28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 5<br />

Blind <strong>SQL</strong><br />

<strong>Injection</strong> Exploitation<br />

Solutions in this chapter:<br />

■■<br />

■■<br />

■■<br />

■■<br />

■■<br />

Finding <strong>and</strong><br />

Confirming Blind <strong>SQL</strong> <strong>Injection</strong><br />

Using Time-Based Techniques<br />

Using Response-Based Techniques<br />

Using Alternative Channels<br />

Automating Blind<br />

<strong>SQL</strong> <strong>Injection</strong> Exploitation<br />

˛ Summary<br />

˛ Solutions Fast Track<br />

˛ Frequently Asked Questions<br />

219

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!