This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.
Which of the following type of scanning utilizes automated process of proactively identifying vulnerabilities of the computing systems present on a network?