sqli blind
Blind SQL injection occurs when the application does not display error messages, making it challenging to directly extract data.
Blind SQL injection occurs when the application does not display error messages, making it challenging to directly extract data. In such cases, a technique called "blind" exploitation is used, where an attacker sends crafted queries to the application and observes its behavior to infer information about the underlying database.

To successfully log in once again, we will need an overall true
query. This can be achieved by injecting an OR
condition into the password field, so it will always return true
. Let us try something' or '1'='1
as the password.

The additional OR
condition resulted in a true
query overall, as the WHERE
clause returns everything in the table, and the user present in the first row is logged in. In this case, as both conditions will return true
, we do not have to provide a test username and password and can directly start with the '
injection and log in with just ' or '1' = '1
.

This works since the query evaluate to true
irrespective of the username or password.
subverting query logic
time based


Last updated
Was this helpful?