Questions about this topic? Sign up to ask in the talk tab.

SQL injection/Blind/Extraction

From NetSec
Revision as of 18:23, 19 November 2012 by JtRIPper (Talk | contribs)

Jump to: navigation, search

Blind extraction

There are multiple types of blind data extraction attacks:

  • Timing based
  • Pre-computation based

The only three things that all of these methods have in common is:

  • These attacks are all limited in some fashion because of local environment and latency or remote environment and dataset.
  • You must not be afraid of programming.

Timing-based extraction