While performing a security audit of a web application, an ethical hacker discovers a potential vulnerability. The application responds to logically incorrect queries with detailed error messages that divulge the underlying database's structure. The ethical hacker decides to exploit this vulnerability further. Which type of SQL Injection attack is the ethical hacker likely to use?
LordXander
7 months, 3 weeks agoinsaniunt
9 months, 2 weeks agororahir
9 months, 2 weeks ago