An attacker launches an SQL injection attack on a web application by trying to force the application requesting the back-end database to perform multiple SELECT queries. Which technique exploits the SQL injection vulnerability on the web application?
- Boolean
- Error-based
- Out-of-band
- Union operator
- Time delay
Explanation & Hint: There are essentially five techniques that can be used to exploit SQL injection vulnerabilities:
|