1. describe the in-band sqli injection attack method. include details on error-based sqli and union-based sqli types. expand on how the information gained is to the attacker.
2. describe the inferential sqli (blind sqli) attack method. include detail on the blind-boolean-based sqli and blind-time-based sqli types. why are these called blind sql injection attacks? expand on how the information gained is to the attacker. why would an attacker use these methods?
3. describe the out-of-band sqli injection attack method. expand on how the information gained is to the attacker. why is this technique less common?
4. how does the nosql injection attack differ from the traditional sql injection?

Solved
Show answers

Ask an AI advisor a question