This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.
A.
Unique SQL Injection
B.
Blind SQL Injection
C.
Generic SQL Injection
D.
Double SQL Injection
This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.
This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.
A.
Unique SQL Injection
B.
Blind SQL Injection
C.
Generic SQL Injection
D.
Double SQL Injection
B