Buscar
{KEYWORD}');SELECT PG_SLEEP(5)--
Aprieta "Enter" para buscar o "ESC" para cerrar.

: This closes the original SQL function and terminates the statement.

: This is the "gold standard." It treats all input as data, never as executable code.

: Find a search bar, login field, or URL parameter (e.g., ://example.com ). Inject the Payload : Replace the input with the payload. Observe the Lag : If the page loads instantly , the input is likely sanitized.

: This attempts to "break out" of a text field by providing a closing single quote.

This specific string is used to test if a database is vulnerable to "blind" attacks, where the server doesn't return data directly but its response time reveals information.

If your application is vulnerable to this, you must implement these defenses:

: Available in most modern frameworks (like Django, Rails, or Express), these automatically handle the heavy lifting of security.

: Ensure the database user for the web app cannot execute administrative commands like PG_SLEEP .

Regresar al Inicio