Table of contents
Exploiting a SQL injection flaw in a web application can give the attacker full control of the remote DBMS. One of the major consequences of exploiting consists in fetching all or part of the data stored in the database.
In several cases, like a web application that stores images on the database, the attacker has to deal with binary data.
Follows some techniques to fetch binary data via a SQL injection flaw …