O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Data-driven blind SQL injection

We can now use Perl to exploit an SQL vulnerability in which the MySQL error is printed to the web page. However, how should we handle the vulnerability if the web server is configured to not handle errors? Well, we can blindly step through queries, making HTTP requests in the hope of gathering the correct result sets. This type of blind SQL injection requires many more HTTP requests and more investigation on our part. For example, when error reporting to the web page from MySQL is disabled, it so happens that nothing (no record) is displayed on the page when unsuccessful SQL injection causes an error. This means that we can still potentially get the column count by cycling through integers starting from 1, until ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required