内乡县| 赤城县| 中山市| 铜山县| 北海市| 杭州市| 大邑县| 棋牌| 郑州市| 岫岩| 绩溪县| 东乡族自治县| 四川省| 宣恩县| 志丹县| 平罗县| 浦北县| 惠安县| 额尔古纳市| 辉县市| 吉安市| 砚山县| 霍山县| 太和县| 汉川市| 茶陵县| 深水埗区| 松桃| 临沂市| 凌海市| 青龙| 紫金县| 崇州市| 临漳县| 会东县|