Questions about this topic? Sign up to ask in the talk tab.
SQL injection/Blind/Extraction/Precomputation
From NetSec
Revision as of 05:58, 15 November 2012 by LashawnSeccombe (Talk | contribs) (Created page with "==The comparative precomputation attack== '''This attack relies heavily on the <i>remote dataset</i> for successful exploitation and is thus less reliable than other methods.'''...")
The comparative precomputation attack
This attack relies heavily on the remote dataset for successful exploitation and is thus less reliable than other methods. This significantly differs from previously discovered single-byte exfiltration techniques because:
|
Requirements:
|
/articles.php?id=1
/articles.php?id=255 Follow the next steps for automation (and sanity's) sake:
Almost done!
And the value of a byte has been determined. Protip: This attack can be extended by:
|