Equipped with the
techniques we describe here, you should be able to identify
and exploit SQL injection flaws against any other database, by performing
some quick additional research.
T I P
In many situations, you will find it extremely useful to have access to a
local installation of the same database that is being used by the application
you are targeting. You will often find that you need to tweak a piece of syntax,
or consult a built-in table or function, to achieve your objectives. The responses
you receive from the target application will often be incomplete or cryptic,
requiring some detective work to understand. All of this is much easier if you
Do'stlaringiz bilan baham: