Oddbean new post about | logout
 Blind SQL injection is a type of cyber attack that can compromise sensitive information in databases. This stealthy method involves manipulating SQL queries without directly seeing the results, instead relying on indirect responses from the application. Two common techniques used by attackers are Boolean-based and time-based blind SQL injection.

Boolean-based attacks involve sending SQL queries that force the database to return different results based on true or false conditions. Attackers analyze the application's response to infer whether the condition was met. Time-based attacks, on the other hand, utilize SQL commands that delay the database's response. By measuring the time taken for the application to respond, attackers can determine if the injected query returned true or false.

To prevent blind SQL injection attacks, it is essential to follow best practices for secure coding and database interaction. This includes using prepared statements, validating and sanitizing user inputs, configuring least privilege access, utilizing ORM frameworks, implementing web application firewalls (WAFs), and conducting regular security audits and code reviews.

Source: https://dev.to/carrie_luo1/the-ultimate-guide-to-understanding-blind-sql-injection-3ci8