0% found this document useful (0 votes)
5 views8 pages

Adv Net Sec 1 Week 8

The document outlines various types of SQL injection techniques, including error-based, union-based, boolean-based blind, and time-based blind SQL injections, explaining how attackers exploit system vulnerabilities to retrieve data. Each technique is briefly described, highlighting the methods used by attackers to manipulate SQL queries. Additionally, the document includes references to tasks but lacks detailed content for those sections.

Uploaded by

Mohsin Raja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views8 pages

Adv Net Sec 1 Week 8

The document outlines various types of SQL injection techniques, including error-based, union-based, boolean-based blind, and time-based blind SQL injections, explaining how attackers exploit system vulnerabilities to retrieve data. Each technique is briefly described, highlighting the methods used by attackers to manipulate SQL queries. Additionally, the document includes references to tasks but lacks detailed content for those sections.

Uploaded by

Mohsin Raja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Mohsen Ali Week 8 800698715

Task 1: DROP TABLES

 Error based SQL Injection


Error based SQL injection a technique where system vulnerabilities by
the attacker throw errors onto the user interface purposefully to your
database. Attacker learns system information such as the database
version, database, OS, by studying these errors and from database they
try to retrieve data by writing some malicious code is URL.

 Union based SQL Injection


In short, a union-based SQL injection Hackers may not be able to edit
the initial query so that it returns what they want and takes advantage
of the fact that this is one way of running two queries at once, but they
can easily return data they wanted by using such injections.

 Boolean based blind SQL Injection


It relies on sending an SQL query to the database which forces the
application to return a different result depending on whether the query
returns a TRUE or FALSE result also known an inferential SQL Injection
technique.

 Time based blind SQL Injection


It forces the database to wait for a specified amount of time (in
seconds) before responding. Sending an SQL query to the database
whether TRUE or FALSE will be indicated to the attacker.
Mohsen Ali Week 8 800698715

Task 2: One Proxy To Rule Them Al


Mohsen Ali Week 8 800698715
Mohsen Ali Week 8 800698715
Mohsen Ali Week 8 800698715

Task 3: Intruder
Mohsen Ali Week 8 800698715
Mohsen Ali Week 8 800698715
Mohsen Ali Week 8 800698715

You might also like