BLIND SQL INJECTION

NAIROBI, 12122, JUJA, 1212

Blind SQL (Structured Query Language) injection is a type of SQL Injection attack that asks the database true or false questions and determines the answer based on the applications response. This attack is often used when the web application is configured to show generic error messages, but has not mitigated the code that is vulnerable to SQL injection.

Oct 28, 2021, 3:00 – 6:00 PM

RSVP'd

RSVP Now

Key Themes

Web

About this event

When an attacker exploits SQL injection, sometimes the web application displays error messages from the database complaining that the SQL Query’s syntax is incorrect. Blind SQL injection is nearly identical to normal SQL Injection, the only difference being the way the data is retrieved from the database. When the database does not output data to the web page, an attacker is forced to steal data by asking the database a series of true or false questions. This makes exploiting the SQL Injection vulnerability more difficult, but not impossible. .

When

When

Thursday, October 28, 2021
3:00 PM – 6:00 PM UTC

Speaker

  • John kiguru

    mr Kiguru

Facilitator

  • John kiguru

    mr Kiguru

Organizers

  • Gabriel Okemwa

    GDSC Lead

  • Sebastian Muchui

    IoT Track Lead

  • Andrew Nzioki

    Web Development Track Lead

  • Arnold Keter

    Data Science track - Karen Campus

  • Peter Chege

    Mobile development Lead

  • Clinton Njogu

    Blockchain/Web3 Track lead

  • Chris Macharia

    Cyber-Security Track Lead

  • HILLARY OMONDI

    GDSC JKUAT

    GDSC CO-LEAD

  • Erick Otuoma

    StackUp

    Data Science Track Lead

  • Valarie Chebet

    GDSC CO-LEAD Karen Campus

  • Ruth Gitau

    Social Media and Outreach

  • Alfred Warui

    Web Dev Lead - Karen Campus

Contact Us