Breaking News
recent

Blind SQL Injection

Blind SQL (structured query language) injection applications based on answer true or false answer database that asks questions and sets a variety of SQL injection attacks. Web application to display the error messages has been set, but is vulnerable to SQL injection code that is not often used when it is attacked.

When an attacker exploit SQL injection, sometimes web application database SQL query syntax is wrong to complain that displays error messages. Blind SQL injection is almost identical to the SQL injection, data is retrieved from the database, the only difference being the way. Does not produce data on the database Web page, an attacker Database is true or false by asking a series of questions is forced to steal data. SQL injection vulnerability it exploits more difficult, but not impossible.


Example URL:

http://example.com/items.php?id=2

Sends the following query to the database:

SELECT title, description, body FROM items WHERE ID = 2

The attacker may then try to inject a query that returns 'false':

http://example.com/items.php?id=2 and 1=2

Now the SQL query should looks like this:

SELECT title, description, body FROM items WHERE ID = 2 and 1=2

If the web application is vulnerable to SQL Injection, then it probably will not return anything. To make sure, the attacker will inject a query that will return 'true':

http://example.com/items.php?id=2 and 1=1

Unknown

Unknown

No comments:

Post a Comment

Powered by Blogger.