This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.

Posted by: Pdfprep Category: CEH-001 Tags: , ,

This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.
A . Unique SQL Injection
B . Blind SQL Injection
C . Generic SQL Injection
D . Double SQL Injection

Answer: B