An attacker may use ____________ to gather information about the database structure in a blind SQL injection attack.

  • Comments
  • Error messages
  • Metadata
  • Stored procedures
In a blind SQL injection attack, attackers may exploit error messages or use comments to gather information. However, a common technique is using database metadata to understand the database structure.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *