28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

260 Chapter 5 • Blind <strong>SQL</strong> <strong>Injection</strong> Exploitation<br />

Figure 5.11 Absinthe v1.4.1 Configuration Tab<br />

B<strong>SQL</strong> Hacker<br />

B<strong>SQL</strong> Hacker utilizes a number of inference techniques to enable the attacker to extract<br />

database contents, <strong>and</strong> is experimental in many of the approaches it implements. Although it<br />

is still in beta, there are numerous nifty features that bear exploration.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!