SQL Injection (SQLi) Types By ITSec

 

SQL Injection (SQLi) Types By ITSec

SQL Injection (SQLi) is a code injection technique that exploits vulnerabilities in applications that interact with databases. There are several types of SQL injection attacks, each with its own methods and impacts. Here are the main types:

In-band SQLi (Classic SQLi): This is the most common and easiest to exploit. It occurs when an attacker uses the same communication channel to both launch the attack and gather results. There are two primary techniques:

Error-based SQLi: Relies on error messages thrown by the database server to gain information about the database structure.

Union-based SQLi: Uses the UNION SQL operator to combine the results of two or more SELECT statements into a single result2.

Inferential SQLi (Blind SQLi): This type of attack does not transfer data via the web application and the attacker cannot see the result of the attack in-band. Instead, the attacker sends payloads and observes the web application’s response and the resulting behavior of the database server. There are two types:

Boolean-based (content-based) Blind SQLi: Sends an SQL query to the database which forces the application to return a different result depending on whether the query returns a TRUE or FALSE result.

Time-based Blind SQLi: Sends an SQL query to the database which forces the database to wait for a specified amount of time before responding2.

Out-of-band SQLi: This type of attack is used when the attacker cannot use the same channel to launch the attack and gather results, or when the server responses are not stable. It relies on the database server’s ability to make DNS or HTTP requests to deliver data to an attacker2.

These are the primary types of SQL injection attacks. Each type has its own methods and impacts, and understanding them is crucial for protecting applications from such vulnerabilities.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

ITSec Security Consulting Limited

ITSec Security Consulting Limited

IT Security Assessment And Audit, SRAA, Penetration Test (Pen Test),Compliance, Data Security,ISO 27001 Audit, GDPR Audit, PCI DSS, Cyber Security, Risk assessment, Data Protection, Data Privacy, SOX, CISA, CEH,CISSP, CISM

Secure Your Computers from Cyber Threats and mitigate risks with professional services to defend Hackers.

Contact Us:

Find Us immediately for the Security Assessment in Hong Kong(HK), United Kingdom(UK), Europe(EU), Estonia(EE), Singapore(SG), Canada(CA):

Website:

www.itsec.hk

www.itseceu.uk

www.sraa.com.hk

www.penetrationtest.hk

www.itsec.vip

Facebook:

https://www.facebook.com/ITSec-Security-Co...

Google:

https://itsecsecurityconsulting.business.s...

Contact Us:  

https://itsec.vip/contact/

Company's Cooperation: 

www.itteacheritfreelance.hk

留言

這個網誌中的熱門文章

Types of XSS Attacks By ITSec Security Consulting Limited

Understanding Out-of-Band SQL Injection: A Comprehensive Guide By ITSec Security Consulting Limited

Boolean-based (Content-based) Blind SQL Injection