The document outlines various types of SQL injection techniques, including error-based, union-based, boolean-based blind, and time-based blind SQL injections, explaining how attackers exploit system vulnerabilities to retrieve data. Each technique is briefly described, highlighting the methods used by attackers to manipulate SQL queries. Additionally, the document includes references to tasks but lacks detailed content for those sections.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
5 views8 pages
Adv Net Sec 1 Week 8
The document outlines various types of SQL injection techniques, including error-based, union-based, boolean-based blind, and time-based blind SQL injections, explaining how attackers exploit system vulnerabilities to retrieve data. Each technique is briefly described, highlighting the methods used by attackers to manipulate SQL queries. Additionally, the document includes references to tasks but lacks detailed content for those sections.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8
Mohsen Ali Week 8 800698715
Task 1: DROP TABLES
Error based SQL Injection
Error based SQL injection a technique where system vulnerabilities by the attacker throw errors onto the user interface purposefully to your database. Attacker learns system information such as the database version, database, OS, by studying these errors and from database they try to retrieve data by writing some malicious code is URL.
Union based SQL Injection
In short, a union-based SQL injection Hackers may not be able to edit the initial query so that it returns what they want and takes advantage of the fact that this is one way of running two queries at once, but they can easily return data they wanted by using such injections.
Boolean based blind SQL Injection
It relies on sending an SQL query to the database which forces the application to return a different result depending on whether the query returns a TRUE or FALSE result also known an inferential SQL Injection technique.
Time based blind SQL Injection
It forces the database to wait for a specified amount of time (in seconds) before responding. Sending an SQL query to the database whether TRUE or FALSE will be indicated to the attacker. Mohsen Ali Week 8 800698715
Task 2: One Proxy To Rule Them Al
Mohsen Ali Week 8 800698715 Mohsen Ali Week 8 800698715 Mohsen Ali Week 8 800698715
Task 3: Intruder Mohsen Ali Week 8 800698715 Mohsen Ali Week 8 800698715 Mohsen Ali Week 8 800698715