官术网_书友最值得收藏!

Inferential SQLi (blind SQLi)

Inferential SQL injection is also commonly known as blind SQL injection; it is referred to as so because, in this case, the data is not actually transferred between the web application and the attacker is not able to directly see the response of the injected queries. Instead, this kind of vulnerability is exploited when the attacker enumerates the database by observing the application's behavior. There are two kinds of blind SQL injection:

  • Boolean-based blind SQLi: This is a type of inferential SQL injection attack in which the attacker mainly sends an SQL query to the database, in response to which the application returns results that depend on whether the query is a true or false result
  • Time-based blind SQLi: In time-based SQL injection the attacker relies on sending an SQL query to the database; the result, either true or false, is based on a time delay for the response that is returned back from the database
主站蜘蛛池模板: 永新县| 清流县| 喜德县| 大埔区| 法库县| 海宁市| 正镶白旗| 阳曲县| 资阳市| 五指山市| 千阳县| 崇仁县| 温州市| 双江| 通江县| 巢湖市| 海伦市| 宝坻区| 永顺县| 邢台市| 丹寨县| 县级市| 新邵县| 四川省| 依安县| 峨眉山市| 四子王旗| 青岛市| 古田县| 茂名市| 无极县| 北票市| 凤台县| 永川市| 会东县| 盐源县| 龙里县| 镇安县| 福海县| 怀化市| 全南县|