Chapter 5. Blind SQL Injection Exploitation
Solutions in this chapter:
âª Finding and Confirming Blind SQL Injection
âª Using Time-Based Techniques
âª Using Response-Based Techniques
âª Using Alternative Channels
âª Automating Blind SQL Injection Exploitation
Solutions Fast Track
Frequently Asked Questions
So, you've found an SQL injection point, but the application gives you only a generic error page. Or perhaps it gives you the page as normal, but there is a small difference in what you get back, visible or not. These are examples of blind SQL injection, where you exploit without any of the useful error messages or feedback that you may be used to, as you saw in Chapter 4. Don't worry; you can still reliably exploit SQL injection ...
Get SQL Injection Attacks and Defense now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.