SQL Injection (Blind)
Objective
Find the version of the SQL database software through a blind SQL attack
Security Level: Low
The SQL query uses RAW input that is directly controlled by the attacker. All they need to-do is escape the query and then they are able to execute any SQL query they wish. Spoiler: ?id=1' AND sleep 5&Submit=Submit.
Let's check if user ID 1 exists.
We can now provide the following inputs to figure out the number of columns in the table.
1' ORDER BY 1#
1' ORDER BY 2#
1' ORDER BY 3#
When we enter the third input, we get a blank screen. This means that there are two columns in the table.