Blind SQL injection
Occur when no SQL message returned
Condition
Categorized into :
Boolean Based Attack
TRUE OR FALSE
(GET DIFFERENT RESULT/PAGE CONTENT)
TIME BASED ATTACK
SLEEP
Cons
UNION
will not work : cannot see the results of the injected query
Boolean Based Attack Example :
Intercepted Request
Backend Processing
TrackingId
is used to check if user is authenticated
Note : If the sql statement is true , we get 'Welcome Back' which doesn't return any sql result because its processed in backend
Payload Testing
Checking SQL user table existence
Exploitation Delivery
2
comparing second character of the password , 1
only one character if "Welcome Back" is returned it means the position of the password matches
Last updated