While working as a cyber consultant for an organization, you learn an attacker recently breached their database! While looking through the web request logs you see thousands of requests containing queries with the SLEEP() command. What type of injection did this attacker likely use?
1 answer
The attacker likely used a SQL injection attack. The SLEEP() command is often used in SQL injection attacks to delay the response from the server, allowing the attacker to gather information about the database structure and potentially steal data. It is important for the organization to address this vulnerability and strengthen their database security to prevent further attacks.