Skip to content

Latest commit

 

History

History
6 lines (4 loc) · 466 Bytes

File metadata and controls

6 lines (4 loc) · 466 Bytes

exploit-conditional_blind_sqlinjection

This simple Python script can be used to exploit a blind sql injection vulnerability described in this portswingger lab https://portswigger.net/web-security/sql-injection/blind/lab-conditional-responses

Lab: Blind SQL injection with conditional responses

Disclaimer: it is not optimized to be quickly. A lot of improvements could be added to do so but it was intended to be done fast and I din't spend too much time on it.