Archive of Blind Database Error Fingerprint Inference Version
-
Database Fingerprinting for SQL Injection
Posted in Gathering InformationIdentifying the underlying DBMS. There are small differences between database management systems and those can have a huge impact on the feasibility and the result of an SQL injection attack. It is especially important for the attacker to identify the underlying DBMS since it...
Continue reading this entry → -
SQL Injection Inference Attacks
Posted in SQL Injection TechniquesUnderstanding the fundamentals inference attacks. Inference technique is the pillar of blind SQL injection and it is used in many advanced attacks. It allows testing for vulnerabilities and even extract information when no data is returned to the end user. Moreover, mastering its fundamentals will...
Continue reading this entry → -
What is SQL Injection
Posted in SQL Injection IntroductionDefinition, basic principles and categories of SQL injection. SQL injection (SQLI) is a technique that allows a user to inject SQL commands into the database engine from a vulnerable application. By leveraging the syntax and capabilities of SQL, the attacker can influence the query passed to the back-end...
Continue reading this entry →