http://forumdzjegkm6ey6ngexwpv5u3f3sav5wnrwqmatcb6c6mhxmkhsczid.onion/topic/details/sadfsadf/2
The following techniques can be used to exploit blind SQL injection vulnerabilities, depending on the nature of the vulnerability and the database involved: You can change the logic of the query to trigger a detectable difference in the application's response depending on the truth of a single condition.