ExamGecko
Question list
Search
Search

Related questions











Question 269 - 312-50v12 discussion

Report
Export

Ethical hacker jane Smith is attempting to perform an SQL injection attach. She wants to test the response time of a true or false response and wants to use a second command to determine whether the database will return true or false results for user IDs. which two SQL Injection types would give her the results she is looking for?

A.
Out of band and boolean-based
Answers
A.
Out of band and boolean-based
B.
Time-based and union-based
Answers
B.
Time-based and union-based
C.
union-based and error-based
Answers
C.
union-based and error-based
D.
Time-based and boolean-based
Answers
D.
Time-based and boolean-based
Suggested answer: D

Explanation:

"Boolean based" we mean that it is based on Boolean values, that is, true or false / true and false.

AND Time-based SQL Injection is an inferential SQL Injection technique that relies on sending an SQL query to the database which forces the database to wait for a specified amount of time (in seconds) before responding. The response time will indicate to the attacker whether the result of the query is TRUE or FALSE.

Boolean-based (content-based) Blind SQLi Boolean-based SQL Injection is an inferential SQL Injection technique that relies on sending an SQL query to the database which forces the application to return a different result depending on whether the query returns a TRUE or FALSE result.

Depending on the result, the content within the HTTP response will change, or remain the same. Thisallows an attacker to infer if the payload used returned true or false, even though no data from thedatabase is returned. This attack is typically slow (especially on large databases) since an attackerwould need to enumerate a database, character by character.

Time-based Blind SQLi Time-based SQL Injection is an inferential SQL Injection technique that relies on sending an SQL query to the database which forces the database to wait for a specified amount of time (in seconds) before responding. The response time will indicate to the attacker whether the result of the query is TRUE or FALSE.

Depending on the result, an HTTP response will be returned with a delay, or returned immediately.

This allows an attacker to infer if the payload used returned true or false, even though no data from the database is returned. This attack is typically slow (especially on large databases) since an attacker would need to enumerate a database character by character.

https://www.acunetix.com/websitesecurity/sql-injection2/

asked 18/09/2024
Kyle Roarick
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first