Types of attack | Nature of attack | Recommended technique |
---|---|---|
Blind SQLI [91] | Collect valuable data by inferring from the page's answers after asking the server a set of true/false questions | ML |
Timing Attack[96] | Observe the response time, which will assist the attacker in making an informed decision about which injection approach to use | ML |
Database Backdoor Attack | Set a trigger to collect the user's feedback and send it to his or her e-mail address | ML |
Command SQLI | Injecting and executing system-level commands via a vulnerable program is the essence of the attack | Rule-based |