sqli_blind_boolean
Extract data from databases using blind SQL injection with binary search character enumeration. This tool sends HTTP requests to determine true/false conditions and returns extracted values efficiently.
Instructions
Boolean-based blind SQLi with binary search character enumeration. Uses ASCII(SUBSTRING(...))>N technique with binary search for efficiency. Determines true/false by comparing response lengths. Returns extracted_value, characters_found, requests_sent. Side effects: Read-only. Sends ~8 requests per character (binary search on ASCII 32-126).
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Full URL with injectable parameter | |
| parameter | Yes | Vulnerable parameter name | |
| query | No | SQL sub-query to extract, e.g. 'database()' or '(SELECT password FROM users LIMIT 1)' | |
| max_length | No | Maximum string length to extract |