Skip to content

Commit c233c05

Browse files
authored
Update README.md
1 parent 8d6c479 commit c233c05

File tree

1 file changed

+11
-0
lines changed

1 file changed

+11
-0
lines changed

README.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -378,6 +378,17 @@ This basically selects the database and dumps it as a string. If we add the floo
378378
And we have security being concatenated in the output:
379379
We use the information schema table as covered previously to build our query further: **select 1 from (select concat(*), ( concat((select database() ), floor(rand(0)*2 ))c from information_schema.tables group by c)a;**
380380

381+
And we use it on the username. Please remember to concat your query so that the query gets executed.
382+
383+
384+
385+
**Lessons 15 & 16: Blind Boolean time-based with single and double quotes.**
386+
387+
So now we move on to POST Parameter Blind-based Boolean injections which are like 1 or 1=1, 1 AND 1=1, which means for the first query we have the Boolean value 1 and for the second we also have the Boolean value 1..
388+
389+
390+
391+
381392

382393

383394

0 commit comments

Comments
 (0)