Back to Blog
Burp suite sql injection5/18/2023 ![]() ![]() I'll keep the second payload at 48-126 (0-9, A-Z, a-z). Hopefully the table is 10 characters or less in length. ![]() I'm not trying to be sneaky, and blind SQL injection is inherently not sneaky, so I'm just going to guess the length and set the first payload to 1 through 10. ![]() How about the SQL syntax, " ' if (ascii(lower(substring((select top 1 name from sysobjects where xtype=char(85) and name like ' %user%'), 1,1)))= 100) waitfor delay '00:00:30'- ?" This looks for a table that has the word "user" anywhere within.
0 Comments
Read More
Leave a Reply. |