Time based SQL Injection Blind

In the time based, we rely on the time the webserver takes to send a response back to us. We can define a number of seconds in the SQL query that if the server takes the same time to respond, we conclude that it's vulnerable to SQL injection.

http://sumwebsite.com/profile?id=1

As you know first we aim to find the number of columns. Then an example payload is the one below

0' UNION SELECT SLEEP(5),2;--

If the above one took 5 seconds of the webserver to respons, we knew then we have two columns. This means your criteria of a correct query is the time you defined with the [sleep] function.

Last updated