A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Study the Best PenTest Algorithm for Blind SQL Injection Attacks
2020
International Journal on Information and Communication Technology (IJoICT)
<p>There are several types of SQL injection attacks. One of the most popular SQL Injection Attacks is Blind SQL. This attack is performed by exploiting a gap in the database server when executing query words. If the server responds to an invalid query, the attacker will then reverse the engineering part of the SQL query, which is obtained from the error message of the server. The process of generating a blind SQL injection attack is complicated. As a result, a Pentester often requires a long
doi:10.21108/ijoict.2019.52.268
fatcat:k5kfsswu7ngsdecxgudm4iyqby