bug-bounty489
google305
xss293
microsoft262
facebook224
rce187
exploit158
apple149
malware142
cve124
account-takeover110
bragging-post110
csrf85
privilege-escalation84
authentication-bypass70
stored-xss66
phishing61
reflected-xss59
writeup58
dos58
browser55
supply-chain55
access-control55
reverse-engineering51
web-security49
input-validation49
react48
defi48
open-source47
smart-contract47
ssrf47
cross-site-scripting46
cloudflare45
oauth45
ethereum44
sql-injection43
aws41
web340
docker39
web-application39
race-condition37
lfi37
api-security37
ctf36
burp-suite36
ai-agents36
node34
information-disclosure33
smart-contract-vulnerability33
idor32
0
8/10
A detailed writeup demonstrating how to convert a blind error-based SQL injection vulnerability on MSSQL into an exploitable boolean-based injection using the IIF() function combined with type conversion, enabling data exfiltration through character enumeration attacks despite a 100-character payload limitation.
sql-injection
blind-sql-injection
error-based-sql-injection
mssql
boolean-based-sql-injection
bug-bounty
data-exfiltration
burp-suite
iis
aspx
information-schema
character-enumeration
Ozgur Alp
Synack
Burp Intruder
SQLMap
SQLFiddle
MSSQL
IIS