{keyword}');select Pg_sleep(5)-- Guide
: This closes the original SQL function and terminates the statement.
: This is the "gold standard." It treats all input as data, never as executable code.
: Find a search bar, login field, or URL parameter (e.g., ://example.com ). Inject the Payload : Replace the input with the payload. Observe the Lag : If the page loads instantly , the input is likely sanitized. {KEYWORD}');SELECT PG_SLEEP(5)--
: This attempts to "break out" of a text field by providing a closing single quote.
This specific string is used to test if a database is vulnerable to "blind" attacks, where the server doesn't return data directly but its response time reveals information. : This closes the original SQL function and
If your application is vulnerable to this, you must implement these defenses:
: Available in most modern frameworks (like Django, Rails, or Express), these automatically handle the heavy lifting of security. Inject the Payload : Replace the input with the payload
: Ensure the database user for the web app cannot execute administrative commands like PG_SLEEP .