356
◾
Ethical Hacking and Penetration Testing Guide
As we can see that the page returned correctly when we injected a true statement. Let’s now
inject a false statement “AND 1=2” and inspect the response.
False Statement
Syntax
http://localhost/index.php?support=yes’ AND 1=2--+ [False Statement]
We can clearly see now that the response returned with a true statement is different than what
was returned after injecting a false statement, there is a distinct response when injecting a true and
a false statement. We can conclude that there is a good chance that the application is vulnerable
to blind SQL injection.
You can follow the chart while testing for blind SQL injection. The key here is the distinction
between a true and a false statement.
Dostları ilə paylaş: